Essays.club - Get Free Essays and Term Papers
Search

The American Health Care Delivery System

Autor:   •  October 26, 2018  •  1,463 Words (6 Pages)  •  554 Views

Page 1 of 6

...

Walmart had criminals, hackers, steal personal information from customers. Amazon has hackers that are also stealing customers’ personal information and they make a purchase with it. They go as far as to lie and wait on the arrival of the stolen goods. There have been instances where customers have called and made a complaint with Amazon and their response was not very polite. Due to those situations, they have lost a few customers.

Conclusion

All organizations have some form of information system that they are using. These systems are there to help the functions of the business. In modern day technology, virtually everything is done using the Internet. It is a good idea to protect the privacy of the organization, employees, and potential customers. Making sure that all files being used under an encrypted device is the only way to keep customers information safe from hacker. It is best for customers to keep all of their personal information in safe place. They should also be careful and mindful of whom they give their name, age, and address to. When utilizing social media, make all profiles private.

References

e-book

Laudon, Kenneth. C. Laudon, Jane. P. (2014). Introduction to Human Resource Management

Retrieved from https://online.vitalsource.com/books/97812697403/pageid/0

M.U.S.E. Materials

American InterContinental University. (2017). Challenges and Security Issues

Retrieved from American InterContinental University Virtual Campus,

MGMT 305-1605B-05: https://mycampus.aiu-online.com/

intellipath

American InterContinental University. (2017). Unit title: Challenges and Security

Retrieved from American InterContinental University Virtual Campus, MGMT 305-1605B-05: https://mycampus.aiu-online.com/

Website Article – Author Not Listed

The University of Arizona (2017) Management Information System. Shaping the Future of IT

Retrieved from https://mis.eller.arizona.edu/what-is-mis

Website Article – Author Listed

Al Imran, A. (2015). A Study on Amazon

Retrieved from https://www.researchgate.net/publication/261440748_A_STUDY_ON_AMAZON_INFORMATION_SYSTEMS_BUSINESS_STRATEGIES_AND_e-CRM

Website Article – Author Listed

Kline, D. B. (2015). The Money Fool. Amazon’s Sustainable Competitive Advantage

Retrieved from https://www.fool.com/investing/general/2015/05/18/amazons-sustainable-competitive-advantage.aspx

Website Article – Author Listed

Zetter, K. (2009). Wired. Big-Box Breach: The Inside Story Of Walmart’s Hacker Attack

Retrieved from https://www.wired.com/2009/10/walmart-hack/

Website Article – Author Listed

Lewis, P. (20016, July). Mirror. Cyber crooks hack into Amazon accounts to place orders and steal the goods.

Retrieved from http://www.mirror.co.uk/news/uk-news/cyber-crooks-hack-amazon-accounts-8528512

...

Download:   txt (9.9 Kb)   pdf (53.2 Kb)   docx (15.4 Kb)  
Continue for 5 more pages »
Only available on Essays.club