A Critical Analysis of Infotech Solutions' Business Model
VerifiedAdded on 2020/03/01
|15
|3527
|38
Report
AI Summary
This report provides a comprehensive critique of the business model of Infotech Solutions, a hypothetical company dealing with website development and security. The report begins with an executive summary highlighting the importance of technology and the risks associated with cybercrime, including hacking and data breaches. It identifies the problem of inadequate security measures, leading to customer data compromise and reputational damage. A proposed business model based on game theory is introduced to address these issues, focusing on system analysis, attacker identification, and defender strategies. The report then offers a critical analysis of the model, including its components, a SWOT analysis, and an application of Porter's Five Forces. It also addresses team security, internal distribution, centralization, and coordination. Finally, the report provides recommendations for improving Infotech Solutions' security posture and overall business operations, emphasizing the need for innovative solutions to protect customer data and maintain a competitive advantage. The report is a valuable resource, and Desklib provides past papers and solved assignments for students.

Running head: CRITIQUING BUSINESS MODEL
Critiquing business model
Name of the student:
Name of the university:
Author note:
Critiquing business model
Name of the student:
Name of the university:
Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1
CRITIQUING BUSINESS MODEL
Executive Summary
Technology is of utmost importance in terms of automatic completion of the business
activities. However, if the personnel fail to monitor the online activities, the productivity
indicated by the previous sentence is nullified in case of the companies and organizations. On the
contrary, the clients cannot be fully trusted, as they access websites, which are prohibited. This
results in the advent of virus, malfunctioning within the devices. One of the other issues in this
category is the hacker intervention, which reflects the motive to secretly intrude into to other’s
personal life. Developing a hypothetical case study of a hypothetical company named Infotech
Solutions alarms the real companies and organizations regarding taking preventive measures for
safety, security and privacy of the clients. Business model, in this case possesses flexibility to
upgrade the internal environment of the company, so that they can penetrate into the external
environment to expand their business. Recommendations are suggestions for the company
personnel in terms of making proper progress with the proposed plans. However, catering to the
needs, demands, requirements, security of the customers would help the companies and
organizations to achieve sustainable growth amidst the competitive ambience of the market.
Along with this, this sustainability would enhance the reputation of the company in the minds of
the customers.
CRITIQUING BUSINESS MODEL
Executive Summary
Technology is of utmost importance in terms of automatic completion of the business
activities. However, if the personnel fail to monitor the online activities, the productivity
indicated by the previous sentence is nullified in case of the companies and organizations. On the
contrary, the clients cannot be fully trusted, as they access websites, which are prohibited. This
results in the advent of virus, malfunctioning within the devices. One of the other issues in this
category is the hacker intervention, which reflects the motive to secretly intrude into to other’s
personal life. Developing a hypothetical case study of a hypothetical company named Infotech
Solutions alarms the real companies and organizations regarding taking preventive measures for
safety, security and privacy of the clients. Business model, in this case possesses flexibility to
upgrade the internal environment of the company, so that they can penetrate into the external
environment to expand their business. Recommendations are suggestions for the company
personnel in terms of making proper progress with the proposed plans. However, catering to the
needs, demands, requirements, security of the customers would help the companies and
organizations to achieve sustainable growth amidst the competitive ambience of the market.
Along with this, this sustainability would enhance the reputation of the company in the minds of
the customers.

2
CRITIQUING BUSINESS MODEL
Table of contents
Introduction......................................................................................................................................3
Background of the company........................................................................................................3
Problem identification.....................................................................................................................4
Proposed business model.............................................................................................................6
Critical analysis of the model..........................................................................................................6
Components of this model...............................................................................................................6
SWOT analysis of the model...........................................................................................................6
Porter’s five forces.......................................................................................................................7
Team security...............................................................................................................................8
Internal distribution.....................................................................................................................8
Internal centralization..................................................................................................................8
Combination of Internal distribution and centralization..............................................................8
Coordination................................................................................................................................9
Recommendations..........................................................................................................................10
References......................................................................................................................................12
CRITIQUING BUSINESS MODEL
Table of contents
Introduction......................................................................................................................................3
Background of the company........................................................................................................3
Problem identification.....................................................................................................................4
Proposed business model.............................................................................................................6
Critical analysis of the model..........................................................................................................6
Components of this model...............................................................................................................6
SWOT analysis of the model...........................................................................................................6
Porter’s five forces.......................................................................................................................7
Team security...............................................................................................................................8
Internal distribution.....................................................................................................................8
Internal centralization..................................................................................................................8
Combination of Internal distribution and centralization..............................................................8
Coordination................................................................................................................................9
Recommendations..........................................................................................................................10
References......................................................................................................................................12

3
CRITIQUING BUSINESS MODEL
Introduction
In the 21st century, the wonders of internet have spread all over the world, including the
remote areas. The result of this is the optimization of the world for the usage of the public
domain. From the business perspective, internet has revolutionized the business processes
(Fleisch, Weinberger and Wortmann 2015). Lack of proper utilization of the machines compels
the personnel to encounter instances of cyber crimes, which deprives the customers from the
safety, security and privacy of their personal details. This issue takes a massive shape in this
assignment, acting as a major concern for the companies and organizations, in terms of
preserving the hard earned reputation. Failure to take preventive measures entraps the companies
and organizations within scandals (Manky 2013). This can be one of the grounds for keeping the
case study hypothetical, such as Infotech solutions. Along with this, business model is proposed
for solving the identified issue. As a final touch, the assignment assesses the effectiveness and
feasibility of the model in terms of solving the issue.
Background of the company
Infotech Solutions, as the name suggests deals with providing security to the companies
dealing with website development. The company experiments with Firewalls, which helps in
identity verification of the visitors and members logging into the website of the company. This
is done automatically without the visitor having to stop for security check. This resulted in
robberies, thefts, which resulted in huge loss of the company property (Sharma and Tandekar
2016). This necessitated the need for something flexible and creative, which would enhance the
security of the company. At this stage, the managers of the company sat in meeting with the
board of directors. The highlights of the meeting were the introduction to Curify, which would
CRITIQUING BUSINESS MODEL
Introduction
In the 21st century, the wonders of internet have spread all over the world, including the
remote areas. The result of this is the optimization of the world for the usage of the public
domain. From the business perspective, internet has revolutionized the business processes
(Fleisch, Weinberger and Wortmann 2015). Lack of proper utilization of the machines compels
the personnel to encounter instances of cyber crimes, which deprives the customers from the
safety, security and privacy of their personal details. This issue takes a massive shape in this
assignment, acting as a major concern for the companies and organizations, in terms of
preserving the hard earned reputation. Failure to take preventive measures entraps the companies
and organizations within scandals (Manky 2013). This can be one of the grounds for keeping the
case study hypothetical, such as Infotech solutions. Along with this, business model is proposed
for solving the identified issue. As a final touch, the assignment assesses the effectiveness and
feasibility of the model in terms of solving the issue.
Background of the company
Infotech Solutions, as the name suggests deals with providing security to the companies
dealing with website development. The company experiments with Firewalls, which helps in
identity verification of the visitors and members logging into the website of the company. This
is done automatically without the visitor having to stop for security check. This resulted in
robberies, thefts, which resulted in huge loss of the company property (Sharma and Tandekar
2016). This necessitated the need for something flexible and creative, which would enhance the
security of the company. At this stage, the managers of the company sat in meeting with the
board of directors. The highlights of the meeting were the introduction to Curify, which would
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4
CRITIQUING BUSINESS MODEL
enhance the security of the company property. The specifications of this technology were, it
would compel the visitors to stop at the entrance for the security check. Along with this, the
technology would operate automatically without the manual operations of experienced engineer
or network administrator. Upon entering the office premises, the sensor in Curify would send an
alarm to the managerial authorities regarding the specifications of the visitor.
One of the major specialties of this technology is that it would automatically scan the
presence of an intruder into the website. Apart from this, the technology would be flexible in
providing the access of VPN services to the customers (Smith 2015). Through this service, the
customers would be able to establish secure connection between their computers and the website
of the company. The GPRS sensors within the technology would be able to track the location of
the customers, irrespective of their stay in any corner of the world. In case of confidential data
transfer, the technology would be effective in sending encoded packets, secretly from the sender
to the receiver, which would be monitored minutely through the tracking software.
Overall, the technology was expected to enhance the efficiency in the business operations
of Infotech Solutions (Jansen et al. 2016).
Problem identification
For the first few months of implementing Curify, the business activities went on
smoothly. However, within one year, the company encountered instances of cyber crimes. As a
matter of specification, the customers complained that they were receiving unknown calls and
emails asking about their personal details. Interestingly, one of the customers got a call from
some unknown person, who knew his password and all the other details. Increase in these
complaints made the company personnel aware about the failure of the VPN services (Cook and
CRITIQUING BUSINESS MODEL
enhance the security of the company property. The specifications of this technology were, it
would compel the visitors to stop at the entrance for the security check. Along with this, the
technology would operate automatically without the manual operations of experienced engineer
or network administrator. Upon entering the office premises, the sensor in Curify would send an
alarm to the managerial authorities regarding the specifications of the visitor.
One of the major specialties of this technology is that it would automatically scan the
presence of an intruder into the website. Apart from this, the technology would be flexible in
providing the access of VPN services to the customers (Smith 2015). Through this service, the
customers would be able to establish secure connection between their computers and the website
of the company. The GPRS sensors within the technology would be able to track the location of
the customers, irrespective of their stay in any corner of the world. In case of confidential data
transfer, the technology would be effective in sending encoded packets, secretly from the sender
to the receiver, which would be monitored minutely through the tracking software.
Overall, the technology was expected to enhance the efficiency in the business operations
of Infotech Solutions (Jansen et al. 2016).
Problem identification
For the first few months of implementing Curify, the business activities went on
smoothly. However, within one year, the company encountered instances of cyber crimes. As a
matter of specification, the customers complained that they were receiving unknown calls and
emails asking about their personal details. Interestingly, one of the customers got a call from
some unknown person, who knew his password and all the other details. Increase in these
complaints made the company personnel aware about the failure of the VPN services (Cook and

5
CRITIQUING BUSINESS MODEL
Kearney 2015). Along with the VPN services, it was also the failure of the locks, which secured
the password of the customers’ personal data.
One of the major concerns was the visibility of the secret codes by the third party during
the transactions from the sender to the receiver. As a matter of specification, unknown strangers,
claiming to be the clients of the company approached the customers for engaging in partnerships.
The shareholders were approached by the third party for this partnership. This reflected failure in
the facility regarding sending encoded packets directly to the receiver without any disturbance in
between the process. As a result of these instances, the clients switched brands, which provided
the opportunity to the contemporary brands to enjoy competitive advantage in terms of satisfying
their needs, demands and requirements (Sharma and Tandekar 2016).
Even the children were not spared from this dirty gaming business. The children of the
customers, having profiles with the company, were sent invitations for games like Fast and
Furious, racing car games and Mario. The children were elated upon receiving invitation for such
games. When the parents saw their children playing such violent games, they were shocked.
When asked who gave them these games, they said “some of the friendly uncles gave”. This
compelled the parents to verify the identity of these “uncles” (Manky 2013). Upon verifying, the
parents found out that the numbers, through which they were sent emails regarding indulging in
deals and the numbers through which their children were sent invitation for the games are
exactly the same. This increased their worries and tensions regarding the safety and security of
their family members, especially the children and their development.
CRITIQUING BUSINESS MODEL
Kearney 2015). Along with the VPN services, it was also the failure of the locks, which secured
the password of the customers’ personal data.
One of the major concerns was the visibility of the secret codes by the third party during
the transactions from the sender to the receiver. As a matter of specification, unknown strangers,
claiming to be the clients of the company approached the customers for engaging in partnerships.
The shareholders were approached by the third party for this partnership. This reflected failure in
the facility regarding sending encoded packets directly to the receiver without any disturbance in
between the process. As a result of these instances, the clients switched brands, which provided
the opportunity to the contemporary brands to enjoy competitive advantage in terms of satisfying
their needs, demands and requirements (Sharma and Tandekar 2016).
Even the children were not spared from this dirty gaming business. The children of the
customers, having profiles with the company, were sent invitations for games like Fast and
Furious, racing car games and Mario. The children were elated upon receiving invitation for such
games. When the parents saw their children playing such violent games, they were shocked.
When asked who gave them these games, they said “some of the friendly uncles gave”. This
compelled the parents to verify the identity of these “uncles” (Manky 2013). Upon verifying, the
parents found out that the numbers, through which they were sent emails regarding indulging in
deals and the numbers through which their children were sent invitation for the games are
exactly the same. This increased their worries and tensions regarding the safety and security of
their family members, especially the children and their development.

6
CRITIQUING BUSINESS MODEL
Proposed business model
The need of the hour was something, which would act as an address for Infotech
Solutions in terms of the cyber crimes. Therefore, the managers along with the stakeholders and
shareholders decided to sit for a meeting and develop a framework. The result of this meeting
was the introduction of Game theory, which possesses flexibility to prevent the intruders from
venturing into the clients’ profile. This theory represents the relationship between the attackers
and the defenders regarding the mitigation of the intensity of the cyber crimes (Akhgar and
Brewster 2016). In view of the cyber crimes, the game theory can be connoted as gaming with
the specific needs, demands and requirements of the clients.
Critical analysis of the model
Components of this model
The typical components of this gaming theory are- system, attacker, IDs or virtual
sensors and defenders. Frequent speculation of the systems makes the personnel aware of the
defects, which needs to be modified. This speculation would alarm the personnel regarding the
virus attacks, malfunctions and hacker interventions. Along with this, inspection of the systems
highlights the IDs of the hackers, if any. Using the virtual sensors would help the personnel to
automatically track the location of the hackers (Epps 2017). Defending the attacks would reflect
the conscious approach of the clients as well as the personnel towards ensuring self security.
SWOT analysis of the model
One of the greatest strengths of this gaming theory is the virtual sensors. Providing
training to the employees regarding the effective utilization of this model would result in the
CRITIQUING BUSINESS MODEL
Proposed business model
The need of the hour was something, which would act as an address for Infotech
Solutions in terms of the cyber crimes. Therefore, the managers along with the stakeholders and
shareholders decided to sit for a meeting and develop a framework. The result of this meeting
was the introduction of Game theory, which possesses flexibility to prevent the intruders from
venturing into the clients’ profile. This theory represents the relationship between the attackers
and the defenders regarding the mitigation of the intensity of the cyber crimes (Akhgar and
Brewster 2016). In view of the cyber crimes, the game theory can be connoted as gaming with
the specific needs, demands and requirements of the clients.
Critical analysis of the model
Components of this model
The typical components of this gaming theory are- system, attacker, IDs or virtual
sensors and defenders. Frequent speculation of the systems makes the personnel aware of the
defects, which needs to be modified. This speculation would alarm the personnel regarding the
virus attacks, malfunctions and hacker interventions. Along with this, inspection of the systems
highlights the IDs of the hackers, if any. Using the virtual sensors would help the personnel to
automatically track the location of the hackers (Epps 2017). Defending the attacks would reflect
the conscious approach of the clients as well as the personnel towards ensuring self security.
SWOT analysis of the model
One of the greatest strengths of this gaming theory is the virtual sensors. Providing
training to the employees regarding the effective utilization of this model would result in the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
CRITIQUING BUSINESS MODEL
achievement of positive outcomes. This gaming practice is one of the greatest threats for
Infotech Solutions in terms of maintaining their position within the competitive ambience.
Inability to adopt innovative means for tracking the presence of hackers is the weakness of the
personnel in terms of mitigating the intensity of the cyber crimes. Market research in this
direction acts as an opportunity for the personnel to seek innovation within the business activities
(Jansen et al. 2016).
Porter’s five forces
Taking into consideration the Porter’s five forces would help the personnel to maintain
their position in the competitive ambience of the market. For this, awareness regarding the
alternative network security systems adopted by the contemporary brands would be a wise step
in terms of providing quality security options to the clients. Valuing the authoritative power of
the suppliers would reduce the rivalry between the stakeholders and shareholders of Infotech
Solutions. This reduction would enhance the power of the clients, the buyers, in terms of
possessing efficient and effective security options for the network (Sharma and Tandekar 2016).
Within this, the computer security model also attains appropriateness. The presence of
policies within this model would prove beneficial for the company personnel to enforce strict
security within the online business operations. Along with this, the facility of computation would
allow the finance administrative to compute the problems and solve them algorithmically
(Asgarkhani and Sitnikova 2014). Here, one of the other advantages is the computation model.
Consideration of this model would allow the personnel to maintain records of the charges for
each solution implemented. This would be beneficial in terms of calculating the budgets and
finally publishing the annual report.
CRITIQUING BUSINESS MODEL
achievement of positive outcomes. This gaming practice is one of the greatest threats for
Infotech Solutions in terms of maintaining their position within the competitive ambience.
Inability to adopt innovative means for tracking the presence of hackers is the weakness of the
personnel in terms of mitigating the intensity of the cyber crimes. Market research in this
direction acts as an opportunity for the personnel to seek innovation within the business activities
(Jansen et al. 2016).
Porter’s five forces
Taking into consideration the Porter’s five forces would help the personnel to maintain
their position in the competitive ambience of the market. For this, awareness regarding the
alternative network security systems adopted by the contemporary brands would be a wise step
in terms of providing quality security options to the clients. Valuing the authoritative power of
the suppliers would reduce the rivalry between the stakeholders and shareholders of Infotech
Solutions. This reduction would enhance the power of the clients, the buyers, in terms of
possessing efficient and effective security options for the network (Sharma and Tandekar 2016).
Within this, the computer security model also attains appropriateness. The presence of
policies within this model would prove beneficial for the company personnel to enforce strict
security within the online business operations. Along with this, the facility of computation would
allow the finance administrative to compute the problems and solve them algorithmically
(Asgarkhani and Sitnikova 2014). Here, one of the other advantages is the computation model.
Consideration of this model would allow the personnel to maintain records of the charges for
each solution implemented. This would be beneficial in terms of calculating the budgets and
finally publishing the annual report.

8
CRITIQUING BUSINESS MODEL
Within this model, Computer Security Incident Response Team (CSIRT) acts as a wise
step in terms of dealing with an issue of such intensity. The following sheds light on the
different programs, which were proposed under this team development.
Team security
Trainings and lectures given to the team members about the incidents opens the ground
for various and wide ranging solutions. This is in terms of the enhancement of their preconceived
skills, knowledge and expertise in the field of information technology (Winder and Trump 2015).
Internal distribution
Equal distribution of the tasks within the team members is apt in terms of collaborative
advancement towards the accomplishment of the identified and the specified goals. Sending
drafts about the allocated duties along with the details of the team members to the managerial
authorities aligns with the responsibilities of the personnel in terms of systematic execution of
the business activities (Asgarkhani and Sitnikova 2014).
Internal centralization
The hired team members would be designated as central to the companies and
organization. This is due to the high level duties, which they would perform.
Combination of Internal distribution and centralization
Adherence and compliance with the propositions of this component would help the
company personnel to utilize the existing as well as hired team members according to the
requirements. This step would enhance the clarity of the personnel regarding the activities, which
they are made to perform (Smith, 2015).
CRITIQUING BUSINESS MODEL
Within this model, Computer Security Incident Response Team (CSIRT) acts as a wise
step in terms of dealing with an issue of such intensity. The following sheds light on the
different programs, which were proposed under this team development.
Team security
Trainings and lectures given to the team members about the incidents opens the ground
for various and wide ranging solutions. This is in terms of the enhancement of their preconceived
skills, knowledge and expertise in the field of information technology (Winder and Trump 2015).
Internal distribution
Equal distribution of the tasks within the team members is apt in terms of collaborative
advancement towards the accomplishment of the identified and the specified goals. Sending
drafts about the allocated duties along with the details of the team members to the managerial
authorities aligns with the responsibilities of the personnel in terms of systematic execution of
the business activities (Asgarkhani and Sitnikova 2014).
Internal centralization
The hired team members would be designated as central to the companies and
organization. This is due to the high level duties, which they would perform.
Combination of Internal distribution and centralization
Adherence and compliance with the propositions of this component would help the
company personnel to utilize the existing as well as hired team members according to the
requirements. This step would enhance the clarity of the personnel regarding the activities, which
they are made to perform (Smith, 2015).

9
CRITIQUING BUSINESS MODEL
Coordination
This is one of the most important attribute needed among the staffs for dealing with the
encountered issue. Consciousness towards maintenance of unity and coordination would result in
the achievement of positive outcomes.
Creating team for solving the issue of cyber crime is absolutely appropriate for Infotech
Solutions in terms of restoring the lost reputation and glory. Along with this, the thought of
developing a strategic approach towards modifying the errors of judgments validates the adopted
Computer Security Model. Building teams through a systematic manner reflects compliance to
Tuckman’s stages of team development. This is the first stage of critiquing the applied Computer
Security Model (Jansen et al. 2016).
Emerging successful in making practical application of the learnt skills would make the
team members a savior in the lives of the personnel and the clients. On the contrary, inculcating
within them the importance of securing the personal profiles of the clients, would add value to
the efforts of the employers. Along with this, allocating the tasks according to the capability of
the members would result give positive outcomes. However, this would delay the completion of
the projects within the stipulated time (Winder and Trump 2015). These perspectives raise doubt
over the aspect of internal allocation. Countering this, training enhances the preconceived skills,
expertise and knowledge of the employees, which nullifies the thought of not belong able to
perform the tasks out of their domain. Counter arguing, in view of such an intensified issue of
cyber crimes, allocating of the tasks randomly is quite natural and apt in terms of revealing
spontaneous attitude towards restoring the security and lost justice of the customers (Epps,
2017).
CRITIQUING BUSINESS MODEL
Coordination
This is one of the most important attribute needed among the staffs for dealing with the
encountered issue. Consciousness towards maintenance of unity and coordination would result in
the achievement of positive outcomes.
Creating team for solving the issue of cyber crime is absolutely appropriate for Infotech
Solutions in terms of restoring the lost reputation and glory. Along with this, the thought of
developing a strategic approach towards modifying the errors of judgments validates the adopted
Computer Security Model. Building teams through a systematic manner reflects compliance to
Tuckman’s stages of team development. This is the first stage of critiquing the applied Computer
Security Model (Jansen et al. 2016).
Emerging successful in making practical application of the learnt skills would make the
team members a savior in the lives of the personnel and the clients. On the contrary, inculcating
within them the importance of securing the personal profiles of the clients, would add value to
the efforts of the employers. Along with this, allocating the tasks according to the capability of
the members would result give positive outcomes. However, this would delay the completion of
the projects within the stipulated time (Winder and Trump 2015). These perspectives raise doubt
over the aspect of internal allocation. Countering this, training enhances the preconceived skills,
expertise and knowledge of the employees, which nullifies the thought of not belong able to
perform the tasks out of their domain. Counter arguing, in view of such an intensified issue of
cyber crimes, allocating of the tasks randomly is quite natural and apt in terms of revealing
spontaneous attitude towards restoring the security and lost justice of the customers (Epps,
2017).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10
CRITIQUING BUSINESS MODEL
Recommendations
Systematizing the strategies would help the personnel to achieve efficiency within the
business activities. Within the strategies, inclusion of activities like identity verification of the
visitors, password locks would be beneficial for the Infotech Solutions personnel to ensure the
security, safety and privacy of the customers. Along with this, introducing privacy cookies would
safeguard the profiles of the customers. Apart from the cookies, anti-virus like Quick Heal can
also serve the purpose of safety. For the achievement of satisfaction from the customers, the
company needs to undergo several processes starting from taking feedbacks from the customers
to assessing the impact of the implemented services on the business as a whole. Within this,
market research is the primary activity (Conteh and Staton 2016).
Evaluation of the introduced offers would bring to the forefront the major drawbacks in
the ways of executing the business activities. Maintenance of consistency in the execution of
evaluation would upgrade the performance skills, abilities and capabilities of the personnel.
Speculation of the financial condition would be an important activity in terms of adopting
flexible and efficient security measures. Indulging in partnership with the trade union members
would safeguard the company, Infotech Solutions from financial crisis like inflation, fluctuation
in the prices of the spare parts of the machines among others (Kraemer, Tang and Rush 2013).
Incapability to seek innovative security software would add vulnerability to the market position
of the company. This would compel the clients to switch brands.
Most importantly, password locks would restrict the entry of the hackers into the personal
profiles of the customers. However, this needs to be done after the clients have accessed all the
required information. Apart from this, scanners can be installed in the profiles of the customers,
CRITIQUING BUSINESS MODEL
Recommendations
Systematizing the strategies would help the personnel to achieve efficiency within the
business activities. Within the strategies, inclusion of activities like identity verification of the
visitors, password locks would be beneficial for the Infotech Solutions personnel to ensure the
security, safety and privacy of the customers. Along with this, introducing privacy cookies would
safeguard the profiles of the customers. Apart from the cookies, anti-virus like Quick Heal can
also serve the purpose of safety. For the achievement of satisfaction from the customers, the
company needs to undergo several processes starting from taking feedbacks from the customers
to assessing the impact of the implemented services on the business as a whole. Within this,
market research is the primary activity (Conteh and Staton 2016).
Evaluation of the introduced offers would bring to the forefront the major drawbacks in
the ways of executing the business activities. Maintenance of consistency in the execution of
evaluation would upgrade the performance skills, abilities and capabilities of the personnel.
Speculation of the financial condition would be an important activity in terms of adopting
flexible and efficient security measures. Indulging in partnership with the trade union members
would safeguard the company, Infotech Solutions from financial crisis like inflation, fluctuation
in the prices of the spare parts of the machines among others (Kraemer, Tang and Rush 2013).
Incapability to seek innovative security software would add vulnerability to the market position
of the company. This would compel the clients to switch brands.
Most importantly, password locks would restrict the entry of the hackers into the personal
profiles of the customers. However, this needs to be done after the clients have accessed all the
required information. Apart from this, scanners can be installed in the profiles of the customers,

11
CRITIQUING BUSINESS MODEL
which will automatically scan the profiles and make it secure. In case of messages or invitations
from unknown sources, the profiles can be colored red (Filshtinskiy 2013). This would
automatically send the profiles to the managerial authorities. Spontaneity in this direction would
give best results.
Frequent speculation by the IT experts would make the company personnel aware of the
presence of malfunctioning, virus attacks and hacker intervention. This inspection would result
in altering the defective device. Along with this, advertising the ill effects of cyber crimes would
enhance the awareness of the public in this matter. The sources of radio, television and social
media can be considered in this direction (Bernik 2014).
CRITIQUING BUSINESS MODEL
which will automatically scan the profiles and make it secure. In case of messages or invitations
from unknown sources, the profiles can be colored red (Filshtinskiy 2013). This would
automatically send the profiles to the managerial authorities. Spontaneity in this direction would
give best results.
Frequent speculation by the IT experts would make the company personnel aware of the
presence of malfunctioning, virus attacks and hacker intervention. This inspection would result
in altering the defective device. Along with this, advertising the ill effects of cyber crimes would
enhance the awareness of the public in this matter. The sources of radio, television and social
media can be considered in this direction (Bernik 2014).

12
CRITIQUING BUSINESS MODEL
References
Akhgar, B. and Brewster, B. eds., 2016. Combatting cybercrime and cyberterrorism: challenges,
trends and priorities. Springer.
Asgarkhani, M. and Sitnikova, E., 2014, July. A strategic approach to managing security in
SCADA systems. In Proceedings of the 13th European Conference on Cyber warefare and
Security (pp. 23-32).
Bernik, I., 2014. Cybercrime: The cost of investments into protection. Varstvoslovje, 16(2),
p.105.
Conteh, N.Y. and Staton, Q., 2016. The Socio-Economic Impact of Identity Thefts and
Cybercrime: Preventive Measures and Solutions. International Journal of Computer Science and
Business Informatics, 15(6).
Cook, E. and Kearney, P., 2015. SECURITY CHALLENGES AND CYBERCRIME. JOURNAL
OF THE INSTITUTE OF TELECOMMUNICATIONS PROFESSIONALS, 9, pp.22-25.
Epps, C., 2017. Best practices to deal with top cybercrime activities. Computer Fraud &
Security, 2017(4), pp.13-15.
Filshtinskiy, S., 2013. Cybercrime, cyberweapons, cyber wars: is there too much of it in the
air?. Communications of the ACM, 56(6), pp.28-30.
Fleisch, E., Weinberger, M. and Wortmann, F., 2015. Business models and the internet of things.
In Interoperability and Open-Source Solutions for the Internet of Things (pp. 6-10). Springer,
Cham.
CRITIQUING BUSINESS MODEL
References
Akhgar, B. and Brewster, B. eds., 2016. Combatting cybercrime and cyberterrorism: challenges,
trends and priorities. Springer.
Asgarkhani, M. and Sitnikova, E., 2014, July. A strategic approach to managing security in
SCADA systems. In Proceedings of the 13th European Conference on Cyber warefare and
Security (pp. 23-32).
Bernik, I., 2014. Cybercrime: The cost of investments into protection. Varstvoslovje, 16(2),
p.105.
Conteh, N.Y. and Staton, Q., 2016. The Socio-Economic Impact of Identity Thefts and
Cybercrime: Preventive Measures and Solutions. International Journal of Computer Science and
Business Informatics, 15(6).
Cook, E. and Kearney, P., 2015. SECURITY CHALLENGES AND CYBERCRIME. JOURNAL
OF THE INSTITUTE OF TELECOMMUNICATIONS PROFESSIONALS, 9, pp.22-25.
Epps, C., 2017. Best practices to deal with top cybercrime activities. Computer Fraud &
Security, 2017(4), pp.13-15.
Filshtinskiy, S., 2013. Cybercrime, cyberweapons, cyber wars: is there too much of it in the
air?. Communications of the ACM, 56(6), pp.28-30.
Fleisch, E., Weinberger, M. and Wortmann, F., 2015. Business models and the internet of things.
In Interoperability and Open-Source Solutions for the Internet of Things (pp. 6-10). Springer,
Cham.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13
CRITIQUING BUSINESS MODEL
Gomes, J.F., Ahokangas, P. and Owusu, K.A., 2016. Business modeling facilitated cyber
preparedness. The Business & Management Review, 7(4), p.1.
Jansen, J., Veenstra, S., Zuurveen, R. and Stol, W., 2016. Guarding against online threats: why
entrepreneurs take protective measures. Behaviour & Information Technology, 35(5), pp.368-
379.
Kraemer-Mbula, E., Tang, P. and Rush, H., 2013. The cybercrime ecosystem: Online innovation
in the shadows?. Technological Forecasting and Social Change, 80(3), pp.541-555.
Manky, D., 2013. Cybercrime as a service: a very modern business. Computer Fraud &
Security, 2013(6), pp.9-13.
McMahon, R., Serrato, D., Bressler, L. and Bressler, M., 2015. Fighting cybercrime calls for
developing effective strategy. Journal of Technology Research, 6, p.1.
Owen, T., Noble, W. and Speed, F., 2017. New Perspectives on Cybercrime(No. 1). Palgrave
Macmillan.
Sharma, A. and Tandekar, P., 2016. Cyber Security and Business Growth. Business Analytics
and Cyber Security Management in Organizations, p.14.
Sitnikova, E. and Asgarkhani, M., 2014, August. A strategic framework for managing internet
security. In Fuzzy Systems and Knowledge Discovery (FSKD), 2014 11th International
Conference on (pp. 947-955). IEEE.
Smith, G.S., 2015. Management models for international cybercrime. Journal of Financial
Crime, 22(1), pp.104-125.
CRITIQUING BUSINESS MODEL
Gomes, J.F., Ahokangas, P. and Owusu, K.A., 2016. Business modeling facilitated cyber
preparedness. The Business & Management Review, 7(4), p.1.
Jansen, J., Veenstra, S., Zuurveen, R. and Stol, W., 2016. Guarding against online threats: why
entrepreneurs take protective measures. Behaviour & Information Technology, 35(5), pp.368-
379.
Kraemer-Mbula, E., Tang, P. and Rush, H., 2013. The cybercrime ecosystem: Online innovation
in the shadows?. Technological Forecasting and Social Change, 80(3), pp.541-555.
Manky, D., 2013. Cybercrime as a service: a very modern business. Computer Fraud &
Security, 2013(6), pp.9-13.
McMahon, R., Serrato, D., Bressler, L. and Bressler, M., 2015. Fighting cybercrime calls for
developing effective strategy. Journal of Technology Research, 6, p.1.
Owen, T., Noble, W. and Speed, F., 2017. New Perspectives on Cybercrime(No. 1). Palgrave
Macmillan.
Sharma, A. and Tandekar, P., 2016. Cyber Security and Business Growth. Business Analytics
and Cyber Security Management in Organizations, p.14.
Sitnikova, E. and Asgarkhani, M., 2014, August. A strategic framework for managing internet
security. In Fuzzy Systems and Knowledge Discovery (FSKD), 2014 11th International
Conference on (pp. 947-955). IEEE.
Smith, G.S., 2015. Management models for international cybercrime. Journal of Financial
Crime, 22(1), pp.104-125.

14
CRITIQUING BUSINESS MODEL
Smith, G.S., 2016. Evaluating materiality in cybercrime footnotes. Journal of Corporate
Accounting & Finance, 27(2), pp.77-87.
Winder, D. and Trump, I., 2015. Mitigating Cybercrime Through Meaningful Measurement
Methodologies. EDPACS, 52(5), pp.1-8.
CRITIQUING BUSINESS MODEL
Smith, G.S., 2016. Evaluating materiality in cybercrime footnotes. Journal of Corporate
Accounting & Finance, 27(2), pp.77-87.
Winder, D. and Trump, I., 2015. Mitigating Cybercrime Through Meaningful Measurement
Methodologies. EDPACS, 52(5), pp.1-8.
1 out of 15
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.