Assessing Data Security Systems' Role in Company Privacy: Lenovo

Verified

Added on  2019/12/03

|46
|15765
|281
Report
AI Summary
This report presents a case study evaluating the role of data security systems on company privacy, focusing on Lenovo. It begins with an acknowledgment and abstract highlighting the importance of customer loyalty and the need for robust information security strategies. The study compares Lenovo's security systems with those of HP and Sony, examining various security measures like email security, computer security, and risk management. The research methodology includes a literature review, research methodology, and data analysis from Lenovo senior managers. The findings indicate that Lenovo utilizes superior database security tools and encryption keys compared to its competitors, leading to stronger security. The report concludes with recommendations for enhancing data security systems to improve customer loyalty and profit margins. The study also examines factors affecting company privacy, such as data leakage, malicious attacks, and poor configuration management. The report includes detailed chapters on introduction, literature review, research methodology, data analysis, and conclusion with recommendations, along with references and an appendix containing a questionnaire survey of senior managers. The report emphasizes the significance of data security in maintaining a positive brand image and protecting sensitive business information.
Document Page
To evaluate the role of data security
systems on company’s privacy:
A case study on Lenovo
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ACKNOWLEDGMENT
I want to give my sincere thanks to my mentor and family who supported me
throughout this dissertation. My mentor supported me all the time whenever I need or require
his guidance. He gives me motivation and raises my confidence level in completing this
dissertation. It was all because of my mentor who guided me all through the research and I
was able to follow correct path. This research would not have been a successful without his
support.
Document Page
ABSTRACT
Maintaining customer loyalty is one of the most crucial policy through which
companies can easily attain higher profits. In this regard, they are required to maintain better
and profitable relationships with their customers. Each and every organization must recognize
the importance of implementing an overall information security strategy to protect business
information from different threats. The present study is based on data security systems of
Lenovo. However, it compares the whole security system of Lenovo with HP and Sony. This
system mainly helps in securing the customers details, financial information, sales figure and
other key business data. Companies can also reduce the exposure to hackers by limiting
access to their technology infrastructure. It is the main responsibility of the firm is to design
safe system which enables the firm to keep all their data secure. An appropriate data security
system helps Lenovo in promotion for the positive brand image.
This study identified that there are different types of security systems such as e-mail
security, computer security, risk management, biometrics access control etc. These types of
security systems helps in keeping all the software’s and computer systems protected from any
type of viruses and malware infections. Protection of information which is putting in the
public domain is required for company in order to save company for huge losses. In the
context of performing day to day business activities of organization in a secure manner, it is
essential for enterprise to enhance security of confidential business information properly. In
addition to this, there are various factors due to which overall privacy of company got
affected. These factors are data leakage, malicious hackers, malicious code, fraud and theft,
poor configuration management as well as various targeted attacks. It has been concluded that
Data security systems help in enhancing in enhancing customer loyalty as well as gaining
firm’s profit margin. As per the comparison of HP, Sony and Lenovo Companies on the
different aspects, it has been found that Lenovo has used the better technology of database
security tools. On the basis of encryption keys used by Lenovo, Sony and HP, it can be said
that Lenovo security is stronger as compared to HP and Sony.
Document Page
TABLE OF CONTENTS
CHAPTER 1: INTRODUCTION..............................................................................................1
Background of the study........................................................................................................1
Aims, objectives and research questions................................................................................2
Aim.........................................................................................................................................2
Rationale of the study.............................................................................................................3
Structure of the study.............................................................................................................3
CHAPTER 2: LITERATURE REVIEW...................................................................................5
Introduction............................................................................................................................5
Role of data protection and security systems.........................................................................5
Role of data security system..................................................................................................6
Factors affecting the company privacy..................................................................................8
Security systems of HP, Lenovo and Sony............................................................................9
Comparison of features and pros and cons of security system of three of them..................13
CHAPTER 3: RESEARCH METHODOLOGY.....................................................................15
Research philosophy............................................................................................................15
Research approach...............................................................................................................16
Research Type......................................................................................................................16
Sampling..............................................................................................................................17
Data Collection.....................................................................................................................18
Data analysis........................................................................................................................19
Research Limitation.............................................................................................................19
Ethical Consideration...........................................................................................................20
Validity and reliability.........................................................................................................20
CHAPTER 4: DATA ANALYSIS AND FINDINGS.............................................................21
Data Interpretation from senior managers of Lenovo..........................................................21
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CHAPTER 5: CONCLUSION AND RECOMMENDATIONS.............................................30
Conclusion............................................................................................................................30
Recommendations................................................................................................................32
REFERENCES.........................................................................................................................35
APPENDIX..............................................................................................................................38
Questionnaire survey of senior managers............................................................................38
Document Page
LIST OF FIGURES
Figure 1: IPsec secure communication......................................................................................6
Figure 2: PS3 system software.................................................................................................11
Figure 3: Cryptography technique used by HP........................................................................12
Figure 4: Data encryption used at HP......................................................................................13
Document Page
CHAPTER 1: INTRODUCTION
Background of the study
In today’s increasing and highly technological advanced world one of the most
essential tasks is to maintain appropriate data security for every organization. Here, in this
globalized world organizations are expanding their business by following appropriate
strategies. According to Hendricks, Singhal and Stratman (2007) maintaining customer
loyalty is one of the most crucial policy through which companies can easily attain higher
profits. In this regard, they are required to maintain better and profitable relationships with
their customers. However, there are some organizations who are giving appropriate training
to their employees for maintaining better relations with their customers. By this, they require
to keep their customers safe and secure by adopting best techniques. With the help of
maintaining trust among consumers company can develop its positive brand reputation in the
mind-set of their clients.
According to Black (2006) maintaining consistency and data security is a part of
every organization. Most of them are ensuring data integrity and confidentiality of their
business information. For this, they are taking protective digital privacy measures for the
prevention of any type of unauthorized access. Here, it can be determine that companies can
easily keep their data safe and secure and protect them from any type of corruption. In
addition to this, each and every organization must recognize the importance of implementing
an overall information security strategy to protect business information from different threats.
There was a recent attack that was related to their data security concern. In this concern,
majorly a company requires to maintain proper data protection strategy so that they can
compete with their rivals. This is the most effective way to keeping better relations with
customers take a complete inventory of all their data processes.
In this regard, the present study is based on data security systems of Lenovo.
However, it compares the whole security system of Lenovo with HP and Sony. Lenovo is the
Chinese multinational hardware and electronics company (Gruber and Wise, 2008). It is one
of the famous brands in this area and all it products includes tablets, mobile phones,
computers IT management software’s etc. This study analyzes the role of keeping security of
data within this organization as well as its performance. This system mainly helps in securing
the customers details, financial information, sales figure and other key business data. It is also
essential for them to keep all their data up date by following all the legislations such as Data
Protection Act 1998. Under this, they must ensure that all the information used by them must
Page | 1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
be fair and lawful. They do not break any rules regarding the personal information of their
customers and maintaining all such information very much confidential. The whole
performance of firm depends on the viewpoints of their customers and performance of their
employees. In this regard, workers required to maintain their customer’s record with full
security. Firms can grow their security concerns such as many cyber-attacks succeed because
of weak password protocols of firm (Baker, Murphy and Fisher, 2008). It is essential for them
to keep strong security password with all their data. In addition to this, companies can also
reduce the exposure to hackers by limiting access to their technology infrastructure. It is the
main responsibility of the firm is to design safe system which enables the firm to keep all
their data secure.
These are some of the major concerns which help in evaluating the role of data
security systems on the performance of company. These factors can affect the cost,
availability and user needs and data security as well. It also helps in determining all those
factors which highly affects the overall privacy of company. Total privacy systems of HP,
Lenovo and Sony are taken into consideration in order to identify their impact within their
firm as well as performance and brand reputation.
Aims, objectives and research questions
Aim
To evaluate the role of data security systems on company’s privacy: A case study on
Lenovo
Objectives – To realize this aim the following underlying objectives will first be attained:
To assess the importance of data security systems in business operations.
To identify the factors that affects company privacy.
To analyze the effectiveness of data security systems in mitigating privacy issues of
the company.
Research Questions
For the intention of conducting an all-inclusive research and find out the role of data
security in company’s privacy, below mentioned research questions have been formulated:
What is the importance of data security systems in business operation?
Which factors affects the company privacy?
How effective are data security systems in mitigating privacy issues of the company?
Page | 2
Document Page
Rationale of the study
The major issue in the present study is related to the security of private information of
customers as well organizations. There are various types of security risks that must be
encountered at the time of data protection. Due to the fast and rapid technological
advancements it is become quite difficult for companies for maintaining all the database of
their firm and must guarantee the confidentiality of e-commerce customers as they will
access the database. In order to prepare for any type of security threats firms need to
constantly update their security system. Further, HP, Lenovo and Sony are major competitors
of each other and developing various strategies in order to compete with each other. Hacking,
plagiarism, privacy, viruses, infectious malware etc. are the major security threats. It can
highly affect the performance of firm and it will lead to decrease the profitability of firm.
Moreover, it is quite essential for companies to follow all the legislations relate to data
security and adopt various latest technologies in order to achieve their target. With the help of
this, they are able to attain their goals with maintaining the customer loyalty.
Structure of the study
Chapter 1: Introduction
This is the starting chapter of any research where researcher develops all the
objectives based on the given subject matter. In this chapter, whole overview about the study
is given which helps in finding out the major area of research with brief information. Here, on
the basis of these objectives and research questions the total research study will takes place.
Research can carry out the study and proceed with next chapter with the help of set
objectives.
Chapter 2: Literature Review
This is the second and most important chapters of any study in which researcher can
fill the existing gaps of past studies as per the given subject matter. Here, the researcher will
find out most suitable information about the role of security systems and go through the
appropriate comparison about HP, Lenovo and Sony’s data security systems. Under this
chapter, appropriate information is presented by researcher as per the past studies done by
different authors.
Chapter 3: Research Methodology
This is considered as most important chapters as it helps the researcher in finding out
the most suitable information with the help of selecting best data collection. In this chapter,
different research methods are presented as per the suitability of research topic. With the help
Page | 3
Document Page
of selecting best research methods researcher is able to present appropriate research findings
and also develops a valid and suitable conclusion.
Chapter 4: Data Analysis and Findings
After finding out the total information about the given subject matter researcher and
selecting best suitable research methods researcher is able to draw appropriate findings. In
this chapter, analysis takes place on the basis of selected research methods such as Ms-Excel,
SPSS etc. These are the tools which help in analysis of data as per the gathered information
and drawing a valid conclusion on the basis of it.
Chapter 5: Conclusion and Recommendations
This is the last chapter of any research in which researcher can draw appropriate
conclusion on the basis of gathered data. Further, it also helps in covering all the major areas
of future research and drawing better recommendation for it. In the present study, future
recommendations can be presented effective data security systems.
Page | 4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CHAPTER 2: LITERATURE REVIEW
Introduction
This is considered as most important chapters of any research in which researcher can
carry out the appropriate evaluation of the given subject matter on the basis of past data.
There are various researchers and authors who have made similar research in the past years.
Further, literature review is sections which helps in fulfilling existing research gaps and make
it more complete without any biasness. In this regard, the present gives appropriate
information on basis of role of security systems within any organization. Further, it also
compares different security systems of different organizations.
Role of data protection and security systems
According to Chang and Yeh (2006) data confidentiality and security is considered as
a most important concepts through which companies can enhance their brand image in front
of all their customers. Bose (2006) in his articles determines that data security system is the
administration that is used for the protection and backup process of the data. It is the overall
process which helps in maintaining all the customers record of company as well firm’s
financial information and personal data anymore. In this way, it has been identified that such
systems also helps to recover the lost files, due to corruption or deletion as well as any other
type of malware and existing threats of the company. Data security systems are presented for
different purpose such as promotion for the positive brand image of the company as well as
high protection to handle the personal information and individual’s right to privacy. It is the
best way to allow administration to set backup recovery policies of a data. According to
Thuraisingham (2010) in today’s area of business and highly globalized world data security is
becoming most important concern for every businessman (Yin, 2000). Nowadays, companies
are adopting several IT systems such as CRM to maintain the database of their customers. It
can be define as a customer relationship management tool which helps in maintaining better
relations with consumers by keeping their data safe and secure.
Redlich and Nemzow (2007) in his article defines that there are different types of
security systems such as e-mail security, computer security, risk management, biometrics
access control etc. These types of security systems helps in keeping all the software’s and
computer systems protected from any type of viruses and malware infections. As per the
results of past survey data it has been identified that almost 285 million people were
compromised in 2008 in relation to their data security. However, it can be define as a major
area of problem. For this, different companies have adopted different strategies of that they
Page | 5
Document Page
can maintain full integrity and confidentiality of their data. Further, it has been identified that
Data security systems plays a major role in affecting the relationship with clients and spoiling
the brand image of company. According to Williams (2007) maintaining consumer trust is
major source for developing positive brand of company. However, by gaining customer
loyalty company can automatically increase its market share. With appropriate data security
profitable relationship can be developed and company’s client base can also be increased as
well (Shaw, 2010). Moreover, it can be determine that customers are the most valuable asset
of every organization and it is essential to provide them valid security for their data as well.
Role of data security system
For increasing security of data within private networks or intranets, IT companies are
emphasizing on the effective use of security mechanisms at various layers of internet.
Security mechanism provides opportunity to enterprise to transfer data across the network in
a safe and protective manner (Chang and et.al, 2007). In order to provide secure data
communications within the network, IPSec which is point to point protocol can be used in
two modes including transport mode and tunnel modes.
Figure 1: IPsec secure communication
(Source: Valiulis, 2001)
In order to determine the security implications, IPv4 and IPv6 tactics can be employed. IPv6
is more advanced as compared to IPv4 in term of security features and secures the packet
payloads. For reducing confidentiality related issues, enterprises are using different types of
technologies including IDS, Firewall, IPSec and Cryptographic in a significant manner (Ha,
2004). On the other side, for reducing integrity related issues, Anti-malware, SSL and
Firewall tools can be beneficial for companies in the modern world. In addition, privacy
related problems can be reduced through adequate utilizations of SSL and IDS systems at
workplace. Availability related challenge can be solved by DoS, email boming and spamming
Page | 6
chevron_up_icon
1 out of 46
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]