Wednesday, February 19, 2020

How google has used information systems to develop more competitive Essay - 1

How google has used information systems to develop more competitive new business models - Essay Example Business models will continue to change as they have owing to the dynamic nature of business, however through IT; it is possible to positively affect changes in all the functions of the company. Information systems are used in companies over the world as a supporting function that makes processes more efficient. This has been done so irrespective of the nature of the industry they have been used in. However, with respect to the software industry, there are certain deviations. In addition to being a support function IT tools are also used for the core functions of the company. In spite of this, IT management has not been given the attention it deserves and is still treated as a business enabler function. Hence, it is high time that IT management is seen as a tool that shapes the business model of the company resulting in the topic at hand. Although Google and Microsoft have been considered for this study, it has been done so with respect to their main fields of operation namely the search engine market and that of the operating systems although they have operations in other areas, some of which overlap. The reason behind this is that the characteristics of the market can be matched with that of the company to reveal the strategies of the companies. Thereafter, the company mission, vision and other objectives were studied so as to examine their alignment with the IT strategy of the company. Since this was available through company sources such as websites, annual reports, etc, academic resources were reserved for familiarization with the principles of IT management. Subsequently analysis was carried out on both the companies with respect to Porter’s models. Statistics regarding the industry in which each of the companies operates in proved especially useful in revealing their strategies. Finally, the significance of information systems in developing the business models of the companies was established. Having

Tuesday, February 4, 2020

LitReview Essay Example | Topics and Well Written Essays - 1750 words

LitReview - Essay Example Consideration of a threat doles out as a restriction or limitation that creates hindrances to perform required tasks as it dissuades to take action considering losses and costs. The whole process can be seen as a military action in which, concerned parties are restricted to take any military action that would affect the foreign policy objectives of the two involved states. Any sort of initiation of combating action is deterred. Rational choice theory is another theory that is influential in terms of cyber security. This theory allows contemplation and differentiation of varied accessible tactics. Cornish & Clarke (1986) inform that this theory emerged considering a notion related to cost benefit analysis. For example, a criminal conducts a crime when it appears advantageous to him. The theory also puts light on challenger’s haziness towards defender’s selected option. Nevertheless, the theory fails to resolve the strategized relationship between concerned parties, which are thoroughly reviewed in game theory (Understanding Society, 2008). The challengers select their intended defenders diligently and also work on their combating strategies considering previously employed strategies by the defenders. According to Cavusoglu, Raghunathan & Yue (2008), Decision theory is weak in handling the challengers’ worked out strategies and revisiting of defender’s actions because as per the theory, defender regards challenger’s devised performances as ‘exogenous’. According to the game theory, defender’s choices and challenger’s actions are endogenous. According to the decision theory, the scenarios according to which, the involved parties have to take action are predefined due to which, the actions performed by actors are regarded exogenous. Von Newmann and Morgenstern (1944) inform that each contestant is eligible to evaluate ‘variables’ of his actions only. There are rational rules involved in cons idering of variables and comprehension of variables of other’s actions, which cannot be determined statistically. Therefore, it has been required to explore a more viable theory that can be applied to cyber security. Researchers have moved towards game theory to comprehend the relationship between actors in cyber security issues. In addition, Nisan and Ronen (1999), Nisan (2007) inform about mechanism design that has assisted towards development of protection and privacy mechanisms. These mechanisms are designed with the support of systematic results. Because of usage of game theory, there are certain security decisions. These security decisions are supportive in terms of distribution of restricted resources, stability of professed problems and consideration of core inducement mechanisms. In game theoretical model, more than one person are involved in the decision making process and examining the decisions made where players are either directly or indirectly involved to share the resources provided in the game. Games relevant to the strategic security can be simple or complex. The game can be helpful in solving the simple as well as complex formulated security issues. The security issues can be related to the wireless or computer controlled communication programs. The strategy can provide a solution of the user privacy issues, etc. Utilizing this theoretical model, a defender keeps maintaining the security of the network and the system, while an attacker always tries to access the secure