à
Inbound logistics : Refers to goods being obtained from the organisations suppliers
ready to be used for producing the end product.
: The raw materials and goods obtained are manufactured into the final
product. Value is added to the product at this stage as it moves through the production
line.
Once the products have been manufactured they are ready to be
distributed to distribution centres, wholesalers, retailers or customers.
Marketing must make sure that the product is targeted towards
the correct customer group. The marketing mix is used to establish an effective
strategy, any competitive advantage is clearly communicated to the target group by
the use of the promotional mix.
: After the product/service has been sold what support services does the
organisation have to offer. This may come in the form of after sales training,
guarantees and warranties.
With the above activities, any or a combination of them, maybe essential for the firm
to develop the competitive advantage which Porter talks about in his book.
The support activities assist the primary activities in helping the organisation achieve
its competitive advantage. They include:
à : This department must source raw materials for the organisation and
obtain the best price for doing so. For the price they must obtain the best possible
quality
: Every organisations needs to ensure that their finances, legal
structure and management structure works efficiently and helps drive the organisation
forward.
As you can see the value chain encompasses the whole organisation and looks at how
primary and support activities can work together effectively and efficiently to help
gain the organisation a superior competitive advantage.
©
c
Ã
à
) *
£ º
ü Ô& &+
) ©,
,
£ /
£ 3&
ü 3& 0
à à
£ Ã
à
ü 31 &
ü º
ü à
©3
£ 3º
ü
ü ©
ü Ã
à
£ Ã
ü
&&
&
£ à
ü V
&
.
"'3
º
3
à
ü º
&
a
£
a
£ a
(
£ V
à
£
V&&
&
&
+
+
a 3
.
&+
a à
©&.
+
ü 6
ü &
Ã
3
ü ©&
.
&
& &
£ ©
Ã
1 0&
&0&
£
.
1
é
&1
&0
&
0&
&
(
& & (
7
u
!
î
"
Ã
ü
# à
#
# a
Prevention
This kind of approach refers to limiting the level of information available to personnel. In
this case, businesses can ensure that their employees only gain access to information that
they need to complete certain tasks. This means that even those who modify information
should only do this within their own jurisdictions. Additionally, businesses should restrict
information availability completely for documents that are extremely sensitive. (Roily, 2007)
All the latter categories ought to be determined by the process of data classification. One
can define data classification as the process of labeling data on the basis of security
vulnerability or sensitivity. Organizations ought to place their documents into the following
categories
a Top secret
a Open
a 3ecret
a ºonfidential
The classification system is the first step in protecting one's documents because it lays out
the major framework for security. The person who should do the classification is the owner
of the information. Besides the latter, it is very necessary for businesses to document all the
classifications systems within a security handbook. This is instrumental in the event that a
security crisis occurs. (Fraser et al, 2005)
Policy changes
No method of information security can be successful without changing the policies and
procedures within organizations. Organizations must struggle to create an environment
where workers respect the issue of internet security. Here, it would be necessary to create a
disciplined environment where work practices foster information security. Additionally, those
people who are given confidential information must be capable of maintaining its integrity.
This means that they must be trustworthy. Businesses must also explain to their staff about
the most vital information and information that is not. This means that a large percentage
of them need to keep off sensitive information. (Garfinkel, 2001)
ºompanies ought to train their employees about security threats. Here, the training
sessions are supposed to inform the employees about how to use security tools, how to
detect threats and how to deal with them. Here, employees need to know the experts they
can contact in case of a perceived security threat. Besides that, they should also be
informed about how to make back up systems. Training is especially important for new
employees within the company.
Clarification of problems
3ecurity threats differ from business to business. 3ome groups may be very vulnerable to
internet crime while some may not. ºonsequently, guidelines should be laid out as to what
constitutes a security threat and how vulnerable one is. The following should be outlined
clearly
a 3ecurity targets
a àrinciples of information classification
a Responsible personnel
a àrinciples for reaching targets
In line with the latter, organizations should create a well laid out security plan. While
curbing internet crime can be done in variety of ways, businesses should prioritize the most
important security measures. Management and users need to be told about their
responsibilities. (Grimes, 2004)
3ecurity implementation can be done through a variety of methods. The first one is through
authorization. Authorization ought to be done through two major steps; validation and
identification.
Identification can be done through simple or more complex methods. 3ome companies opt
to use password systems. Here, specific individuals are given passwords that act as keys to
information. ºompanies that manage to use this system successfully are those ones that
have one password for each individual. When everyone can use a password, then it makes it
a lot easier for internet crime to occur. Good passwords must be distinct, must be changed
frequently and must not be repeated if they had ever been used in the past. Lastly,
passwords must be changed when individuals leave job positions or change departments.
(Dekker, 2006)
These days, security systems have improved tremendously. The latter method of passwords
merely depends on something that a user possesses. However, more effective security
measures depend on things that one has and things that one knows. For example, an
organization could ask for a password along with a magnetic card in order to enhance
security. The magnetic card contains some confidential information which can be identified
by the computer system. Additionally, businesses can use chip cards. The chip normally has
memory. (Van and Forno, 2001)
A more effective system is one that combines, something one has, with something one
owns and something that is such as biometric systems. Here, individuals are only allowed to
access certain categories of information after their physical features have been verified. One
of the examples includes finger print and retina patterns.
Internet security can also be enhanced through backing up information. This is because
some viruses have the ability to destroy ones' documents completely. In order to counter
such actions, then it is necessary for businesses or individuals back up their data through
another system of storage such as a removable device. The device can then be placed in a
locked cabinet or a place that is completely secured.
ºompanies should be careful about their back up systems because one can focus on the
primary source of information and then ignore the other source of information. This means
that in case the primary information is destroyed, one would be forced to contend with
obsolete information. Organisations must be keen about editing and changing their back up
information from time to time. This will go a long way in promoting the reliability of the
back up systems (Anderson, 2003)
Alternatively, companies can decide to set up firewalls for their data. This is a system that
prevents access to information between two networks. Firewalls can be divided into two.
3ome of them focus on restricting access while others dwell on allowing selective access. A
packet filter firewall allows packets of information to enter a protected server or they may
have the ability to block those respective packets. The other type of firewall called the
application gateway is one that acts as a go between two servers by addressing packets to
user application. (Zwicky et al, 2000)
Conclusion
The proliferation of Information Technology into all aspects of life has made users extremely
vulnerable. ºomputer crimes may occur through a number of methods and seriously
compromise the user's functions. It is therefore necessary to implement a wide range of
security measures that can prevent internet crime. 3ome of these measures include
preventive measures, changing security policies, creating data back ups, using firewalls,
using biometrics, using effective passwords and lastly utilizing tangible methods of
identification such as magnetic cards.
&&& 0 0 0
0 0 ! !)88
+*