The first segment (Task A) will assess the CRM system used inside the Wesfarmers firm. A SWOT analysis was conducted to evaluate the installation of the CRM system inside the firm. The development model for operations is essential for creating a successful organizational operations framework. This research evaluates the impact of ICT technologies in enhancing the smart operational management of business organizations. The advancement of technology has facilitated the enhancement of operations and the evolution of intelligent functions. The evolution of companies has significantly impacted the operational systems now in place.
SWOT Template Organisation: Wesfarmers Date: 21/05/2017 |
|
Description of current/new ICT service: CRM or customer relationship management system implementation would be developed for forming the development of accurate development of models. The CRM system had been developed for implementing the faster processes of the organization. The CRM system provides a specific development of the organization approach for the modification of ongoing processes in the organization. The ICT services of the CRM implementation would form the development of the existing processes and increase the efficiency of operations for the organization. The development of the existing technology would employ the faster and more efficient development of operations within the organization. CRM would deploy faster and effective data modification for the organization in the organization. The implementation would form scope for integration of the operations. |
|
Strengths · Integration of the customer’s data on a single platform for Wesfarmers · Data Access had been improved · Technological advancements resulting in formation of effective and smart operation implementation |
Weaknesses
|
Opportunities
|
Threats
|
Summary and Recommendations: The CRM implementation had been developed for forming the appropriate development of the operations of data management in the Wesfarmers organization. The various factors of strengths and opportunities for Wesfarmers are improvement of data access, integration of operations, market expansions, global strategy implementation, and advancement of technology for developing smarter operations for the Wesfarmers. It would develop the specific development of the system integration for the development of smart functional operations in the organization. The deployment of specific CRM system would increase the efficiency of operations in the organization. The factors of weaknesses and threats in the Wesfarmers organization are data theft and loss, dependency on technology, complexity of operations, and high cost of equipments. Some recommendations for the development of the operations of Wesfarmers are given below, Security Functions: The deployment of security functions would help in forming the appropriate development of CRM implementation for Wesfarmers. The security options like encryption, authorization and password implementation would be deployed for forming the accurate development of operations. The security development of the system integration with the deployment of the appropriate development models for the organization. Implementation model: The use of implementation model would be deployed for successful implementation of the CRM system for Wesfarmers. It would ensure that the functions of CRM are well integrated with the operations of Wesfarmers. The deployment of CRM using specific models would ensure that the system integration would help in forming acute system implementation for the organization. Short Term (Now) The short term goals had been deployed for the development of the integrated operations of the Wesfarmers. The integration of the operations had been developed for developing the appropriated development of the CRM implementation in Wesfarmers. The integrated operations would form the modification of the existing system in the organization to form the effective and specific modulation of the customer eccentric operations for Wesfarmers. Mid Term (next 12 months) The midterm goal of the Wesfarmers is for the modification of the security functions in the organization. The security implementation would deploy the option for modification of the existing technology in the operations of the Wesfarmers. The integration of the security functions would employ the development of the operational development in the organization. Long Term (next 3 to 5 years) The long term goal of Wesfarmers is forming market expansion along with the development of global strategies. The global strategies had been developed for forming the operational development of the Wesfarmers for expansion of the market to global reach. The development of the marketing operations. The market expansion would deploy the increase of the existing development models. |
The study was created to assess social media concerns and suggest solutions for addressing them. The commercial challenges of social media impacting corporate enterprises include data abuse, inappropriate content dissemination, account hacking, and susceptibility to competition. Strategies must be devised to address the security weaknesses of the social media platform. The security measures to address vulnerabilities include the formulation of a security policy, restricting access to information dissemination and data availability, as well as implementing training and awareness programs.
The subsequent segment will be designed to establish the suitable development model for the firm. The social media strategy was established to assess the notion of social media challenges and solutions for the advancement of social media strategies. Social media has been expanding since its inception (Wang et al., 2013). The many social media platforms such as Facebook, Twitter, LinkedIn, Google+, and Reddit. These websites have been created to facilitate connection among individuals worldwide.
This paper will assess the numerous social media concerns now faced by individuals. Social media difficulties may pertain to technological aspects, privacy concerns, or ethical considerations. These challenges would lead to the emergence of ancillary concerns in the organization's functional evolution.
A variety of social media platforms have been used by several individuals and organizations to enhance their operations and functions. Gritzalis (2014) identifies many commercial difficulties related to social media that impact corporate organizations, including data abuse, the dissemination of irrelevant information, account hacking, and susceptibility to competition.
Guidelines for Establishing Security Functions and Implementation Framework
Misappropriation of data: The predominant challenge in implementing a social media strategy is the improper use of data inside the company (Gritzalis, Stavrou, Kandias & Stergiopoulos, 2014). The abuse of data would lead to significant financial and professional losses for the company. The abuse of data is occurring due to security vulnerabilities and data accessibility. The data published on the social networking platform has been used for individual purposes. The several firms have seen the unauthorized usage of their data without approval or recognition. The abuse of data would lead to significant losses for the firm.
The organization's social media account had a problem with a hacked post, resulting in irrelevant data dissemination. The material published on the website had inaccuracies about postings on the social networking platform (Gritzalis, Kandias, Stavrou & Mitrou, 2014). The company incurred a loss due to the improper publishing of data. The social networking platform welcomes client input; nevertheless, several users have been publishing unrelated remarks and information.
Account Compromise (phishing): The compromise of accounts is a significant challenge for the social media deployment strategy (Joe & Ramakrishnan, 2014). The cyberattack on the social media database using hacking techniques would lead to significant disruption and substantial losses for the firm. The cybercriminals and hackers caused significant privacy violations for the firm. The organization's operations will implement customer-centric creation of social media strategy. Nonetheless, the intrusion would lead to data extraction from external sources, therefore compromising the organization's data integrity.
Susceptible to rivals: The susceptibility to competitors has arisen from the accessibility of data on social media platforms (Wang et al., 2013). Competitors might use the data and information accessible on social media pages to devise plans against the firm. The vulnerability resulted in financial and operational losses for the firm. The vulnerability of social media has created obstacles to privacy inside the company. The problem would arise from the lack of system integration inside the company. The competing corporations used data sets to create precise operational models, which subsequently led to vulnerabilities inside the company.
Challenges and Strategies for Organizations in Social Media
The implementation of social media was established to facilitate communication inside the company. Strategies must be devised to address the security weaknesses of the social media platform. The security measures necessary for addressing the vulnerabilities of security functions are detailed below.
Formulation of Security Policy: The formulation of a security policy was deemed necessary to address the security challenges in social media (Ngai et al., 2015). The security policies have to be implemented to generate suitable organizational functions. The security rules were formulated to align with the organization's operational evolution. The security policies have to be implemented to shape the formulation of the policy on suitable development models inside the company.
Access limitations: The social media platform must be designed to restrict information publishing and data accessibility (Malthouse et al., 2013). The access restriction would guarantee that the published data is not exploited. The access restriction would be the suitable solutions to the data abuse and spamming problem. The restriction of access facilitates the advancement of accurate information processing inside the company.
Training and Awareness: Training and awareness are a significant component of information processing aimed at enhancing user knowledge of security vulnerabilities (Jussila, Karkkainen & Aramo-Immonen, 2014). User training would facilitate the cultivation of practices essential for formulating suitable development models for the company. The primary security concerns may be mitigated by user training for social media accounts.
Final Assessment
The research addressed the evolution of social media concerning security risks and deficiencies. The security challenges inside the company have impeded operational flow. The commercial challenges of social media impacting corporate enterprises include data abuse, inappropriate content dissemination, account hacking, and susceptibility to competition. Several techniques have been proposed to address the security weaknesses of the social media platform. The proposed security measures to address vulnerabilities include the formulation of a security policy, restricting access to information dissemination and data availability, and implementing training and awareness programs.
References
Gritzalis, D., (2014). Holistic Information Security: Human Factor and Behavior Prediction using Social Media.
Gritzalis, D., Kandias, M., Stavrou, V. & Mitrou, L., (2014). History of Information: The case of Privacy and Security in Social Media. In Proc. of the History of Information Conference (pp. 283-310).
Gritzalis, D., Stavrou, V., Kandias, M. & Stergiopoulos, G., (2014), March. Insider threat: enhancing BPM through social media. In New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on (pp. 1-6). IEEE.
Joe, M.M. & Ramakrishnan, D.B., (2014). A survey of various security issues in online social networks. International Journal of Computer Networks and Applications, 1(1), pp.11-14.
Jussila, J.J., Kärkkäinen, H. & Aramo-Immonen, H., (2014). Social media utilization in business-to-business relationships of technology industry firms. Computers in Human Behavior, 30, pp.606-613.
Malthouse, E.C., Haenlein, M., Skiera, B., Wege, E. & Zhang, M., (2013). Managing customer relationships in the social media era: introducing the social CRM house. Journal of Interactive Marketing, 27(4), pp.270-280.
Ngai, E.W., Moon, K.L.K., Lam, S.S., Chin, E.S. & Tao, S.S., (2015). Social media models, technologies, and applications: an academic review and case study. Industrial Management & Data Systems, 115(5), pp.769-802.
Wang, Y., Leon, P.G., Scott, K., Chen, X., Acquisti, A. and Cranor, L.F., 2013, May. Privacy nudges for social media: an exploratory Facebook study. In Proceedings of the 22nd International Conference on World Wide Web (pp. 763-770). ACM.