Tuesday, July 29, 2008

Midterm Question #2
Research 1 company and describe how they protect their company from internet risks.Also, research for possible risks or dangers and/or impacts of internet - related crimes to a company.



CNN NEWS COMPANY


Many owners don't realize how much they are at risk. CNN Company use these five ways to protect against Internet threat.
As cybercriminals get more sophisticated, they are abandoning large-scale attacks on corporate firewalls in favor of smaller targets.
.
Small businesses are "the low hanging fruit in terms of a target because they lack the infrastructure to have really good defenses," the chief technology officer of MessageLabs, an e-mail security company that processes more than a billion messages a week.
Generally, many corporations have much stronger infrastructure to fight spyware attacks and other Internet threats.
"Larger companies would have multiple layers of protection," a UK-based software security company, while smaller organizations often lack network security and an internal information technology (IT) staff to prevent Internet security attacks.
They also have fewer policies in place to help safeguard against viruses, and lack the financial and human resources available to rebound from an attack.
"This is a real threat that is financially motivated and will not stop spreading," said David Moll, CEO of Webroot Software, which makes anti-spyware software for consumers and small businesses..
"Businesses have a serious responsibility to ensure their proprietary assets and employees' personal information is safeguarded,"
Get tech-savvy
Small businesses don't have to be sitting ducks. One advantage smaller firms do have is their ability to share information and adapt quickly.
They can also follow these steps from Sophos to defend against viruses and spyware:
Use antivirus software. Install antivirus software on all of your desktops and servers, and ensure they are kept up to date. Because new viruses can spread extremely quickly, it is important to have a system in place that can update all the computers in your company seamlessly and frequently.
Filter e-mail. Consider filtering potentially malicious e-mail at the e-mail gateway to protect your business from the threats of e-mail-borne viruses, spam and spyware.
Fire up some firewalls. Computers connected to the outside world should be protected from Internet threats via firewalls; laptops and remote home workers should be included as well.
Back up your data. Make regular backups of important work and data, and check that the backups were successful. Also find a safe place to store your backups.
Introduce an antivirus policy. Produce a policy for safe computing and distribute it to all staff. Inform them of the dangers of downloading documents directly from the Internet, using screen savers and opening attachments from suspicious e-mail.
But for those companies unable to foot the bill to overhaul their network, there are also other options, the chief technology officer at Tumbleweed, an Internet security vendor.
Rather than invest in your own exchange server or firewall, "when you are a small company, you should really think about outsourcing," "This is where outsourcing just completely makes sense," agrees Sunner.
"Building an IT security infrastructure shouldn't be left to amateurs, because the bad guys are professionals,"

Monday, July 21, 2008

Midterm Question #1
Research 1 company that makes use of E-commerce. Describe the nature of this company in 1-2 paragraphs.Identify then, how does this company use e-commerce to achieve strategic advantage. Describe the benefits derived from this strategy

.Raytheon Company

Raytheon: A History of Global Technology Leadership

Two former college roommates Laurence K. Marshall and Vannevar Bush, along with scientist Charles G. Smith, founded Raytheon Company in Cambridge, Mass., as the American Appliance Company in 1922.

Throughout its more than 80-year history, Raytheon Company has been a leader in developing defense technologies and in converting those technologies for use in commercial markets. From its early days as a maker of radio tubes, its adaptation of World War II radar technology to invent microwave cooking, and its development of the first guided missile, Raytheon has successfully built upon its pioneering tradition to become a global technology leader.


Raytheon: Aspiring to be the most admired defense and aerospace systems supplier through world-class people and technology

Raytheon is a technology leader specializing in defense, homeland security, and other government markets throughout the world. With a history of innovation spanning more than 80 years, Raytheon provides state-of-the-art electronics, mission systems integration, and other capabilities in the areas of sensing; effects; command, control, communications and intelligence systems, as well as a broad range of mission support services.

Electronic commerce tools and technologies are essential in the development of world class electronic processes within Raytheon Company. Raytheon encourages the use of electronic trading partner relationships throughout the entire Business-to-Business (B2B) environment. Suppliers and other Trading Partners are encouraged to work with Raytheon to build an electronic commerce relationship.

Electronic commerce is comprised of these same parts, with Raytheon Company

  • The business transaction is constructed and processed by a business software application.
  • The data format is standardized, or translated into a common format, between sender and receiver, so all data can be accurately identified by both partners' business software applications.
  • The data is transported electronically from the sending application to the receiving application, without any further manual processing.
  • There are significant benefits to both parties, in speed, accuracy of data and lower operations cost or cash transactions.

How Does Electronic Commerce Work at Raytheon Company?

The data portion
After a business case is established for doing electronic commerce with a trading partner, the process starts with a Trading Partner Agreement (TPA) between Raytheon and the trading partner. We agree upon the documents to be exchanged, the data format to be used, the method of transportation, and the timing of the information exchange. The TPA addresses document content only to the extent of the data elements that must be transmitted within a document to be transmitted between the parties (e.g., ship-to address is a required field). It does not address the business content (e.g., ship-to-address must contain fully-spelled out street names). The trading partner and Raytheon may also have other agreements that cover this business content. A TPA does not alter or affect these other agreements in any way.

Raytheon’s corporate Electronic Commerce (ES&S Integration Services) team will make the necessary preparations on the Raytheon side to process the documents without human intervention. The Raytheon ES&S Integration Services team works with the Raytheon application personnel to create electronic business document(s), such as a purchase order or an invoice, for a business application. Document data is passed from the business application to the corporate electronic commerce processing center. From there, the document data will be converted into the agreed electronic format and distributed to the trading partner. Electronic documents submitted by the trading partner will be converted from the agreed electronic format into the application system’s required format and distributed to the business application for processing.

The communications portion
When Electronic Data Interchange (EDI) is used, Raytheon Company will route the electronic documents to another party (the Value Added Network or VAN) through which the trading partner will obtain the documents. After retrieving the document, the trading partner's electronic commerce software or service will convert the data from the standard format into the format needed by their own application.

For non-EDI data formats communication methods in use include File Transfer Protocol (FTP) . Encryption of the data and/or the entire transmission is commonly utilized with this form of communications.

The key to efficient electronic commerce is to input the pertinent business data only once. Electronic commerce software does the rest of the work. Data is transferred from our business application to our trading partner's application with no manual intervention steps to slow the process. oine of the benifits there is easy business transaction, and gather more information.

Wednesday, July 9, 2008

Management Information System

Monday, July 7, 2008

Blog Question # 6
Research one multinational corporation like Procter and Gamble, Unilever, IBM, Microsoft, Honda and etc. Identify and describe how their subsidiaries are managed and how technology has assisted them in their corporate and/or local operations. Further, identify one Philippine company that has gone worldwide (eg. Jollibee and BENCH) and describe their strategies. Evaluate the strategies of foreign companies with that of Philippine corporations.

All About Nestlé
Since Henri Nestlé developed the first milk food for infants in 1867, and saved the life of a neighbor’s child, the Nestlé Company has aimed to build a business as the world's leading nutrition, health and wellness company based on sound human values and principles.
While our Nestlé Corporate Business Principles will continue to evolve and adapt to a changing world, our basic foundation is unchanged from the time of the origins of our Company, and reflects the basic ideas of fairness, honesty, and a general concern for people.
Nestlé is committed to the following Business Principles in all countries, taking into account local legislation, cultural and religious practices:
Nestlé's business objective is to manufacture and market the Company's products in such a way as to create value that can be sustained over the long term for shareholders, employees, consumers, and business partners.
Nestlé does not favor short-term profit at the expense of successful long-term business development.
Nestlé recognizes that its consumers have a sincere and legitimate interest in the behavior, beliefs and actions of the Company behind brands in which they place their trust, and that without its consumers the Company would not exist.
Nestlé believes that, as a general rule, legislation is the most effective safeguard of responsible conduct, although in certain areas, additional guidance to staff in the form of voluntary business principles is beneficial in order to ensure that the highest standards are met throughout the organization.
Nestlé is conscious of the fact that the success of a corporation is a reflection of the professionalism, conduct and the responsible attitude of its management and employees. Therefore recruitment of the right people and ongoing training and development are crucial.
Nestlé continues to maintain its commitment to follow and respect all applicable local laws in each of its markets.



Innovation, Technology, R&D
The nestle company relay the needs and information of their subsidiary.They enteract through the use of information technology,getting financial report, the flowof goods, information resources, and the flow of materials and their employees. Through that they centralized the strategy they applied,and the headquarters of the nestle company will be the one to control the decision,in fenancial terms,and their applying the confidence strategic plan in improving the company.

Thursday, July 3, 2008

Management Information System

Post Blog Question #5
As a future Manager, What is your Computer Ethics Program? Justify each activity needed.
As a future manager, i will put a program reminded to all my employees about my rules and regulations in using a computer. I will program a soft copy those rules and regulation. for instances, that during working hour employees are not allowed to play games and chatting. I will will prohibeted those unethical works during working time they will another do that are not related to the works.