Tuesday, May 5, 2020
Business Information System Ergonomics in Manufacturing
Question: Discuss about the Business Information System Ergonomics in Manufacturing. Answer: Introduction: August online technology company wants to increase the annual sales of the products. The company can increase its sales through various ways and methods. Social media is a new method that is being used by the organizations to create an impact on the consumers and increase the sales. Internet can be used in various ways to increase the ale such as online discussion, marketing and selling products online, use of social media to promote the product and getting valuable customer feedback (Einav et al. 2013). The organization uses the internet and social media in following ways to increase the sale: Publishing an impactful advertisement on social media sites and networks such as facebook, LinkedIn, and twitter will help the organization increase sale. This will help the company attract customers. Advertisement is helpful for the consumers as it helps in increasing awareness of the product. Before joining the social network, it is essential for the organizations to know the customer base. Facebook and Instagram are the best social sites to promote te products as it is the most widely used networks (Lenhart 2015). Internet not only helps in advertisement and promotion but also connects to the customers and establishes a relationship. A good relationship with customers will help the organization increase its sale due to the trust that it gains. Internet can also be used to know the strategies of the competitors so that the company can act and frame the policies accordingly. Internet can also be use for selling the products online. The company can indulge in e-commerce business that will in turn help the organization increase it sale (Shih et al. 2013). Network security risks and protection The datas that are available on the internet is not secure and can be hampered by the trackers of the data is not protected using the appropriate softwares. The products plan of the August online technology company can be hacked by the competitors to extract the information and can be used or its benefit. This affects the safety and privacy of the products. The competitors can launch the product before the launch by August online technology and it is only possible by extracting information through internet and other networks (Andres et al. 2012). Various tools and softwares are available that helps the organization protect its data and products. The company should use the e-commerce platform that is highly protected and uses a sophisticated object oriented programming language. The organization should ensure that it uses a secure internet connection. SSL that is the secure sockets layer should be authenticated in order to avoid leakage of information (Chen and Zhao 2012). The sensitive datas should not be stored in internet for security reasons. Enabling card verification system is essential if the network includes credit card transaction. Strong passwords should be set in order to avoid hacking of data. The more complex the login set up the more complex and difficult will it be for the hackers to hack the data (Zissis and Lekkas 2012). References Andres, S.G., Cole, D.M., Cummings, T.G., Garcia, R.R., Kenyon, B.M., Kurtz, G.R., McClure, S.C., Moore, C.W., O'dea, M.J. and Saruwatari, K.D., Mcafee, Inc., 2012.System and method of managing network security risks. U.S. Patent 8,201,257. Chen, D. and Zhao, H., 2012, March. Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Einav, L., Farronato, C., Levin, J.D. and Sundaresan, N., 2013.Sales Mechanisms in Online Markets: What Happened to Internet Auctions?(No. w19021). National Bureau of Economic Research. Lenhart, A., 2015. Teens, social media technology overview 2015.Pew Research Center,9. Shih, B.Y., Chen, C.Y. and Chen, Z.S., 2013. An empirical study of an internet marketing strategy for search engine optimization.Human Factors and Ergonomics in Manufacturing Service Industries,23(6), pp.528-540. Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues.Future Generation computer systems,28(3), pp.583-592.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.