University of Cumberlands Crowdsourcing as a Business Strategy Essay Hi Thomas Following up on your posts from your previous posts 1 and 2 Attachment con

University of Cumberlands Crowdsourcing as a Business Strategy Essay Hi Thomas

Following up on your posts from your previous posts 1 and 2

Don't use plagiarized sources. Get Your Custom Essay on
University of Cumberlands Crowdsourcing as a Business Strategy Essay Hi Thomas Following up on your posts from your previous posts 1 and 2 Attachment con
Just from $13/Page
Order Essay

Attachment contains post 1 and post 2 -> please check it out

Formulate a research goal or purpose statement related to addressing the problem you identified. Review the samples in this week’s materials for guidance. Don’t worry about identifying your intended research methodology (e.g., “phenomenological”, “quantitative”). Try to explain in 1-3 short paragraphs what you would hope to accomplish if you were to try to attack the problem you previously identified.

After composing your goal or purpose statement, compose 4-6 open-ended research questions. The answers to these research questions should help you achieve your goal. See this week’s materials for examples.

Post your problem statement, goal/purpose statement, and research questions in this week’s discussion forum. 1
Running head: NETWORK SECURITY PROBLEM
Network Security Problem
Institution
Name
2
NETWORK SECURITY PROBLEM
Part 1
An unsolved problem in the field of IT strategic management that could be addressed by
additional research is network security or data security. Although that information technology
professionals have seemed to be aware of this problem, the existing measures do not provide
appropriate solutions. Hacking and other cybercrimes are common than before, which puts both
small and large companies at risk of being hacked. Despite that, research has concentrated on
providing several measures such as user Id and password policy, use of firewalls, and data
encryption, among others, they have not entirely stopped hacking. More research, therefore, needs
to be done in order to find a better solution to this problem (Studebaker, 2017).
The negative effects of hacking are that once it occurs successfully, important information
and data will land in the hands of unauthorized people. Stakeholders’ private and confidential
information may be used maliciously by hackers. Although people may think that the problem may
occur once, its consequences such as destruction of the company’s reputation and exposure of
business secrets have far-reaching effects on the future of the business. Strategic management
requires that a company looks at ways that will eliminate future threats as the company seeks to
exploit new opportunities. Hacking as an IT problem hinders strategic management (Studebaker,
2017).
Part 2
Campos, J., Sharma, P., Jantunen, E., Baglee, D., & Fumagalli, L. (2016). The Challenges of
Cyber-security Frameworks to Protect Data Required for the Development of Advanced
Maintenance. Procedia CIRP, 47, 222–227.doi: 10.1016/j.procir.2016.03.059
3
NETWORK SECURITY PROBLEM
The author in this article explored the challenges that face network protection, which hinder
IT specialists from coming up with sustainable maintenance measures that are advanced
enough to stop the problem occurring again. The author’s primary objective was to identify
the important data management aspects that involve maintenance and monitoring,
especially during an era coupled with emergent development in technology. The author
conducted an empirical review which formed the source of information over which the
study conclusions were made.
Murali. (2019, September 10). Eliminating Cyber Threats in 2020: Why Enterprises Need to
Rethink
Cyber
security.
Retrieved
November
4,
2019,
from
https://www.entrepreneur.com/article/339308.
The article suggests that organizations need to rethink the issue of cyber-security. The
author highlights that data breach is a major problem facing many organizations today, and
the future appears to be threatening since more challenges may occur.
Lafuente, G. (2015). The big data security challenge. Network Security, 2015(1), 12–14. doi:
10.1016/s1353-4858(15)70009-7
The study suggests that one of the key issues that have led to data security vulnerabilities
when using big data in cloud computing is how data is managed. The author concluded that
companies should consider what data can be stored on the cloud as part of the data
management if cyber-security challenges and risks are to be eliminated. The article
highlights that the commonly used approaches to reducing hacking and other
4
NETWORK SECURITY PROBLEM
vulnerabilities have many loopholes due to the advancement in technology, as has been
with the case.
Mansfield-Devine, S. (2017). The right response: how organizations should react to security
incidents. Network Security, 2017(12), 16–19. doi: 10.1016/s1353-4858(17)30124-1
The article suggests that cyber-attacks have become a normal thing among many
organizations and industries. As a result, companies should come up with a proper response
towards bringing this issue to an end. The author concludes that the best approach towards
ending data security breaches will be based on an understanding of the risks each
organization and industry faces so that they can device-specific measures to overcome
them.
Gould, D. (2019). Organizational Resilience Approaches to Cyber Security. Cyber Law, Privacy,
and Security, 1189–1199. doi: 10.4018/978-1-5225-8897-9.ch057.
The article indicates that many organizations have remained resilient to the challenges,
vulnerabilities, and risks in maintaining cyber security. However, the resilience has come
to a place whereby it is no longer the desired approach towards protecting data and
information from all vulnerabilities that have been witnessed over the years.
Bianco, D. (2019). 10 ways to prevent computer security threats from insiders. Retrieved
November 5, 2019, from https://searchsecurity.techtarget.com/feature/Ten-ways-toprevent-insider-security-threats.
5
NETWORK SECURITY PROBLEM
The article recognizes that a myriad of security threats exist both from within the
organization from external sources. However, despite suggesting various methods to o
overcome these security threats, all what most organizations have succeeded in is reducing
their rate of occurrence. As a result, the author fails to have recommended approach that
can help overcome the challenge.
Crisler, V. (2017). Rethinking the Approach to Cyber Security. Retrieved November 5, 2019, from
https://hackernoon.com/it-is-time-to-rethink-our-approach-to-cyber-security9c624f35cca2.
The article highlights that companies need to rethink on the approaches that have been used
in the past to overcome cyber security. The author poses two questions that organizations
should ask themselves concerning this problem. The first question seeks to determine why
cyber security is still an issue despite the huge investment made by companies to avoid it.
Secondly, the author wishes to understand whether the solution to the problem is to employ
technical experts in organizations since the incidences seem to be increasing.
Network attacks – Overview, prevention, monitoring, tips. (2019, October 29). Retrieved
November 5, 2019, from https://www.paessler.com/networkattacks?gclid=EAIaIQobChMI1IiFoenS5QIVWIjVCh0CEAS_EAMYAyAAEgKD1PD_
BwE.
The article recognizes that network attacks are a major concern among many organizations
and thus proper measures should be taken to overcome. One of the methods that can be
used ensuring that these attacks is by using preventing approaches that have been tested.
6
NETWORK SECURITY PROBLEM
The challenge is that majority of the suggested methods are applied and have not proved
to bring the problem to an end. The authors further suggests that monitoring the network
continuously can help in overcoming the problem.
7
NETWORK SECURITY PROBLEM
References
Bianco, D. (2019). 10 ways to prevent computer security threats from insiders. Retrieved
November 5, 2019, from https://searchsecurity.techtarget.com/feature/Ten-ways-toprevent-insider-security-threats.
Campos, J., Sharma, P., Jantunen, E., Baglee, D., & Fumagalli, L. (2016). The Challenges of
Cybersecurity Frameworks to Protect Data Required for the Development of Advanced
Maintenance. Procedia CIRP, 47, 222–227. doi: 10.1016/j.procir.2016.03.059
Crisler, V. (2017). Rethinking The Approach to Cyber Security. Retrieved November 5, 2019,
from
https://hackernoon.com/it-is-time-to-rethink-our-approach-to-cyber-security-
9c624f35cca2.
Gould, D. (2019). Organizational Resilience Approaches to Cyber Security. Cyber Law, Privacy,
and Security, 1189–1199. doi: 10.4018/978-1-5225-8897-9.ch057
Lafuente, G. (2015). The big data security challenge. Network Security, 2015(1), 12–14. doi:
10.1016/s1353-4858(15)70009-7
Mansfield-Devine, S. (2017). The right response: how organisations should react to security
incidents. Network Security, 2017(12), 16–19. doi: 10.1016/s1353-4858(17)30124-1
Murali. (2019, September 10). Eliminating Cyber Threats in 2020: Why Enterprises Need to
Rethink
Cyber
security.
Retrieved
November
4,
2019,
from
https://www.entrepreneur.com/article/339308.
Network attacks – Overview, prevention, monitoring, tips. (2019, October 29). Retrieved
November
5,
2019,
from
https://www.paessler.com/network-
8
NETWORK SECURITY PROBLEM
attacks?gclid=EAIaIQobChMI1IiFoenS5QIVWIjVCh0CEAS_EAMYAyAAEgKD1PD_
BwE.
Studebaker, K. (2017, July 13). The Most Common IT Problems Your Company Faces. Retrieved
November 4, 2019, from https://www.coordinated.com/blog/5-common-it-problems.
Running head: CROWDSOURCING AS A BUSINESS STRATEGY
Crowdsourcing as a Business Strategy
Name
Institution
1
CROWDSOURCING AS A BUSINESS STRATEGY
2
Introduction
The Spence Company is a Hollywood based company that writes and edits scripts on behalf
of studios within the area. The Spence company has created a niche within the production process
of creating scripts from previously performed plays, real-life events, or recorded events that need
to be recreated. The audios or videos provided are then transcribed into transcripts that can be read
and understood by a larger audience. The diverse nature of the audio/video recordings makes it
difficult for a dedicated team of transcriptionists to be assembled.
Micro-labor need
Additionally, the pay per minute is not sufficient to meet the federal minimum wage
requirement as the tasks don’t require a high level of expertise or schooling. A high school diploma
is sufficient for an individual to be trained and be good transcriptionist. Spence has, in response
created a website for interested contractors to apply, complete and submit the tasks as required
creating the micro-labor environment that the firm operated within. As stated, the job of
transcribing audio/video files into word documents can be done autonomously by contractors
without the need for physical interaction through a web portal. The arrangement is further
enhanced by the existence of supporting infrastructures like broadband internet and online
payment services.
Whether the data services can be crowd-sourced
The services can, therefore, be crowd-sourced as small part-time jobs that signed up
contractors have access to over a period. Crowdsourcing is important to the firm for several
reasons, apart from the cost-benefit already stated. Some of the audio files may contain heavy
accents that can be effectively transcribed by locals from that area/region. Crowdsourcing
CROWDSOURCING AS A BUSINESS STRATEGY
3
increases the pool of talent available to the company to cover for any tasks that may arise (Peer,
Brandimarte, Samat & Alessandro, 2017). Another benefit of crowdsourcing is that the company
can operate a 24/7 service because of the different periods across the world.
Drawbacks to Crowdsourcing
However, there are drawbacks to crowdsourcing that the company may face as it rolls out
the program. The first drawback is the difficulty with maintaining standards across the board due
to the different backgrounds of the individual contractors. Secondly, the time allocated for each
task may not be easy to determine, given the peculiarities of the contractor and task.
The incentives to the ‘Crowd’
Crowdsourcing is a form of part-time employment that provides a living, more so for
regions with a depressed economy and few economic activities. The business practice is also
flexible for most of the ‘crowd’ as tasks are performed at home at one’s convenience. The regular
pay of the crowdsourcing is also an added advantage that makes crowdsourcing appealing to the
contractors.
CROWDSOURCING AS A BUSINESS STRATEGY
References
Peer, E., Brandimarte, L., Samat, S., & Alessandro, A. (2017). Beyond the Turk: Alternative
platforms for crowdsourcing behavioral research. Journal of Experimental Social
Psychology. Volume 70, May 2017, Pages 153-163. Retrieved from:
https://doi.org/10.1016/j.jesp.2017.01.006
4

Purchase answer to see full
attachment

Homework On Time
Calculate the Price of your PAPER Now
Pages (550 words)
Approximate price: -

Why Choose Us

Top quality papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional academic writers

We have hired a team of professional writers experienced in academic and business writing. Most of them are native speakers and PhD holders able to take care of any assignment you need help with.

Free revisions

If you feel that we missed something, send the order for a free revision. You will have 10 days to send the order for revision after you receive the final paper. You can either do it on your own after signing in to your personal account or by contacting our support.

On-time delivery

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & confidential

We use several checkers to make sure that all papers you receive are plagiarism-free. Our editors carefully go through all in-text citations. We also promise full confidentiality in all our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

You are welcome to choose your academic level and the type of your paper. Our academic experts will gladly help you with essays, case studies, research papers and other assignments.

Admissions

Admission help & business writing

You can be positive that we will be here 24/7 to help you get accepted to the Master’s program at the TOP-universities or help you get a well-paid position.

Reviews

Editing your paper

Our academic writers and editors will help you submit a well-structured and organized paper just on time. We will ensure that your final paper is of the highest quality and absolutely free of mistakes.

Reviews

Revising your paper

Our academic writers and editors will help you with unlimited number of revisions in case you need any customization of your academic papers