Creative Action in International Organizations: Cybersecurity & Online Crime
VerifiedAdded on 2023/04/21
|18
|3895
|63
AI Summary
This report discusses the feasibility of K7 Total Security in small International enterprises in terms of cyber security. It explores the need for security software, ideas for acquiring it, market focus, thought process behind innovation, and a plan for transforming ideas into actions. The report also includes a discussion on the Diamond process model, problem/opportunity mapping, and value chain analysis.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: MANAGEMENT
Creative action in international organizations: Cybersecurity & online crime
Name of the student:
Name of the university:
Author note:
Creative action in international organizations: Cybersecurity & online crime
Name of the student:
Name of the university:
Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
MANAGEMENT
Executive summary
Value proposition is effective for assessing the feasibility of the plans in terms of the
identified requirements. This can be conducted through the means of product life cycle.
Opportunity mapping is also helpful in terms of scaling the sources, through which the
product would be acquired. Diamond model process is the most relevant in the case of
cybercrimes in the International enterprises. This is in terms of the loss of confidential data
and financial statement, which the report attempts to project. Communications with the
research and development team is fruitful in terms of conducting product differentiation
through the advent of innovation within the design of the software. Strategic approach is
beneficial in increasing the trafficking of the audience, expanding the scope and arena of the
entrepreneur business.
MANAGEMENT
Executive summary
Value proposition is effective for assessing the feasibility of the plans in terms of the
identified requirements. This can be conducted through the means of product life cycle.
Opportunity mapping is also helpful in terms of scaling the sources, through which the
product would be acquired. Diamond model process is the most relevant in the case of
cybercrimes in the International enterprises. This is in terms of the loss of confidential data
and financial statement, which the report attempts to project. Communications with the
research and development team is fruitful in terms of conducting product differentiation
through the advent of innovation within the design of the software. Strategic approach is
beneficial in increasing the trafficking of the audience, expanding the scope and arena of the
entrepreneur business.
2
MANAGEMENT
Table of contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
Overview of the situation.......................................................................................................3
Needful action........................................................................................................................4
Ideas for acquiring the security software...............................................................................5
Market focus...........................................................................................................................6
Thought process behind innovation.......................................................................................8
Plan for transforming the ideas into actions...........................................................................8
Diamond process model.....................................................................................................9
Problem/Opportunity Map.................................................................................................9
Value chain analysis.............................................................................................................11
Recommendations....................................................................................................................12
Conclusion................................................................................................................................14
References................................................................................................................................15
Bibliography.............................................................................................................................16
MANAGEMENT
Table of contents
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
Overview of the situation.......................................................................................................3
Needful action........................................................................................................................4
Ideas for acquiring the security software...............................................................................5
Market focus...........................................................................................................................6
Thought process behind innovation.......................................................................................8
Plan for transforming the ideas into actions...........................................................................8
Diamond process model.....................................................................................................9
Problem/Opportunity Map.................................................................................................9
Value chain analysis.............................................................................................................11
Recommendations....................................................................................................................12
Conclusion................................................................................................................................14
References................................................................................................................................15
Bibliography.............................................................................................................................16
3
MANAGEMENT
Introduction
Management of the business activities is crucial in terms of ensuring its smooth
functioning. Managerial activities are also necessary for averting the criminal activities,
which results in the loss of properties and the systems. In the present competitive era of the
market, the business operations are dependent on the systems. This is in terms of adding
automation into the processes, reducing the manual labour. Advancements have entered in the
information technology in the form of cloud computing, software and various apps, easing
the convenience of the businesspersons in enhancing the efficiency in the business (Shalley
and Gilson 2017). However, cybercrimes have compelled the personnel to encounter loss of
data, stalling the productivity. This alarming situation necessitates the need of security
software, which would be flexible and helps in maintaining the confidentiality and privacy of
the data and financial statements. This report attempts to shed light on the feasibility of K7
Total Security in the small International enterprises in terms of cyber security.
Discussion
Overview of the situation
Small International enterprises are on their developing stage, when the business
strategies need to be strong and flexible. Tactful approach is beneficial in terms of averting
wrong decisions. However, Cropley (2016), points out that most of the International
enterprises end up experiencing tough competition from the established brands. This is in
terms of improper approach towards conducting the marketing activities, which compels
them to experience a downmarket scenario. This situation adds an interrogative parameter
into their establishment in the market.
MANAGEMENT
Introduction
Management of the business activities is crucial in terms of ensuring its smooth
functioning. Managerial activities are also necessary for averting the criminal activities,
which results in the loss of properties and the systems. In the present competitive era of the
market, the business operations are dependent on the systems. This is in terms of adding
automation into the processes, reducing the manual labour. Advancements have entered in the
information technology in the form of cloud computing, software and various apps, easing
the convenience of the businesspersons in enhancing the efficiency in the business (Shalley
and Gilson 2017). However, cybercrimes have compelled the personnel to encounter loss of
data, stalling the productivity. This alarming situation necessitates the need of security
software, which would be flexible and helps in maintaining the confidentiality and privacy of
the data and financial statements. This report attempts to shed light on the feasibility of K7
Total Security in the small International enterprises in terms of cyber security.
Discussion
Overview of the situation
Small International enterprises are on their developing stage, when the business
strategies need to be strong and flexible. Tactful approach is beneficial in terms of averting
wrong decisions. However, Cropley (2016), points out that most of the International
enterprises end up experiencing tough competition from the established brands. This is in
terms of improper approach towards conducting the marketing activities, which compels
them to experience a downmarket scenario. This situation adds an interrogative parameter
into their establishment in the market.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
MANAGEMENT
Needful action
In terms of setting their business, the International enterprises need to come up with
something innovative. Herein lays the appropriateness of strategic management. Within this,
mention can be made of segmenting the approach into Opportunity, Creation and
Innovation. For this, the actions need to be leader like. As a matter of specification, Serrat
(2017) is of the view that the International enterprises need to think of security software,
which would be something unique.
Fig 1: Opportunity, creativity and innovation
(Source: Cohendet, Parmentier and Simon 2017)
If the managers practice participative leadership style, the members would get a
chance to share their ideas about the new security software, K7 Total Security. Combination
MANAGEMENT
Needful action
In terms of setting their business, the International enterprises need to come up with
something innovative. Herein lays the appropriateness of strategic management. Within this,
mention can be made of segmenting the approach into Opportunity, Creation and
Innovation. For this, the actions need to be leader like. As a matter of specification, Serrat
(2017) is of the view that the International enterprises need to think of security software,
which would be something unique.
Fig 1: Opportunity, creativity and innovation
(Source: Cohendet, Parmentier and Simon 2017)
If the managers practice participative leadership style, the members would get a
chance to share their ideas about the new security software, K7 Total Security. Combination
5
MANAGEMENT
of several ideas would act assistance in reaching to the appropriate. Indulging in discussions
with the engineers would help in adding innovative design to the software. Once the
responses start flooding in, the managers would be able to assess the prospective sources,
through which value can be generated.
Ideas for acquiring the security software
The ideas for acquiring change pops out from a problem, negative results from a
product or service, media stories, projects, events, charity purpose or just for the sake of
altering the business scenario. All of these aspects seem true for an enterprise. According to
the opinions of Henriksen, Mishra and Fisser (2016), as their business is on a raw stage,
negative results from the products and services can be one of the reasons behind the plans to
acquire new products. However, innovation in the existing products can also be beneficial in
terms of luring more customers. In this, the schemes of charity might be an innovative
opportunity in terms of strengthening the financial resources. In this context, problems in
security the data gains more weightage for the International enterprises in terms of adopting
k7 Total Security Software.
Sorting the ideas would be beneficial in terms of ensuring whether it aligns with the
identified needs and requirements. This can be done through an integrated process:
MANAGEMENT
of several ideas would act assistance in reaching to the appropriate. Indulging in discussions
with the engineers would help in adding innovative design to the software. Once the
responses start flooding in, the managers would be able to assess the prospective sources,
through which value can be generated.
Ideas for acquiring the security software
The ideas for acquiring change pops out from a problem, negative results from a
product or service, media stories, projects, events, charity purpose or just for the sake of
altering the business scenario. All of these aspects seem true for an enterprise. According to
the opinions of Henriksen, Mishra and Fisser (2016), as their business is on a raw stage,
negative results from the products and services can be one of the reasons behind the plans to
acquire new products. However, innovation in the existing products can also be beneficial in
terms of luring more customers. In this, the schemes of charity might be an innovative
opportunity in terms of strengthening the financial resources. In this context, problems in
security the data gains more weightage for the International enterprises in terms of adopting
k7 Total Security Software.
Sorting the ideas would be beneficial in terms of ensuring whether it aligns with the
identified needs and requirements. This can be done through an integrated process:
6
MANAGEMENT
Fig 2: The idea process
(Source: Cruickshank 2016)
At the initial stage, need analysis would be crucial in terms of gaining an insight into
the need and urgency of security. This results in the generation of ideas regarding the
adoption of security software like k7 Total Security. As a sequential step, screening and
development of the software would be fruitful in terms of checking its proper functioning.
Offshore marketing would be helpful in enriching the scope and arena of the business.
Finally, after consistent lab tests and quality controls, the software can be purchased.
Market focus
Assessing the potential markets would be important for the technology brands. In this,
the typical components are value proposition, growth and development along with
accessibility. Adams and Makramalla (2015) states that the next step is segmenting the target
audience, that is, the entrepreneurs, as they are the easy targets of hackers due to lack of
antivirus. This is because they are in need of the security software for storing the data in a
secured manner. However, the brands would be able to enjoy higher competitive advantage
as the entrepreneurs would not have high decision making factors. They just need a solution,
which would help in securing the data. On the contrary, convergent thinking would turn the
ideas into opportunities for the International enterprises. Market research enrich their
knowledge regarding adopting the strategies of product differentiation for altering the
business dynamics.
In terms of value proposition, Cui (2016) points that DIFA model can be adopted by
the entrepreneurs. The components of this model are demand, innovation, feasibility and
attraction. Researching about k7 Total Security Software would help the entrepreneurs in
realizing the customers’ need and their actual potential to fulfil those needs. For bringing
MANAGEMENT
Fig 2: The idea process
(Source: Cruickshank 2016)
At the initial stage, need analysis would be crucial in terms of gaining an insight into
the need and urgency of security. This results in the generation of ideas regarding the
adoption of security software like k7 Total Security. As a sequential step, screening and
development of the software would be fruitful in terms of checking its proper functioning.
Offshore marketing would be helpful in enriching the scope and arena of the business.
Finally, after consistent lab tests and quality controls, the software can be purchased.
Market focus
Assessing the potential markets would be important for the technology brands. In this,
the typical components are value proposition, growth and development along with
accessibility. Adams and Makramalla (2015) states that the next step is segmenting the target
audience, that is, the entrepreneurs, as they are the easy targets of hackers due to lack of
antivirus. This is because they are in need of the security software for storing the data in a
secured manner. However, the brands would be able to enjoy higher competitive advantage
as the entrepreneurs would not have high decision making factors. They just need a solution,
which would help in securing the data. On the contrary, convergent thinking would turn the
ideas into opportunities for the International enterprises. Market research enrich their
knowledge regarding adopting the strategies of product differentiation for altering the
business dynamics.
In terms of value proposition, Cui (2016) points that DIFA model can be adopted by
the entrepreneurs. The components of this model are demand, innovation, feasibility and
attraction. Researching about k7 Total Security Software would help the entrepreneurs in
realizing the customers’ need and their actual potential to fulfil those needs. For bringing
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
MANAGEMENT
innovation into the products and services, the entrepreneurs can conduct Product Life Cycle
of k7 Total Security SOFTWARE.
Fig 4: Propose product life cycle for k7 Total Security Software in the International
enterprises
(Source: Prepared by the researcher)
Discussion on the product life cycle would enhance the awareness of the
entrepreneurs about the innovation needed in the software. Involving the stakeholders and
shareholders in these discussions would be beneficial in assessing the feasibility of the
software in terms of securing their data as well as the confidential business codes and
financial statements. Maturation of the ideas into the positive response of the customers
would reflect the attraction levels. Considering the demand supply curve would be beneficial
in terms of mapping the needs, demands and requirements of the clients and the customers.
Surveys and feedbacks would expand the thought processes behind transforming the ideas
into practice (Zhuhadar et al. 2017).
MANAGEMENT
innovation into the products and services, the entrepreneurs can conduct Product Life Cycle
of k7 Total Security SOFTWARE.
Fig 4: Propose product life cycle for k7 Total Security Software in the International
enterprises
(Source: Prepared by the researcher)
Discussion on the product life cycle would enhance the awareness of the
entrepreneurs about the innovation needed in the software. Involving the stakeholders and
shareholders in these discussions would be beneficial in assessing the feasibility of the
software in terms of securing their data as well as the confidential business codes and
financial statements. Maturation of the ideas into the positive response of the customers
would reflect the attraction levels. Considering the demand supply curve would be beneficial
in terms of mapping the needs, demands and requirements of the clients and the customers.
Surveys and feedbacks would expand the thought processes behind transforming the ideas
into practice (Zhuhadar et al. 2017).
8
MANAGEMENT
For creating value, the entrepreneurs need to categorise the idea. Radical and
convergent thinking would be appropriate in terms of achieving positive outcomes. Software
would belong to the category of technology. In this, indication of the non-financial indicators,
like physical and human resources would help in preparation of the budget behind purchasing
the software. Opportunity map would be assistance in terms of generating value on the basis
of both the financial and non-financial resources.
Thought process behind innovation
At the initial stages, the business of the entrepreneurs lacks stability due to proper
approach, design and strategy. However, in order to maintain the competitive pace, they
envision quick success, which is not always the case. The immediate result is customer
turnover, resulting in loss. As per the arguments of Gretter and Yadav (2016), in order to
avert these situations, creativity and innovation is needed. Reference can be cited of
divergent and convergent thinking, which unleashes the imaginative power of the
entrepreneurs. Divergent thinking helps in expanding the scope and arena of the thought
processes. This is due to the collection of different and wide ranging ideas regarding
upgrading the cyber security through software. Market research on k7 Total Security
Software would help the managers to explore the opportunities for enhancing the security of
the confidential data.
On the other hand, convergent thinking eases the process of selecting the appropriate
solution from the available alternatives. Indulging in meeting with the members of the
research and development team would be beneficial in generating plans for preparing the
budget, resource allocation and monitoring (Janssen et al. 2017).
MANAGEMENT
For creating value, the entrepreneurs need to categorise the idea. Radical and
convergent thinking would be appropriate in terms of achieving positive outcomes. Software
would belong to the category of technology. In this, indication of the non-financial indicators,
like physical and human resources would help in preparation of the budget behind purchasing
the software. Opportunity map would be assistance in terms of generating value on the basis
of both the financial and non-financial resources.
Thought process behind innovation
At the initial stages, the business of the entrepreneurs lacks stability due to proper
approach, design and strategy. However, in order to maintain the competitive pace, they
envision quick success, which is not always the case. The immediate result is customer
turnover, resulting in loss. As per the arguments of Gretter and Yadav (2016), in order to
avert these situations, creativity and innovation is needed. Reference can be cited of
divergent and convergent thinking, which unleashes the imaginative power of the
entrepreneurs. Divergent thinking helps in expanding the scope and arena of the thought
processes. This is due to the collection of different and wide ranging ideas regarding
upgrading the cyber security through software. Market research on k7 Total Security
Software would help the managers to explore the opportunities for enhancing the security of
the confidential data.
On the other hand, convergent thinking eases the process of selecting the appropriate
solution from the available alternatives. Indulging in meeting with the members of the
research and development team would be beneficial in generating plans for preparing the
budget, resource allocation and monitoring (Janssen et al. 2017).
9
MANAGEMENT
Plan for transforming the ideas into actions
Action plans would be effective for the entrepreneurs in terms of strengthening the
business strategies. Preparing rough drafts and sharing it with the clients and the customers
would be beneficial in assessing its effectiveness in terms of the identified and specified
requirements. Analytical tools would act assistance for the entrepreneurs to assess whether
value is generated through the actions.
Diamond process model
Typical mention can be made of Diamond model process, which would help in
delving deeper into the roots of the problem and delivering value through the means of
effective solutions. The issue of cybercrime is at the centre of the businesses of International
enterprises, stalling the productivity. Adherence to the structure of Discover, Define, Develop
and Deliver would act as an agent in terms of valuing the purchasing power of the customers.
Fig 5: Double diamond model process for k7 Total Security Software
(Source: Created by the researcher)
Cybercrim
e
Discover
(research on k7
Total Security
Software
Define (Idea
generation on
acquiring the
security)
Develop
(communicatio
n with R&D
team and
Deliver (Product
life cycle of k7
Total Security
Software for
generating value
on the investments
of the clients and
the custromers
MANAGEMENT
Plan for transforming the ideas into actions
Action plans would be effective for the entrepreneurs in terms of strengthening the
business strategies. Preparing rough drafts and sharing it with the clients and the customers
would be beneficial in assessing its effectiveness in terms of the identified and specified
requirements. Analytical tools would act assistance for the entrepreneurs to assess whether
value is generated through the actions.
Diamond process model
Typical mention can be made of Diamond model process, which would help in
delving deeper into the roots of the problem and delivering value through the means of
effective solutions. The issue of cybercrime is at the centre of the businesses of International
enterprises, stalling the productivity. Adherence to the structure of Discover, Define, Develop
and Deliver would act as an agent in terms of valuing the purchasing power of the customers.
Fig 5: Double diamond model process for k7 Total Security Software
(Source: Created by the researcher)
Cybercrim
e
Discover
(research on k7
Total Security
Software
Define (Idea
generation on
acquiring the
security)
Develop
(communicatio
n with R&D
team and
Deliver (Product
life cycle of k7
Total Security
Software for
generating value
on the investments
of the clients and
the custromers
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
MANAGEMENT
Problem/Opportunity Map
Based on the developed idea of acquiring k7 Total Security Software, mapping can be
done for assuring whether it would generate further problems or act as an opportunity for
upgrading the standards and quality of security in the International enterprises.
Fig 3: Problem/Opportunity Map
(Source: )
This mapping is important in terms of assessing whether the developed idea of
acquiring k7 Total Security Software aligns with the generation of value for the clients and
the customers. This is because it is their security, which the International enterprises are
aiming for the increasing the sales revenue and the profit margin. In this, the communication
channels are important for getting the authentic information. Social media and emails can be
effective for establishing communication with the R&D team and the engineers. Within these
conversations, budgets are a vital factor in terms of averting any discrepancies in the actual
process of transactions. Along with this, confirmation needs to be produced regarding the
time of purchase and the location in which the software is to be delivered. This confirmation
Idea (to adopt
k7 Total
Security
Problem (loss of the secret and
confidential codes and financial
statements
Innovation (improving
the design of the
software)
How (through meetings
with the R&D team and
engineers)
Who (Data of the
clients and the
customers would
be secured)
MANAGEMENT
Problem/Opportunity Map
Based on the developed idea of acquiring k7 Total Security Software, mapping can be
done for assuring whether it would generate further problems or act as an opportunity for
upgrading the standards and quality of security in the International enterprises.
Fig 3: Problem/Opportunity Map
(Source: )
This mapping is important in terms of assessing whether the developed idea of
acquiring k7 Total Security Software aligns with the generation of value for the clients and
the customers. This is because it is their security, which the International enterprises are
aiming for the increasing the sales revenue and the profit margin. In this, the communication
channels are important for getting the authentic information. Social media and emails can be
effective for establishing communication with the R&D team and the engineers. Within these
conversations, budgets are a vital factor in terms of averting any discrepancies in the actual
process of transactions. Along with this, confirmation needs to be produced regarding the
time of purchase and the location in which the software is to be delivered. This confirmation
Idea (to adopt
k7 Total
Security
Problem (loss of the secret and
confidential codes and financial
statements
Innovation (improving
the design of the
software)
How (through meetings
with the R&D team and
engineers)
Who (Data of the
clients and the
customers would
be secured)
11
MANAGEMENT
would act assistance for the suppliers to assess whether the order is ready and there is
adequate transport logistics for delivering the order. Intimating the International enterprises
about the delivery is important in terms of averting communication gaps.
Value chain analysis
Through value chain analysis, the International enterprises would be able to identify
the primary and supportive activities, which would attach value to the final product, k7 Total
Security Software. Reduction of the operational costs and increasing product differentiation
would be an agent in terms of attracting more customers.
Primary activities
Inbound logistics- assessing the resources and capabilities for acquiring the software
Operations- researching about the security software, which would generate greater
value
Outbound logistics- Offshore marketing for establishing contact with the technology
suppliers
Marketing & sales- Communicating with the marketing and sales team for
developing budget
Service- Survey and feedbacks on the levied strategies
Supporting activities
Firm infrastructure- Proper facilities for conducting meetings and discussions
Human resource management- skilled and qualified workers, quality raw materials
Procurement- contacting the suppliers for acquiring additional spare parts for the
software
MANAGEMENT
would act assistance for the suppliers to assess whether the order is ready and there is
adequate transport logistics for delivering the order. Intimating the International enterprises
about the delivery is important in terms of averting communication gaps.
Value chain analysis
Through value chain analysis, the International enterprises would be able to identify
the primary and supportive activities, which would attach value to the final product, k7 Total
Security Software. Reduction of the operational costs and increasing product differentiation
would be an agent in terms of attracting more customers.
Primary activities
Inbound logistics- assessing the resources and capabilities for acquiring the software
Operations- researching about the security software, which would generate greater
value
Outbound logistics- Offshore marketing for establishing contact with the technology
suppliers
Marketing & sales- Communicating with the marketing and sales team for
developing budget
Service- Survey and feedbacks on the levied strategies
Supporting activities
Firm infrastructure- Proper facilities for conducting meetings and discussions
Human resource management- skilled and qualified workers, quality raw materials
Procurement- contacting the suppliers for acquiring additional spare parts for the
software
12
MANAGEMENT
Technology- Flexible internet connection, networks with bulk storing and processing
facilities
Recommendations
Training the staffs about the usage of the software would help in avert the
misutilization of the systems and properties. Incorporating Data Protection Act (1998)
would be a wise step in this direction. Along with this, Computer Misuse Act would
reduce the delays in the supplies. Consciousness and rationality in this approach
would maintain the stability in the relationship with the clients and customers. Post
training tests would be effective for the International enterprises managers to assess
the capability of the staffs in making practical application of the learnt skills in
executing the allocated duties and responsibilities.
Revising the recruitment and selection would be beneficial in terms of creating a
strong and flexible team. Lucrative promotional offers would lure the candidates to
invest their talents in the International enterprises. Typical example of this can be the
provision of laptops with anti-virus installed, flexible working conditions and virtual
learning opportunities among others.
Sending drafts to the managers regarding the proposed plans would be beneficial in
terms of aligning the actions with the plans. Signed approvals on the drafts would be
crucial in terms of averting any illegal instances.
Holding frequent meetings with the higher authorities would be effective in terms of
updating on the need for acquiring additional resources like spare parts of the
software. Minute of the meetings would be helpful for making estimations about the
future courses of actions.
MANAGEMENT
Technology- Flexible internet connection, networks with bulk storing and processing
facilities
Recommendations
Training the staffs about the usage of the software would help in avert the
misutilization of the systems and properties. Incorporating Data Protection Act (1998)
would be a wise step in this direction. Along with this, Computer Misuse Act would
reduce the delays in the supplies. Consciousness and rationality in this approach
would maintain the stability in the relationship with the clients and customers. Post
training tests would be effective for the International enterprises managers to assess
the capability of the staffs in making practical application of the learnt skills in
executing the allocated duties and responsibilities.
Revising the recruitment and selection would be beneficial in terms of creating a
strong and flexible team. Lucrative promotional offers would lure the candidates to
invest their talents in the International enterprises. Typical example of this can be the
provision of laptops with anti-virus installed, flexible working conditions and virtual
learning opportunities among others.
Sending drafts to the managers regarding the proposed plans would be beneficial in
terms of aligning the actions with the plans. Signed approvals on the drafts would be
crucial in terms of averting any illegal instances.
Holding frequent meetings with the higher authorities would be effective in terms of
updating on the need for acquiring additional resources like spare parts of the
software. Minute of the meetings would be helpful for making estimations about the
future courses of actions.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13
MANAGEMENT
Consistent meetings with the R&D team and engineers would be crucial in terms of
adding innovation into the software. Within this, product life cycle would enable the
entrepreneurs in assessing the shelf life of the software. This assessment is further
assistance in terms of detecting the channels through which value can be generated.
After purchasing the software, tests and experiments need to be conducted
immediately. This is in terms of getting deceived through the supply of poor quality
software. Upon detecting problems, immediate response is needed in terms of getting
the product replaced. This immediacy would reduce further delays in performing the
operations. Therefore, in order to avoid such situations, proper time management
needs to be applied.
Consistent evaluations are needed for the software in terms of detecting the presence
of any defects. This can be done through lab tests and quality controls. For this,
assistance from the experts is a wise step for safeguarding the situation from getting
more complicated.
Constant follow ups from the clients and customers are needed for assuring that they
have proper access to the software usage. In case of complaints regarding data loss,
immediate legislative actions need to be undertaken. This would act as a
compensation for the lost properties and honour. If there are no back up plans and
options, the lost data cannot be retrieved. For averting such situations, the customers
need to be warned regarding the disclosure of private details. The facility of locking
the details through passwords would be a wise step in terms of securing the
confidential codes and financial statements.
Survey and feedback from the customers would be effective for innovating the design
and outlook of the software. If it is sleek in its design, with small size, the users can
MANAGEMENT
Consistent meetings with the R&D team and engineers would be crucial in terms of
adding innovation into the software. Within this, product life cycle would enable the
entrepreneurs in assessing the shelf life of the software. This assessment is further
assistance in terms of detecting the channels through which value can be generated.
After purchasing the software, tests and experiments need to be conducted
immediately. This is in terms of getting deceived through the supply of poor quality
software. Upon detecting problems, immediate response is needed in terms of getting
the product replaced. This immediacy would reduce further delays in performing the
operations. Therefore, in order to avoid such situations, proper time management
needs to be applied.
Consistent evaluations are needed for the software in terms of detecting the presence
of any defects. This can be done through lab tests and quality controls. For this,
assistance from the experts is a wise step for safeguarding the situation from getting
more complicated.
Constant follow ups from the clients and customers are needed for assuring that they
have proper access to the software usage. In case of complaints regarding data loss,
immediate legislative actions need to be undertaken. This would act as a
compensation for the lost properties and honour. If there are no back up plans and
options, the lost data cannot be retrieved. For averting such situations, the customers
need to be warned regarding the disclosure of private details. The facility of locking
the details through passwords would be a wise step in terms of securing the
confidential codes and financial statements.
Survey and feedback from the customers would be effective for innovating the design
and outlook of the software. If it is sleek in its design, with small size, the users can
14
MANAGEMENT
insert it in their laptops and continue with their work from any location without
fearing about hacking.
Conclusion
In terms of ceasing the cybercrimes, security software is an effective option for the
International enterprises. This is because they need to store their data and financial statements
in secured manner. However, strategic planning is helpful in terms of gaining trust, assurance
and reliance from the clients and the customers. Application of opportunity map would
enhance the awareness about the areas, through which k7 Total Security Software can reach
to their workplace. Diamond model process would also be effective in terms of delving
deeper into the issue of cybercrime and deliver value through the provision of antivirus with
modern features installed. Follow ups from the customers would help in assessing its
feasibility in terms of securing the private and confidential codes and financial statements.
MANAGEMENT
insert it in their laptops and continue with their work from any location without
fearing about hacking.
Conclusion
In terms of ceasing the cybercrimes, security software is an effective option for the
International enterprises. This is because they need to store their data and financial statements
in secured manner. However, strategic planning is helpful in terms of gaining trust, assurance
and reliance from the clients and the customers. Application of opportunity map would
enhance the awareness about the areas, through which k7 Total Security Software can reach
to their workplace. Diamond model process would also be effective in terms of delving
deeper into the issue of cybercrime and deliver value through the provision of antivirus with
modern features installed. Follow ups from the customers would help in assessing its
feasibility in terms of securing the private and confidential codes and financial statements.
15
MANAGEMENT
References
Adams, M. and Makramalla, M., 2015. Cybersecurity skills training: an attacker-centric
gamified approach. Technology Innovation Management Review, 5(1).
Cohendet, P., Parmentier, G. and Simon, L., 2017. 13. Managing knowledge, creativity and
innovation. The Elgar companion to innovation and knowledge creation, p.197.
Cropley, D.H., 2016. Creativity in engineering. In Multidisciplinary contributions to the
science of creative thinking (pp. 155-173). Springer, Singapore.
Cruickshank, L., 2016. Open Design and Innovation: facilitating creativity in everyone.
Routledge.
Cui, X., 2016. The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-
68). Palgrave Macmillan, London.
Gretter, S. and Yadav, A., 2016. Computational thinking and media & information literacy:
An integrated approach to teaching twenty-first century skills. TechTrends, 60(5), pp.510-
516.
Henriksen, D., Mishra, P. and Fisser, P., 2016. Infusing Creativity and Technology in 21st
Century Education: A Systemic View for Change. Journal of Educational Technology &
Society, 19(3).
Janssen, M., Konopnicki, D., Snowdon, J.L. and Ojo, A., 2017. Driving public sector
innovation using big and open linked data (BOLD). Information systems frontiers, 19(2),
pp.189-195.
Serrat, O., 2017. Harnessing creativity and innovation in the workplace. In Knowledge
Solutions (pp. 903-910). Springer, Singapore.
MANAGEMENT
References
Adams, M. and Makramalla, M., 2015. Cybersecurity skills training: an attacker-centric
gamified approach. Technology Innovation Management Review, 5(1).
Cohendet, P., Parmentier, G. and Simon, L., 2017. 13. Managing knowledge, creativity and
innovation. The Elgar companion to innovation and knowledge creation, p.197.
Cropley, D.H., 2016. Creativity in engineering. In Multidisciplinary contributions to the
science of creative thinking (pp. 155-173). Springer, Singapore.
Cruickshank, L., 2016. Open Design and Innovation: facilitating creativity in everyone.
Routledge.
Cui, X., 2016. The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-
68). Palgrave Macmillan, London.
Gretter, S. and Yadav, A., 2016. Computational thinking and media & information literacy:
An integrated approach to teaching twenty-first century skills. TechTrends, 60(5), pp.510-
516.
Henriksen, D., Mishra, P. and Fisser, P., 2016. Infusing Creativity and Technology in 21st
Century Education: A Systemic View for Change. Journal of Educational Technology &
Society, 19(3).
Janssen, M., Konopnicki, D., Snowdon, J.L. and Ojo, A., 2017. Driving public sector
innovation using big and open linked data (BOLD). Information systems frontiers, 19(2),
pp.189-195.
Serrat, O., 2017. Harnessing creativity and innovation in the workplace. In Knowledge
Solutions (pp. 903-910). Springer, Singapore.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16
MANAGEMENT
Shalley, C.E. and Gilson, L.L., 2017. Creativity and the management of technology:
Balancing creativity and standardization. Production and Operations Management, 26(4),
pp.605-616.
Zhuhadar, L., Thrasher, E., Marklin, S. and de Pablos, P.O., 2017. The next wave of
innovation—Review of smart cities intelligent operation systems. Computers in Human
Behavior, 66, pp.273-281.
Bibliography
Chayko, M., 2017. Superconnected: The internet, digital media, and techno-social life. Sage
Publications.
Clay, A. and Phillips, K.M., 2016. The Misfit Economy: Lessons in Creativity from Pirates,
Hackers, Gangsters and Other Informal Entrepreneurs. Simon and Schuster.
Cohen, B., Almirall, E. and Chesbrough, H., 2016. The city as a lab: Open innovation meets
the collaborative economy. California Management Review, 59(1), pp.5-13.
Helbing, D., Frey, B.S., Gigerenzer, G., Hafen, E., Hagner, M., Hofstetter, Y., Van Den
Hoven, J., Zicari, R.V. and Zwitter, A., 2019. Will democracy survive big data and artificial
intelligence?. In Towards Digital Enlightenment (pp. 73-98). Springer, Cham.
Hunter, D., 2017. Cyberspace as Place and the Tragedy of the Digital Anticommons. In Law
and Society Approaches to Cyberspace (pp. 59-139). Routledge.
Mueller, J., Melwani, S., Loewenstein, J. and Deal, J.J., 2018. Reframing the decision-
makers’ dilemma: Towards a social context model of creative idea recognition. Academy of
Management Journal, 61(1), pp.94-110.
MANAGEMENT
Shalley, C.E. and Gilson, L.L., 2017. Creativity and the management of technology:
Balancing creativity and standardization. Production and Operations Management, 26(4),
pp.605-616.
Zhuhadar, L., Thrasher, E., Marklin, S. and de Pablos, P.O., 2017. The next wave of
innovation—Review of smart cities intelligent operation systems. Computers in Human
Behavior, 66, pp.273-281.
Bibliography
Chayko, M., 2017. Superconnected: The internet, digital media, and techno-social life. Sage
Publications.
Clay, A. and Phillips, K.M., 2016. The Misfit Economy: Lessons in Creativity from Pirates,
Hackers, Gangsters and Other Informal Entrepreneurs. Simon and Schuster.
Cohen, B., Almirall, E. and Chesbrough, H., 2016. The city as a lab: Open innovation meets
the collaborative economy. California Management Review, 59(1), pp.5-13.
Helbing, D., Frey, B.S., Gigerenzer, G., Hafen, E., Hagner, M., Hofstetter, Y., Van Den
Hoven, J., Zicari, R.V. and Zwitter, A., 2019. Will democracy survive big data and artificial
intelligence?. In Towards Digital Enlightenment (pp. 73-98). Springer, Cham.
Hunter, D., 2017. Cyberspace as Place and the Tragedy of the Digital Anticommons. In Law
and Society Approaches to Cyberspace (pp. 59-139). Routledge.
Mueller, J., Melwani, S., Loewenstein, J. and Deal, J.J., 2018. Reframing the decision-
makers’ dilemma: Towards a social context model of creative idea recognition. Academy of
Management Journal, 61(1), pp.94-110.
17
MANAGEMENT
Piercy, N.F., 2016. Market-led strategic change: Transforming the process of going to
market. Routledge.
Santos, R.B., 2016. Crime analysis with crime mapping. Sage publications.
Willits, D. and Nowacki, J., 2016. The use of specialized cybercrime policing units: An
organizational analysis. Criminal justice studies, 29(2), pp.105-124.
MANAGEMENT
Piercy, N.F., 2016. Market-led strategic change: Transforming the process of going to
market. Routledge.
Santos, R.B., 2016. Crime analysis with crime mapping. Sage publications.
Willits, D. and Nowacki, J., 2016. The use of specialized cybercrime policing units: An
organizational analysis. Criminal justice studies, 29(2), pp.105-124.
1 out of 18
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.