information spent a lot of money protecting or procuring these protection methods and as such, sweeps them off the hard earn profits (Loudon & Loudon, 2016). In the event of any breach occurring, the organization faces hefty penalties which may become overwhelming for them to meet. A responsible organization must notify its customers about its ability to monitor and preserve their communication. This, in essence, is achieved through a number of ways. For instance, installing features and in mobile and computer devices that bears in them a notification of any happening with regard to undertakings within the organization. Alternatively, an organization can send messages to specific customers notifying them about their issues with regard to the privacy of their communications (Kortler & Pfoetsch, 2017). In addition, you can offer to listen to what your customers say and respond as aptly as possible. This will inculcate in the minds of the user a sense of security with regard to their information. End users often have a variety of ways with which they can respond to all the notification send to them by the organization concerning the security of their credentials. Basically, they can respond verbally where the notification was made face to face. Alternatively if there is a forum that has been created by the organization they can respond through that forum. In addition, where the application has been developed, they can utilize the tool and use it to respond to the notification given.
DISCUSSION 8 3 References Kotler, P., & Pfoertsch, W. (2007). Being known or being one of many: the need for brand management for business-to-business (B2B) companies. Journal of Business & Industrial Marketing , 22 (6), 357-362. Laudon, K. C., & Laudon, J. P. (2016). Management information system . Pearson Education India.
You've reached the end of your free preview.
Want to read all 3 pages?