Computer Criminals, IoT, CRM and Communication Methods for Organizations

Verified

Added on  2023/05/28

|10
|3100
|491
AI Summary
This article discusses different types of computer criminals, mitigation techniques, impact of IoT on organizations, negative impacts of IoT on daily life, benefits of CRM, QR code, and communication methods used for an organization. It also covers laws developed to address the issue of hacking and data breaching. The article provides expert advice on Desklib.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Enterprise Systems and Internet Technologies
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
1
Task 1:
(a) Different types of computer criminals
In the area of computer system there are numerous kinds of criminal faced by
organizations which are described below:
Denial of service attacks
Malware attack
Phishing scams
DOS attack
In the field of computer science, denial of service attack is a cyber-crime which occur
due to the use of unauthentic servers or network. Hacker’s uses botnet process to
produce traffic signals and transfer these on the consumer network system due to
which employees can lose their personal data (Jouini, Rabai, and Aissa, 2014). It is one
of the common criminal offences which are faced by many organization and consumers.
Mainly, hackers generate traffic signals and spam links with the help of malicious
software and transfer to the consumer network that reduces the performance of their
server. In the last five years, the rate of DDOS attack has increased by 45% and
thousands of computer devices were hacked by the criminals.
Malware attack
It is defined as software which is designed by hackers to damage the human-computer
system and servers. It blocks employee’s devices and hacks their private details like
login ID and password. In such kind of criminal offense, attackers produce a huge
amount of viruses and send to the victim by which they can easily access the devices of
users and lose their private details.
Phishing scams
The term phishing is defined as a form of fraud in which a criminal masquerades as a
reputable entity. Mainly, attackers utilize phishing mails in order to transfer malicious
links which can perform numerous functions for example account information. It is the
fraud attempt which is used by hackers to obtain the personal data or information of
consumers, for example, username, passwords, debit card number, and bank details. In
Document Page
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
2
the year 2016, the rate of phishing scam has increased by 44% because consumers and
employees used the unauthentic servers and spam links which are developed by the
attackers. In this criminal offense, attackers transfer the fraud and unwanted emails to
the organization and employees which create uncertainty in the system. With the help
of spam emails hacker identify and collect the bank account, credit, and debit card
numbers and other information.
There are many liver examples of such criminal offences due to which many users were
lost their personal information, for example, Facebook Cambridge analytica, Sony
PlayStation, GitHub, and many more. All these are real examples where companies were
faced the malware, DOS and phishing attacks.
(b) Mitigation
There are following steps can be used to avoid such kind of cyber-crimes:
Use firewall and antivirus
Adopt encryption and cryptography technique
Update software on a regular basis
Use only authentic servers (Buczak, and Guven, 2016).
Make sure the security tools are working properly
Block the spam and fraud emails from computer
Employees should ensure that they access their accounts in only authentic
networks
The organization should develop and implement security policies and motivate
their employees in order to handle criminal offenses
Employees can adopt backup plans to secure important data files from criminals
Make a weekly report regarding the criminal offense and identify the key factors
that increase the criminal offenses and attacks
Assist the risks and issues associated with the security tools and technique
The organization should configure the computer networks as per guidelines and
process to avoid the issue of conflict
For reducing malware, DOS, and phishing attacks companies should adopt
firewall and cryptography technologies
Document Page
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
3
Both firewall and cryptography have the potential to reduce the rate of criminal
offences. Moreover, the organizations should enable two step verification
processes which identify malware and traffic signals from the system.
There are following laws developed to address the issue of hacking and data breaching:
The Computer Misuse and Cybercrime Act of 2003
The Data Protection Act of 2017
The Information and Communication Technology Act of 2001
The computer misuse and cybercrime act was developed in the year 2003 that provides
complete information about cyber-crimes. This act was enacted to deliver for
repression of criminal activities and events perpetrated with the help of a computer
system. The main aim of this act is to analyse the criminal offences along with the risk
factors that increase the issue of cyber-attacks and improve the security of the
computer devices. In this act computer services involves data processing and the
storage of data along with the input and output data.
According to the Data Protection Act 2017 the data protection is a fundamental process
of today’s generation and the generation of better data protection technique contributes
to fostering consumers and organization trust. People should ensure that they use only
authentic networks that can help to protect their data and information from criminals.
The objective of this act is to deliver new legislation for controlling and managing the
private autonomy of data subjects by reducing the level of data breaching attacks.
In the Information and Communication Technology Act 2001 the access means access
by a consumer to the facilities and services of the licensee excluding communication for
the information and technology services. In this act information and communication
network means a network for the transmission of information or signals and involves a
communication server. Authorised officer means the officer designated as such under
section 25 of the Information and Communication Technology Act 2001. Therefore, by
applying this act company can control the issue of criminal offences and improve the
security of their private details.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
4
Task 2:
(a) Impact of IoT on an organization
IoT is an advanced information technology which is used by many organizations to
control and monitor a large computer network. It has the potential to transfer data or
information from one location to another. For example, Amazon and Wal-Mart
companies are using this for production optimizations, supply chain management, asset
tracking and management, financial decision making, and customer experience (Caron,
et al., 2016). It provides a platform to control computer networks and devices from any
location and organization can communicate with their clients easily by which they can
enhance their productivity. It has the potential to reduce cost and time and also improve
the security of consumer’s personal data by which companies can involve this approach
to improve efficiency and productivity. For example, organization design and implement
the IoT technology and management team uses this process to control and monitor their
work, products from any location. Therefore, they can easily manage the numbers of
tasks at a time which positively affect their productivity. If any hacker accesses their
accounts and controls their IoT mechanism they can lose their productivity.
(b) Negative impacts of IoT on daily life
In this modern era, the use of the internet is growing rapidly and many consumers use
internet connectivity to transfer and data but the main problem of IOT is that it reduces
the analysis power of adults. Due to which consumer does not care about their
neighbors and they can lose their personal data or information while using the internet
of thing technique. People can face the financial problem by using IoT technique
because hackers block their personal data and demand money to restore back. For
example, if any person uses IoT in daily life then he can suffer from the cyber-crimes or
data breach. It also increases the problem of vulnerabilities because most consumers
use third party applications which are developed by hackers by which their data can be
leaked. Therefore, people should use encryption, cryptography and firewall software in
order to avoid the issue of data breaching. It is observed that IoT uses wireless devices
and computer networks to connect two or more devices with each other. For which they
use internet connectivity if any problem occurs in the communication between the
consumer and organization which negatively impact on the personal data or consumer.
For connecting numbers of devices through IoT will result in the loss of jobs and this
Document Page
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
5
technology can negatively impact on the employment prospects of low educated
workers. For example, a consumer who evaluates the IoT will lose their job because
devices cannot only interconnect with each other but send that information to the
owner. Another example of this technology is that people can lose their data which can
increase financial problems because hackers demand money to restore back their
private details.
Task 3:
(a) Benefits of CRM
CRM is defined as customer relationship management technique which is used by many
companies to manage the relationship between consumers and stakeholders (Kumar,
and Srivastava, 2016). There are many advantages to this technology which are
described below:
Building a stronger relationship with consumers
One of the main aims of an organization is to build a strong relationship with their
consumer and CRM provide this opportunity to small and large business industries. It
provides a way to spend more time with their consumers. By using social media
networks and other communication systems a strong relationship can be achieved with
customers.
Increase the productivity of a sales team
By using this approach the productivity of a sales team can be increased and it handles
the communication gap between the consumers and the management team. For
example, CRM can help organizations reducing the communication gap between
customers and the sales team that increase their productivity.
Reduce cost
Customer relationship management team has the potential to reduce the operation and
equipment cost and improves efficiency and accuracy. Decreasing errors with orders
will reduce time consumption (San-Martín, Jiménez, and López-Catalán, 2016). A recent
study found that since CRM uses social media and advertising process it reduces paper
records on office premises and companies did not have to store consumers
communication which saves their costs.
Document Page
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
6
Better consumer relationship
With the help of CRM, process organizations can improve their relationship with their
clients and stakeholders. This process also enables consumers to forge a better
connection and a deeper relationship with customers. For example, companies can
provide 24x7 services to their customers through social media sites and other online
platforms which increase customer satisfaction and improve their loyalty towards the
company that improves customer relationships.
(b) QR code
The QR code is defined as a quick response code which is a two-dimensional code that
hat can hold thousands of alphanumeric characters of information. Their capability to
hold more data and their ease of utilizing create them practical for lesser businesses.
The main advantage of this technique is that it is the very fast process that holds more
information and people can easily link their personal details with QR code. The
potential of QR codes to link consumers with each other and to multimedia digital
content which is very valuable for businesses and consumers alike. Therefore, the QR
code supports business and consumer in order to better understand the products and
services. There are many applications of this technology, for example, sharing,
community, calls to action, quick pay, and data transfer which uses QR code. The QR
code also helps companies and consumer to better understating of the services because
the consumer can easily find the detail of their order or product by the scanning bar
code. There are many examples where consumers and businesses connected with the
QR code technology such as retail, travel, mobile transactions, and data transferring.
Task 4:
Communication methods used for an organization
Face-to-face communication
It is more effective communication approach that can be used for an organization that
interconnects two or more employees with each other. It is a method of choice for
transfers any kind of information with a strong emotional core. Zupic and Čater (2015)
evaluated that the face to face communication is one of the best approaches which can
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
7
be employees within an organization. Companies can find the skills and experience of
the employee with physical expressions.
Use presentation
The presentation is a platform where companies can share any information and
communicate with their employees. It is analysed that more employees grasp messages
and information with the help of pictures and sounds and companies can involve videos
in their presentation which can help for better understanding. Recent investigation
explained that with the help of power point presentation methods organization will
effectively share any important information with employees (Zupic and Čater, 2015). It
also provides an opportunity to refer back to it if employees are not clear about certain
things and process and it is a two way communication process by which organization
can collect the views of employees on certain tasks and problems.
Video chat
A video chat is one of the common methods used by companies for internal
communication purpose. Mainly, this process allows employees to interconnect with the
voice and video call by using internet connectivity. There are many examples of this tool
such as Zoom, Skype, and PowWowNow which allow multinational companies to handle
their operation in different countries by making sure that employees are able to share
relevant data with each other through video chat. These services are often free which
makes them a low cost option than comparing to actual phone calls which makes them
effective internal communication tool.
Emails
It is a written communication method which is used in business industries and
employees can use this step to share data or information with their colleagues. If any
employee does not pick call than the management team can send an e-mail on their
account by which they can solve any problem. It is a very common platform that uses by
the organizations and business industries to send and receive any information. It is
observed that many employees do not pick calls but they check their mails on a regular
basis so, an organization can involve this method in their communication by which they
can manage any task and problems.
Document Page
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
8
(b) Online presence
There are various kinds of steps by which online presence can be archived for an
organization for example, by using quiz to promote their products line, get more
reviews, communicate with consumers through social media, turn negativity into a
positive, access more of your target audience, beat the algorithms, and use advertising
websites. By using these options companies can generate revenue because online
presence increases the customer base of the company along with a positive brand
image. Many companies are using this concept to produce an online presence such as
Amazon, Google, Microsoft and many more. Moreover, companies can also use YouTube
for posting their advertisements which reach a global audience while generating
revenue because the company can monetize its videos. Companies can use SEO (search
engine optimization) to make sure that it is easier for customers to find them online
which makes it more likely for them to buy their services which generates revenue for
the company.
With the help of quiz, process organization can engage their consumers that help them
to generation the revenue and they can collect the views of clients with the help of the
review process. During the quiz, companies can advertise another branch which
generates revenue. Social media sites such as YouTube give their users money for every
time a video has been watched which generates revenue. With the help of SEO,
companies can generate more traffic on their online platform which increases the
chances of customers purchasing their services or products. It also assists in increasing
the numbers of times customers click on an advertisement posted on the web site of a
company which generates revenue because companies receive profit on each click.
Document Page
ENTERPRISE SYSTEMS AND INTERNET TECHNOLOGIES
9
References
Buczak, A.L. and Guven, E., (2016) A survey of data mining and machine learning
methods for cybersecurity intrusion detection. IEEE Communications Surveys &
Tutorials, 18(2), pp.1153-1176.
Caron, X., Bosua, R., Maynard, S.B. and Ahmad, A., (2016) The Internet of Things (IoT)
and its impact on individual privacy: An Australian perspective. Computer law & security
review, 32(1), pp.4-15.
Jouini, M., Rabai, L.B.A. and Aissa, A.B., (2014) Classification of security threats in
information systems. Procedia Computer Science, 32(2), pp.489-496.
Kumar, S. and Srivastava, M., (2016) A Critical Review On Perception & Benefits Of
Customer Relationship Management (CRM) System In Indian Private
Hospitals. Adhyayan,13(2), p.21.
San-Martín, S., Jiménez, N.H. and López-Catalán, B., (2016) The firm benefits of mobile
CRM from the relationship marketing approach and the TOE model. The Spanish journal
of marketing-ESIC, 20(1), pp.18-29.
Zupic, I. and Čater, T., (2015) Bibliometric methods in management and
organization. Organizational Research Methods, 18(3), pp.429-472.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]