Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Describe the five forces in Porter’s competitive forces model and explain how the internet has affected each one.
Explain how internet works. Assume you are talking with someone who has no knowledge of information technology.
Research the case of www.nissan.com. Is Uzi Nissan cybersquatting? Why or Why not? Support your answer.

Recruiting High-Quality Students

  • The data that your recruiter would gather in this process

To recruit the high-quality students, the recruiter would gather every students basic information such as their name, parents name & background, their age, academic background till date, extra-curriculum activities information, interests or hobbies, internships, social work done, weakness & strengths , motivation sources, future perspective in terms of professional as well as personal and students attitude towards their life.

  • The information that your recruiter would process from these data

During the recruitment process, recruiter would process the information that are of their best interest and the one which fulfill the requirements. In this case all the above informations are of best interest of recruiter. The basic information of a student would give the knowledge about the students background and other information would show the attitude of student.

  • The types of knowledge that your recruiters would infer from this information.

Certain things that could be inferred from these information- names, parents name & background, age and academic background would give the details on basic information of any student. Extra-curriculum activities information, interest & hobbies would give the details on students interests. Internship and social work done would give details on student professional life and how one will contribute towards the society. Strengths & Weakness and motivation sources would tell the recruiter that student gets motivated own its own or external sources are his motivation sources.  Future perspective would tell that how serious student is to achieve their goals.

Describe the five forces in Porter’s competitive forces model and explain how the internet has affected each one.

Porter’s five forces are tool that helps in analyzing the competition of the business. The five forces derive the competition intensity and determine the industry’s weaknesses and strengths. This model helps in understanding the structure of a company and its corporate strategy. The five forces are:

Competition in the industry:   This stage of five forces tells the number of competitors that are present in the markets and their ability to threats to the company. The larger the number of competitors along with the product and the service they offer which dominates the market.   

Potential of new entrants into the industry: The performance of a business also affects when any new market player enters in the market. The effective competitor is the one who require less money and time spend in creating their market positioning.  With the new entrants in the market, the option for the customer also increases for the product and services that are being offered.

Power of supplies: This five-force model stage states that the supply of any product or service can affect the number of customers. This also states that how easily suppliers can drive up the prices of product and services.

Porter's Competitive Forces Model

Power of Consumers: This stage of five force deals with the ability customers have to drive prices down. It can be understood as to how many buyers a company has and how much it would cost a customer to switch from one brand to another.

Threats of substitute products: Competitor’s substitutes that can be used in place of particular brand’s product or service (Dobbs, 2014).

Porter five-force model rightly explain the attributes of an attractive industry and helps in creating new opportunities that will be greater and less in threat. This industry is refers as the profitable industry. The unattractive industry is one where the combination of forces drives down the overall profitability. This type of industry would be the competition in the market. Internet has affected the five forces model as the resource-based analysis was very effective rather than this tool. Web enabled business can monitor the rate of unique visitors, showed the correlations with market value, net income growth and employee growth. It helps in understanding the page view, click through rate, conversion rate and stickiness. The bargaining power of supplier and consumer has increased as the information accessibility is increased which has narrowed the information gap. This has been a result of Internet enabled services, which has increased the customer, reach. This has also made it easier to enable the entry of new businesses into the industry.  As of now, companies perform very less activities in-house and rest of the others activities are been outsourced. This result in decreasing the management complexity among the new business and therefore, the threat to new businesses will be higher (Dälken,2014).

Explain how internet works. Assume you are talking with someone who has no knowledge of information technology.

In a very simple term, Internet can be explained as a wire that is buried in the ground that could be in form of fiber optical or copper. It is important because two computer connected through wire can communicate directly. To understand the Internet, let’s look it as a system with two main components. The first component is hardware which includes the wires and cables which carry information every second to its destination computer. There are several other types of hardware such as router, server, cell phone towers and satellites etc. These all devices are connected together which creates a network. Whenever, any element joins or leaves the network across the connection, the Internet changes a little. Connection is one of the static elements and other act as peripheral devices. Some of these elements are the end points. These ends point are usually known as clients, machines that stores the information is known as the servers and rest are the transmission lines which can be physical such as cables and wire or fiber optics or they can be wireless such as satellite signals, cell phones and radio (Paseka,2012).

Internet Functioning

The second component that helps in creating a network is the protocol. These are the sets of rules that help in completing the task which are been followed by the machine. Communication would not be possible without these sets of protocols. The machines won’t be able to send information to each other. Protocol is a method and common language for the machines to transmit data.

Internets being a global network, which connects one computer to another and therefore, each computer, have a unique address. It is generally in the forms of numbers ranging from 0 to 255 and looks like 123.148.2.601. The IP address is known as Internet protocol (second component).

If you connect the two computers together through Internet is known as Internet service provider (Lioy & Qualcomm Incorporated, 2010).

Research the case of www.nissan.com. Is Uzi Nissan cybersquatting? Why or Why not? Support your answer. How is Nissan (the car company) reacting to the www.nissan.com website?

Cyber squatting is a practice of registering names especially well known company or brand names, as Internet domains, in the hope of reselling them at a profit (Jeremiah, 2017).

Uzi Nissan, an Israeli immigrant to the United States who has been doing his business in North Carolina under his fro 20 years. He registered his company name as nissan.com in the year 1994 which he founded in 1991. Uzi Nissan’s Nissan mainly deals with Nissan Computers.

The dispute rises is that they Uzi Nissan’s Nissan happens to have the similar domain name as of Nissan Motors, a Japanese car manufacturing company. Nissan motors had caught this act in 2002. To which Nissan motors have filed a lawsuit on Uzi Nissan for cyber squatting and seeking 10million dollar in return.

According to the story published on www.nissan.com (Uzi Nissan), he had registered his company domain as nissan.com in 1994 but in 1996 march he had changed his website domain to nissan.net which was selling internet services including dial up connections and direct data connections to business. He didn’t had any bad intention to have nissan.com and nissan.net as his domain name for his businesses. When Uzi registered for his domain name in 1994, Nissan USA was still going by the name of DATSUN. This makes it clear that Uzi had no intension to use Nissan motors’s name. The domain name could be sold to Nissan Motors with any loss to Uzi by the mutual agreement among both the parties (Pesochinsky, 2010).

Nissan's Cyber Squatting

You can use location-based tools to help you find your car or the closet petrol station. However, some people see location-based tools as an invasion of privacy. Discuss the pros and cons of location-based tools.

 A location-based tool is the combination of automatic vehicle location with software that collects the data about the location of the vehicles. Modern location based tools use GPS technology to track the location of devices. Vehicle information can viewed on map via a map or specialized software. There are several types of tracking devices exist. They are usually classified as “active” and “passive”. Passive devices the location, speed, heading location and sometimes trigger such as key on/off, door open/closed.  Once the vehicle reaches to its predetermined location the data is downloaded for evaluation and the device is removed. However, active devices also collect the similar data but transmit the data real-time through cell or satellite networks. Many devices as of today, uses the both active and passive tracking abilities.

The pros and cons of location-based tools can be classified as per business as well as for personal.

Pros for Businesses:

  • The small businesses can benefit using these location-based services through word of mouth marketing. Once any customer’s is at the company location, the business could out a welcome message or pop out a survey message of their services or products (Scellato, Noulas, Lambiotte & Mascolo, 2011).
  • The business can help real time communication with their customers. For example, in hotels, if any customer walk-ins the menu cards could be shown immediately and with the help of chat assistant customers could directly place their order, which directly routes to chef in the kitchen. The customer could also track their food items and at the end of their meal , the customer could directly get a bills on their devices and mode of payment can be chosen.
  • The business can also helps the customer showing the similar options as per the location of any customer.

Cons for businesses:

  • Major disadvantage of the location-based app could be that the people could consider this as their invasion of privacy.
  • The location-based app also prevents the business of web-based companies to participate.
  • If the company do not have the physical presence of business, that can also be one of major downfall for the customers.
An information security manager routinely monitored the web surfing done by her company’s employees. She discovered that many employees were visiting the ‘sinful six’ website. She then prepared a list of the employees and their surfing histories and gave the list to management. Some managers punished their employees. Some employees, in turn, objected to the monitoring, claiming that they should have a right to privacy.
  1. Is monitoring of web surfing by managers ethical? (Is it legal) Support your answer.

Employers have full rights to track web surfing, emailing and other activities of their employees who are using Internet services. Employer should consider the difference between monitoring and surveillance. It is important for the organization should have set written policies on internet and devices that clear the rights and responsibilities to all the employees. All employees should be aware about the risk of improper use of digital assets of the organization (Young, 2010).

  1. Is employee web surfing on the ‘sinful six, ethical? Support your answer.

Any action of employees should not harm the betterment and the goals of the organization. Employees should be well verse with the corporate policies of the companies and should be act accordingly. However, the employees not surf the sinful six sites as these may disrupt the work and cause distraction among all the employees (Liberman, Seidman, Mckenna & Buffardi, 2011).

  1. Is the security manager’s submission of the list of abuser to management ethical? Why or why not?

The security manager’s duty is to ensure that all the security norms of the companies are being followed from top management to bottom. They also need to ensure that some kind of external affairs doesn’t affect the data of the organization. The submission of list of abuser’s is absolutely ethical thing as it is the duty of security manager to point out who are misusing the facilities of the organization. Virus attacks, Ransom attack etc generally get attract through these sites only (Lunceford, 2011.).

  1. Is punishing the abuser ethical? Why or why not? If yes, then what types of punishment are acceptable?

If the corporate policies have strict regulation about these abuser, in such cases organizations are free to punish their employees. It is absolutely ethical from the part of organization as its is misusing of facilities provided to their employees. If there isn’t any written policy about it, in that case, employees should be issued with the letter of warning and top management can think on implementing these rules in their policies.

  1. What should the company do in this situation?

The company should be clear in their corporate policies about these situations. They can have a separate session for their employees and make them aware about the policies and their consequences. The company should also ensure to keep updating their employees incase if there is any change in their policies. The companies could also take a step forward and block the sites from the servers who fall under the categories of sinful six.

Reference

Dobbs, M., 2014. Guidelines for applying Porter's five forces framework: a set of industry analysis templates. Competitiveness Review, 24(1), pp.32-45.

Dälken, F., 2014. Are porter’s five competitive forces still applicable? a critical examination concerning the relevance for today’s business (Bachelor's thesis, University of Twente).

Paseka, T., 2012. Why Google went offline today and a bit about how the internet works. CloudFare Blog, November.

Lioy, M., Qualcomm Incorporated, 2010. Concurrent internet protocol connectivity to an access terminal and a tethered device. U.S. Patent 7,860,088.

Jeremiah, J., 2017. 15 New Tactics For Choosing The Right Domain Name-Internet discover.

Pesochinsky, Z., 2010. Almost Famous: Preventing Username-Squatting on Social Networking Websites. Cardozo Arts & Ent. LJ, 28, p.223.

Scellato, S., Noulas, A., Lambiotte, R. and Mascolo, C., 2011. Socio-spatial properties of online location-based social networks. ICWSM, 11, pp.329-336.

Young, K., 2010. Policies and procedures to manage employee Internet abuse. Computers in Human Behavior, 26(6), pp.1467-1471.

Liberman, B., Seidman, G., Mckenna, K.Y. and Buffardi, L.E., 2011. Employee job attitudes and organizational characteristics as predictors of cyberloafing. Computers in Human behavior, 27(6), pp.2192-2199.

Lunceford, B., 2011. The new pornographers: legal and ethical considerations of sexting. The Ethics of Emerging Media: Information, Social Norms, and New Media Technology. New York, NY: Continuum International Publishing Group, pp.99-118.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Recruiting High-Quality Students, Porter's Competitive Forces Model, Internet Functioning, Nissan's Cyber Squatting, Location-Based Tools. Retrieved from https://myassignmenthelp.com/free-samples/cois11011-foundations-of-business-computing/motivation-sources.html.

"Recruiting High-Quality Students, Porter's Competitive Forces Model, Internet Functioning, Nissan's Cyber Squatting, Location-Based Tools." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/cois11011-foundations-of-business-computing/motivation-sources.html.

My Assignment Help (2021) Recruiting High-Quality Students, Porter's Competitive Forces Model, Internet Functioning, Nissan's Cyber Squatting, Location-Based Tools [Online]. Available from: https://myassignmenthelp.com/free-samples/cois11011-foundations-of-business-computing/motivation-sources.html
[Accessed 23 July 2024].

My Assignment Help. 'Recruiting High-Quality Students, Porter's Competitive Forces Model, Internet Functioning, Nissan's Cyber Squatting, Location-Based Tools' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/cois11011-foundations-of-business-computing/motivation-sources.html> accessed 23 July 2024.

My Assignment Help. Recruiting High-Quality Students, Porter's Competitive Forces Model, Internet Functioning, Nissan's Cyber Squatting, Location-Based Tools [Internet]. My Assignment Help. 2021 [cited 23 July 2024]. Available from: https://myassignmenthelp.com/free-samples/cois11011-foundations-of-business-computing/motivation-sources.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close