Amazon.com: Customers’ Information Security Case Study

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Feb 24th, 2024

Amazon.com and security concerns

Amazon.com understands that customers care about the security of private information. Amazon’s Privacy Notice provides customers with the information that the company receives from them, and how it is used. This company uses Secure Sockets layer (SSL) software to encrypt customers’ data (Smith, 2004). It also sends email updates to customers to create awareness and inform them about any changes it makes.

We will write a custom essay on your topic a custom Case Study on Amazon.com: Customers’ Information Security
808 writers online

Amazon.com seeks legal consultation from regulations governing cloud computing, and hence complies with the law. For instance, the law protects the customers’ data from being disclosed to any third party. Amazon keeps less confidential data on the virtual servers and the most important in secure places. The company reveals very few digits of a credit card number during confirmation of orders. It encourages customers to sign off from their website after accessing data to protect unauthorized people from accessing their accounts.

Plan methods to manage systems development

First, project managers should evaluate the existing system by interviewing customers in order to identify deficiencies. The second step is to define the new management system requirements, in relation to the existing management systems by proposing measures that can improve them. The third step is to design the proposed system. This should involve laying out plans related to physical construction, hardware, security issues including legal and privacy aspects, system operations, communication, and programming among others.

The fourth step is to develop the new system. The project managers should ensure that they obtain, install the new programs and components after training the users. The fifth step is to put the system into action, or use. The last step is to evaluate the new system after observing how it operates. Organizations using the system should emphasize on high maintenance standards and ensure that the users get periodic updates with regard to transformations in the new system.

Reference

Smith, G. E. (2004). Control and security of e-commerce. Hoboken, N.J: Wiley.

Print
Need an custom research paper on Amazon.com: Customers’ Information Security written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, February 24). Amazon.com: Customers' Information Security. https://ivypanda.com/essays/amazoncom-customers-information-security/

Work Cited

"Amazon.com: Customers' Information Security." IvyPanda, 24 Feb. 2024, ivypanda.com/essays/amazoncom-customers-information-security/.

References

IvyPanda. (2024) 'Amazon.com: Customers' Information Security'. 24 February.

References

IvyPanda. 2024. "Amazon.com: Customers' Information Security." February 24, 2024. https://ivypanda.com/essays/amazoncom-customers-information-security/.

1. IvyPanda. "Amazon.com: Customers' Information Security." February 24, 2024. https://ivypanda.com/essays/amazoncom-customers-information-security/.


Bibliography


IvyPanda. "Amazon.com: Customers' Information Security." February 24, 2024. https://ivypanda.com/essays/amazoncom-customers-information-security/.

Powered by CiteTotal, online essay referencing maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1