Www.homeworkempire.com



Information and Business Information Systems at AmazonNameCourseTutor22nd June 2018Background on ,Inc. is a cloud computing and electronic commerce company that was established in 1994 by Jeff Bezos. Since its establishment, this tech giant has distinctly emerged as the largest internet retailer companies to sell merchandises over the internet. Although the company was initially an online bookstore, it later diversified to consumer electronics, cloud infrastructure services and a variety of low-end products. The success enjoyed at is due to the fact that this company is customer obsessed and it takes advantage of every opportunity that may present itself during this unprecedented and rapid technological revolution. In addition, the company hires only the best employees and believes that self-sufficiency and resourcefulness is a result of frugality.Issues/trends affecting the organization (see note below)Roles & ActionsThrough its innovation, Amazon has managed to provide various service-specific resources, roles, actions and condition. At Amazon, Identity and Access Management doesn’t require to create or modify Amazon ECS resources or carry out certain tasks with the help an Amazon IT specialist. However, Elasticsearch service provides a wide array of service specific actions, roles and condition to use during an IAM permission policy. Some of these actions include add tags which offers permission to ascribe resource tags to an Amazon domain. Other actions include DED (DescribeElasticsearchDomains which allows one to view a description of the domain configuration for not less than five AmazonES domains. Utilization of Data ResourcesKnowing AWS cares more about their customer trust, they have opened up huge Data Blog which is intended to help developers, scientists and solution architects discover the best AWS big data services and to learn the best practices associated with data best practices. However, although Amazon intends to provide every customer with news ways of collecting, storing, processing, analyzing and visualizing data at different scales of development, the customer is likely to encounter the threat of user access control commonly referred to as IAM (Identity and Access Management). As a result people are usually granted the privilege of accessing the account and giving an individual Driving Value from Business Information SystemsAmazon should equip its web service with Service Oriented Architecture (SOA) to decentralize service platform and enable the company’s information system to be scalable and strong. Although Amazon web service provides a global platform where individuals can sell their products, the company experiences huge challenges that affect its services. The systems should be secure, fast and reliable in order to facilitate ordering and selling of products and efficient tracking of fraudsters. The Customer Relation Management (CRM) should be smart enough and in good condition in order to facilitate its ability to take customer information every second from their searching and data mining details Process-Oriented OrganizationAt amazon, customers have personalized profiles to ease the process of selling and shopping. To improve on secure transactions, should employ the use of secure server software which encrypts the customer’s personal information such as credit card number among other details on the internet. This service shall enhance customer’s browsing experience and improve customer satisfaction since the software acts as an interactive platform between the customer and the website. The management should consider installing an Interactive searching system which acts as a searching option to the customers. It shall also help them with locating various items catalogs to help identify the item of choice. Security and Ethical IssuesBeing one of the largest online shopping sites, faces various ethical and security issues that affect its efficiency. Although the company uses tested and proven cryptographic methods to allow access, customers are often worried about the risk of having their personal information released to the public and the risk of controlling access to their data. Their ability to control and protect customer data raises security concerns. The company should assume maximum responsibility and ensure that they encrypt all stored data which would require an effective filing system and encrypting network traffic. It is both a legal and ethical requirement to protect the disclosure of personal vulnerabilities from hackers and the public. Business Continuity PlanningInformation Technology inadequacies can damage the ability of an organization to deliver on its promises efficiently and can harm its reputation which jeopardizes its continuity. should create a disaster recovery (DR) and business Continuity (BC) plan to help the company survive by creating a security plan that will help safeguard information from scams and viruses. This plan will also help to ensure safe communication links and safe storage of information in the event of a disaster. Inability to create customer loyalty is a threat to business continuity at . Therefore they should prioritize customer acquisition and retention by maintaining communication, creating value to the consumer, maintaining a boundless inventory and by ensuring that customers gain from the highest margin for the lowest price. Summary of major findings or issues that are likely to cause the most concern to this groupAlthough amazon has created an edge in online business, its growth and continuity can be jeopardized by their inability to handle major issues. For instance, security of information of storage sites and their inability to maintain customer satisfaction and customer loyalty might be of concern to their growth. Failure to address customer complaints and consumer preferences efficiently might force them out of business. The threat of user access control is likely to affect the company’s standards by creating a leeway for hackers and the public in general. Recommendations for action based on your evaluation of your organization and the learning and readings from the courseIT specialist at Amazon should improve IAM security by educating individuals on how AWS IAM works and how one can take advantage of it without affecting the data resources. For instance, when new identities are being created, one should ensure that everyone is provided with minimal privileges and temporary access to get work done. To track fraudsters, Amazon should build a Smart Analysis Search (SAS) which is enabled to detect fraud by analyzing individual behavioral pattern. It also measures and personalizes customers’ preference to improve service delivery. Companies that are mandated to control and regulate data security should investigate the company’s ethical and legal security commitments. Although this may require legal consultation, it will facilitate a case by case analysis of security risks which will help to keep important information in safer sites and less-confedentail information in virtual servers. The company should promote continuity by improving customer traffic and by making use of different promotional methods such as traditional advertising, public relation activities and online advertising. They should also enroll for an associate program with different customers and business people to enhance continuity planning (Hiles, A., Noakes-Fry, K., & Hiles, 2014).?References in the form of an annotated bibliography in APA formatBryceson, K. P. (2006).?'E' issues for agribusiness: The 'what', 'why', 'how'. Wallingford, UK: CABI Pub.Conrady, R., & Buck, M. (2012).?Trends and Issues in Global Tourism 2012 [recurso electrónico]. Alemania: Springer Healthcare Ltd.Fulmer, L. K. (2008).?Business Continuity Planning: Step-by-Step Guide with Planning Forms. Brookfield: Rothstein Publishing.Hiles, A., Noakes-Fry, K., & Hiles, A. (2014).?Business continuity management: Global best practices, fourth edition. Brookfield, Conn: Rothstein Associates.Hiles, A., Noakes-Fry, K., & Hiles, A. (2014).?Business continuity management: Global best practices, fourth edition. Brookfield, Conn: Rothstein Associates.Munasinghe, M. (2006).?Macroeconomic policies for sustainable growth: Analytical framework and policy studies of Brazil and Chile. Cheltenham, UK: Edward Elgar.Weber, S., & Byrd, J. (2008).?Sell on Amazon: A guide to Amazon's Marketplace, Seller Central, and Fulfillment by Amazon programs. Falls Church, VA: Stephen W. Weber.Zysman, J., & Huberty, M. (2013).?Can Green Sustain Growth?: From the Religion to the Reality of Sustainable Prosperity. Palo Alto: Stanford University Press. ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download