StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Use of Spyware in Company - Case Study Example

Cite this document
Summary
It is evidently clear from the discussion "Use of Spyware in Company" that the company has a number of problems to fix of which the incoming chief executive officer Mr. Schwartz believes that the entire problem can be solved through technological advancement…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Use of Spyware in Company
Read Text Preview

Extract of sample "Use of Spyware in Company"

There is no consensus with many members having dissenting opinions on the capacity of embracing technology to solve their problems at hand. Some of the dissenting opinion with being pro-technology is the capability that the technology brings, which the chief executive officer so much believes in and has to building trust when the subordinate is under the watch always with the spyware. This presents a problem of mistrust and fear within the company.

Trust is needed for the company to be reputable and cooperative. It emerges that the transitioning from the founders of the company to the current CEO of the company did not have more technology but it advanced. The previous regime based their property on the research that enabled them to know areas of opportunity, threats, and strength. With such knowledge, it was easy for the company to grow. The root cause of the stalemate and problem was the new chief executive office coming up with almost sudden change.

According to research done by Carr & Trahant change is not something that should be done once but introduces slowly to allow people to familiarize themselves with it. The new chief executive came with the philosophy of embracing technology which appeared to be skewed toward spying employees. This causes discourse within the board. The strategic position has been negatively impacted by the problem in a number of ways. First the resistance to being pro-technology delays the program. The use of spyware is also observed as the absence of trust hence bringing divisions in the company.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case study Example | Topics and Well Written Essays - 250 words - 110”, n.d.)
Case study Example | Topics and Well Written Essays - 250 words - 110. Retrieved from https://studentshare.org/management/1677996-case-study
(Case Study Example | Topics and Well Written Essays - 250 Words - 110)
Case Study Example | Topics and Well Written Essays - 250 Words - 110. https://studentshare.org/management/1677996-case-study.
“Case Study Example | Topics and Well Written Essays - 250 Words - 110”, n.d. https://studentshare.org/management/1677996-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Use of Spyware in Company

Profit Implications of Malware

The web or internet worm spreads via user access to a web page, file transfer protocol or by use of other internet sources.... We also have the file-sharing (Peer-to-peer) worm that copies itself into a shared folder, it then use its peer-to-peer mechanism to make its existence known with the hope that a user will download it....
15 Pages (3750 words) Annotated Bibliography

Network Security Plan

Some of the infrastructure providers are the telephone company providing their line for network connection while the fiber optic cable is down.... The paper "Network Security Plan" establishes the loopholes different hackers can try to use to access the organization's network....
9 Pages (2250 words) Case Study

Management Information and Communications Systems

Organizations make use of various techniques like data mining and warehousing to analyse online user behaviour and accommodate strategic practices to achieve higher traffic to their websites.... The report identifies common practices adopted by online websites and organizations to tap into individual information easily available on the Internet and use it to promote its business goals and objectives....
14 Pages (3500 words) Essay

Internet Security IT Research Paper

Make sure too that patches, particularly security patches, are installed as soon as available” (How to deal with Internet security threats) “If you have ever used an installation program to install system or service software (as nearly every company has), and you have not removed unnecessary services and installed all security patches, then your computer system is vulnerable to hacker attack” (The Top 10 Most Critical Internet Security Threats - (2000-2001 Archive).... Virus threat, malware, spyware threats, hacking, forgery, identity theft etc are some of the major internet related security issues....
3 Pages (750 words) Research Paper

Spyware and Implementing Network Security

The scourge of spyware is going to be here for quite a while, simply because the attacker makes so much money from it.... nbsp;Some common examples of spyware are CoolWebSearch (CWS), Gator (GAIN), 180search Assistant ISTbar/update, Transponder (vx2), Internet Optimizer Blaze Find, Hot as Hell, Advanced Key logger, TIBS Dialer.... hellip; The use of the Internet in daily activities is continuously increased.... This essay "spyware and Implementing Network Security" is a compilation of resources that explain what spyware is, how it attacks, and most importantly what you can do to win the war on spyware....
19 Pages (4750 words) Essay

Spyware In The Enterprise

The study "spyware in The Enterprise" analyzes the methods to address spyware infection and ways to protect hardware  using the variety of software methods to reduce the risks of infection.... In referring to the present state of spyware, Gartner computer analyst John Pescatore reported "It's rapidly turning into a very serious problem.... After reading this report, the average employee is expected to be familiar with the meaning of spyware and related terms, the risks it entails, and some simple methods and practices to combat it on the enterprise network....
9 Pages (2250 words) Report

Spywares as Viruses

He can sell the vital information, related to your company's strategy and stored in your system, to the competitor and since the information has been leaked from... A cost in terms of the risk of losing the sensitive data to the hackers… spyware is the software that transfers the vital information surreptitiously from the user's system to any other intended system.... A spyware can attack your system if you install a freeware that has a spy ware as an application or your browser automatically installs program without seeking your permission and ends up installing a spyware or you click on a pop up and that triggers a program to install a spyware onto your machine....
7 Pages (1750 words) Essay

To Spy or Not to Spy: Globe Alive Company

use of spyware is also observed the absence of trust hence bringing the divisions in the company.... The author makes SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats) of Globe Alive, Inc, gives the alternative supervisory control and monitoring to employees and managers of Globe Alive company, and gives recommendation and plan of action.... This presents a problem of mistrust and fear within the company.... Trust is needed for the company to be reputable and cooperative....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us