Customer loyalty programs additionally generate a positive corporateimage, as customers who win will advertise their perks. The bottom line is customer loyaltyprograms that work bring in added revenue. In order to successfully initiate an effective customer loyalty program, a consultingagency, our agency, has been hired to establish and field a program. We will be conducting afeasibility study, which will entail comprehensive involvement throughout the KFF staff formaximum input.
Risky Situations table found on your student website. List three types of sensitive information involved with each situation. Identify three ways each information item could be misused or harmed.
Answer the questions at the end of the table. Team Assignment Kudler Fine Foods IT Security Report —System Review Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information.
Your team has been asked to direct the development team in what they must do to ensure the system is developed in a secure manner and that it properly Kudler customer loyalty security ethics company and customer information at all stages of development Each week, the team prepares different portions of the final paper and presentation, which recommends exactly what the development team should do at each step of the development process including any related policy, training, and ongoing IT audit elements.
Familiarize yourself with the company and its systems, and identify the specific systems or areas where your team thinks information security is particularly needed.
You do not need to analyze for specific threats; that will be done later. Simply identify those areas and systems where security is warranted. Individual Assignment Common Information Security Threats Submit a formal academic paper that addresses at least three major information security threats that a specific organization you choose faces today.
Describe potential risks to the information and the related vulnerabilities within the organization.
Identify the forces that drive each threat and the related vulnerabilities. Discuss how the values for threat and vulnerability combine to indicate the overall risk the organization faces. Describe how an organization can properly manage its information security efforts using proper risk management techniques and cost-benefit analyses for these information security efforts.
Explain the legal, ethical, and regulatory requirements for protecting data. Include the likely vulnerabilities each threat might exploit.
The following table is an example of one you might use: Individual Assignment Disaster Securing and Protecting Information Submit a formal academic paper that describes the security authentication process.
Discuss how this and other information security considerations will affect the design and development process for new information systems. Include a brief discussion of how to include preventative measures for securing data, such as backups and remote or redundant storage.
Note what role this will play in the other areas covered in the paper. Provide an overview of several systems and devices that can provide security services to meet the needs raised by the other areas covered in the paper.
Identify specific concerns if the system is ever removed from service. Specify what can and should be done in each systems development process phase to properly mitigate the risk for each entry in the table from the previous week. Be specific, but high-level in your mitigations.
Most or all items will have something to check or do in each stage of the systems development process. Individual Assignment The Role of Information Security Policy Submit a formal academic paper describing the importance of policies and standards for maintaining information systems security.
Include a discussion of the role employees—and others working for the organization—play in this effort. Identify the key information security policy elements that Kudler Fine Foods needs to support the efforts to ensure that the new frequent shopper program properly protects the customer and organizational information.
Identify the security awareness training needed to ensure that employees are ready to properly protect customer and organizational information when using the new system. This report should cover the material from the previous weeks, providing a comprehensive look at the key safeguards needed for the project at each stage of the systems development processes.
The report should have clear recommendations to ensure that the final frequent shopper program system is properly secured against likely threats. What are the top three areas that an organization should work on to respond to the issues raised in the de Villiers article?
Why are these areas critical to the organization? Explain why or why not. Choose a specific organization to illustrate your argument.
What is the value and effect of a good business impact analysis BIA? How can using this help an organization develop an effective information security policy?
What is the role of an internal IT audit group in an organization? Why is having such a group important for an organization and why should it report outside the normal IT reporting channels? What are at least three questions that you would ask to perform basic threat modeling for a field other than health care?Second, Kudler will encourage customer shopping trips and improve loyalty by introducing a loyalty points program.
This marketing initiative will track the customer’s buying habits and allow Kudler to target to specific customers. I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
After swiping the customer’s membership attheheels.com FINE FOOD FREQUENT SHOPPER PROGRAM 4 Kudler Fine Foods’ customers remain primarily concerned with quality. Supporting Measures for Success. The raw data and practical information will .
Week 1 Team Assignment Kudler Fine Foods IT Security Report – System Review. Kudler Fine Foods is in the process of developing a customer loyalty program and related system to give rewards to their customers based on their purchases and other relevant information.
Ethics and Customer Loyalty Essay “COLGATE DISTASTEFUL TOOTHPASTE” CASE STUDY Case Overview: Colgate is a very well known company in the United States and is remembered for its toothpaste. It not only specializes in personal care but in .
Kudler Fine Foods Frequent Shopper Program The Kudler Fine Foods frequent shopper program has many potential problems concerning legal, ethical, and information security published this no reads.