The American Health Care Delivery System
Autor: Joshua • October 26, 2018 • 1,463 Words (6 Pages) • 554 Views
...
Walmart had criminals, hackers, steal personal information from customers. Amazon has hackers that are also stealing customers’ personal information and they make a purchase with it. They go as far as to lie and wait on the arrival of the stolen goods. There have been instances where customers have called and made a complaint with Amazon and their response was not very polite. Due to those situations, they have lost a few customers.
Conclusion
All organizations have some form of information system that they are using. These systems are there to help the functions of the business. In modern day technology, virtually everything is done using the Internet. It is a good idea to protect the privacy of the organization, employees, and potential customers. Making sure that all files being used under an encrypted device is the only way to keep customers information safe from hacker. It is best for customers to keep all of their personal information in safe place. They should also be careful and mindful of whom they give their name, age, and address to. When utilizing social media, make all profiles private.
References
e-book
Laudon, Kenneth. C. Laudon, Jane. P. (2014). Introduction to Human Resource Management
Retrieved from https://online.vitalsource.com/books/97812697403/pageid/0
M.U.S.E. Materials
American InterContinental University. (2017). Challenges and Security Issues
Retrieved from American InterContinental University Virtual Campus,
MGMT 305-1605B-05: https://mycampus.aiu-online.com/
intellipath
American InterContinental University. (2017). Unit title: Challenges and Security
Retrieved from American InterContinental University Virtual Campus, MGMT 305-1605B-05: https://mycampus.aiu-online.com/
Website Article – Author Not Listed
The University of Arizona (2017) Management Information System. Shaping the Future of IT
Retrieved from https://mis.eller.arizona.edu/what-is-mis
Website Article – Author Listed
Al Imran, A. (2015). A Study on Amazon
Retrieved from https://www.researchgate.net/publication/261440748_A_STUDY_ON_AMAZON_INFORMATION_SYSTEMS_BUSINESS_STRATEGIES_AND_e-CRM
Website Article – Author Listed
Kline, D. B. (2015). The Money Fool. Amazon’s Sustainable Competitive Advantage
Retrieved from https://www.fool.com/investing/general/2015/05/18/amazons-sustainable-competitive-advantage.aspx
Website Article – Author Listed
Zetter, K. (2009). Wired. Big-Box Breach: The Inside Story Of Walmart’s Hacker Attack
Retrieved from https://www.wired.com/2009/10/walmart-hack/
Website Article – Author Listed
Lewis, P. (20016, July). Mirror. Cyber crooks hack into Amazon accounts to place orders and steal the goods.
Retrieved from http://www.mirror.co.uk/news/uk-news/cyber-crooks-hack-amazon-accounts-8528512
...