Security design and implementation: Participants should incorporate security as an essential element of information systems and networks. Participants should focus on the design and adoption of safeguards and solutions to manage potential harm from identified threats and vulnerabilities.
Security management: Participants should adopt a comprehensive approach to security management. The approac
management system. It also dominates an emerging market such as Indonesia and China ahead of other competitors so it could get low price mobile phone market.
Actively Using Outsourcing
Nokia could acquire distribution channel between product and customers with relatively low cost by outsourcing. Since distribution channel is not directly related to product quality, Nokia could gain competitiv
system (if require)
5. offer real-time parking information by connecting network
6. maximize effectiveness and increase customer service efficiency
1. minimize complaints by securing evidence when vehicle was damaged
2. immediate response by button when emergency
3. connect to police if car is stolen
4. securing car number in around in accident
1. reduce management labor cost ( expecte
information about profits; it should be confidential for a small sized guest house like Zen Backpackers, in order to keep the management method from being taken by competitors in the same industry. However, the only thing he mentioned was only 30% of the total profit becomes net income.
4) Reservation System
Travelers can make a reservation directly through its own website and well-kn
information with their existing database, G market can use this source to CRM. This procedure will explained in the following parts.
3.2 ISP& ESCROW&SSL
To ensure the security of E-commerce, G market provides some security program for transaction. This is represented by ISP, ESCROW service. Also, there is a SSL protocol that is used to protect the private information and credit card informati