Parts3&4 Customer Security and Business Analytics
Customersecurity and business analytics
Part3: Customer Security and Employee Ethics Opportunity
Datais one of the most invaluable asset of any organization and thecoffee shop need to implement effective policies to protect thisvaluable asset. The management policies implemented will ensurecustomers’ data is secured from any unauthorized use to preventmisuse of all information (Hone & Eloff, 2002). In order toensure the coffee shop information management policies are adheredto, an employee code of ethics is important in outline the dos anddon’ts with customer data. The coffee shop employees are expectedto comply with the following ethical procedures:
Obtain and use the data that is essential and directly associated to his/her role.
Keep customer data safely to prevent unauthorized access by third parties.
Disclose customer data with the coffee shop administration approval.
Observe confidentiality and integrity with customer data
Accordingto Hagen, Albrechsten & Hovden (2008), to ensure effectiveimplementation of information security measures in an organization,the employees should be included in the formulation of policies.Three policies will be implemented in the coffee shop to ensureeffective management of customer information.
Acceptable Use Policy-The policy will ensure the appropriate and authorized use of customer data for the right purpose. This policy aims to protect customer data from unauthorized access by third party and improper use by the coffee shop employees.
System Access and Security Policy- This policy intends to outline the guideline that the coffee shop employees will follow while using the shop’s computer systems and networks. The main purpose of this policy is to ensure confidentiality and integrity of customer data.
Thecoffee shop will adopt a prevention approach to InformationTechnology security. A prevention approach aims to prevent anypotential threats from emerging in the first place by handling theunderlying causes that generate IT security issues (Hagen et al.,2008). The main advantage of this approach is that it is inexpensiveand if effectively implemented can lead to effective management ofinformation. On the other hand, the approach has a weakness since itdoes not provide strategies, which should the coffee shop, shouldtake in case there is an Information technology security threat.
Itis very important to ensure that the employer-employee trust is notdamaged as the coffee shop implements strategies and policies toprotect customer data. Employees should be trained to enhance theirunderstanding of the implemented policies to ensure full compliance.Documents and equipment such as the coffee shop computers containingcustomer information should be secured with limited access to onlyemployees with a genuine need to use the information. To build trustwith the employees, the coffee shop management will give measurabletargets to every employee to ensure the customer information relatedto their work is protected from security breaches and upon achievingthe targets, the employees will be rewarded.
Part4: Business Analytics Opportunity
Allthe documented databases of the coffee shop will be reviewed,categorized and selected for analysis and tracking of thepremeditated plans for the coffee shop. The information to beselected and collected for the coffee shop data analytic opportunitywill include: marketing, sales, customer care, human resourcemanagement and the general operations of the coffee shop. To begindata gathering, expensive software are not needed because of theexistence of the established coffee shop website. At no cost, Googlehas a tool for observing Web traffic (Google Analytics) that offersall categories of data about people visiting the website (Laratro,n.d.). Google analytics will beused in extracting long-term data to reveal trends and otherimportant information to ensure sound and wise decision making forthe implementation of the strategic plans for the coffee shop.
GoogleAnalytics will be applied to differentiate patterns and meaning inthe information selected for business analytics opportunity. The toolwill track and analyze customer behavior based on their frequency invisiting the coffee shop website via either a computer or theirmobile phones. Laratro (n.d.) asserts that Googleanalytics use the information gathered to differentiate customerpatterns and get the meaning of the patterns thus, in this case, itwill help in implementing the strategic plan for the coffee shop.Coffee shop information can reveal patterns such: customerpreferences on basis of the type of coffee, most preferredaccompaniments to coffee, best coffee shop customer care servicesamong others.
Thepattern established from online customer behavior can help in makingdecisions to achieve the coffee shop’s online goals such asattracting more customers and implementing strategies that suitcustomer preferences to gain a competitive advantage over the rivalsin the market. Google analytics can also analyze social mediatraffic, which will guide the coffee shop management in making thenecessary changes to social media marketing based on what is and isnot working.
Hagen, J.M., Albrechtsen, E. &Hovden, J. 2008. Implementation and effectiveness of  organizational information security measures. InformationManagement & Computer Security, Vol.16, no.4: 377‐397.
Hone, K. and Eloff, J.H.P.2002. Information security policy – what do internationalsecurity   standards say? Computers & Security,Vol.21, no.5: 402‐409
Laratro J. (n.d). GoogleAnalytics – A Practical Guide to Implementation. Retrieved 23, June2015 from:http://www.verticalstudio.com/Portals/74398/docs/googleanalytics.pdf