Bus508 Technology and Security

Better Essays
BUS 508 | Assignment #4 Internet Technology, Marketing, and Security | Dr. Marilyn Carroll | | | 6/8/2012 |

Internet Technology, Marketing, and Security

The corporation I decided to discuss for this assignment is Staples; it’s the world 's largest office products company and a trusted source for office solutions. Staples provide products, services and expertise in the categories of office supplies, technology, furniture, Copy & Print, and cleaning and breakroom (Staples Corporate Page, 2012). Staple’s was founded in 1986 and is headquartered outside Boston, Massachusetts. The company employs 90,000 people worldwide and is currently ranked second in the world in ecommerce sales today with annual sales of $25 billion. Staples has a presence in more than 26 countries throughout North and South America, Europe, Asia and Australia (Staples Corporate Page, 2012). Staples.com, a division of Staples Inc. (NASDAQ: SPLS), is creating a business-to-business electronic marketplace offering a comprehensive solution for the office needs of business customers. It currently provides an electronic marketplace where small, mid-sized and large businesses can procure office products and business services and obtain business information and expert content. Staples.com includes the operations of Staples Inc. 's e-commerce sites: Staples.com, Quill.com and StaplesLink.com, and its Canadian e-commerce business (Arrington, 2011). The firm defines the ‘industry’ as all retail-online-direct mail and superstore companies. The industry is highly fragmented and penetration varies according to geographic region (Young, 2009). Staples.com is comprehensively set up to make a shoppers experience easy and informative, however it wasn’t always this way and vast improvements has been made over the last three years to make the site shopper friendly. If needed, a customer can find Staple’s contact information located at the bottom of the



References: Arrington, J. (2011, June). Staples Business Depot hit by data security breach. Retrieved from Cryptzone: http://www.cryptzone.com Staples Corporate Page. (2012, June 09). Retrieved from Staples: http://www.staples.com Young, A. (2009, August 29). Staples vs. Office Depot: Who Goes to the Head of the Class? Retrieved from Adage.com: http://adage.com/article/media/staples-office-depot-comparing-media-strategies

You May Also Find These Documents Helpful

  • Good Essays

    Bus508

    • 1077 Words
    • 5 Pages

    Entrepreneurial Leadership, Five Guys Burgers and Fries Professor Yemer Hassan Contemporary Business– Bus508 January 2013 Strayer University Five Guys Philosophy Five Guys beginning philosophy is to serve limited menu that includes just Burgers, fries, hot dogs and drinks, the best part is no science experiments are involved, like the burgers are 100% percent beef, fresh never frozen and hand puttied and the potatoes hand cut and deep fried in Peanut…

    • 1077 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Technology in the Security Field 7/23/2012 SEC/360 Technology in the Security Field Security and safety is the most important aspects in a security setting. The techniques that officers use to ensure security and safety are enhancing through the advancements in technology. Changes have been significant from the time before computers and the current status of high-tech computers and other technology. The changes have brought both positive and negative effects…

    • 1268 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Homeland security is not just about the physical barriers to keep terrorists and criminals out. It is a process to secure an area and keep people and assets safe. Cyber security is just as important as having a guard checking credentials at the entry of a port facility. As technology continues to grow so does the threat of cyber-attacks. So far technology as given way to x-ray scanners that allow containers to examined for nuclear/radioactive material without ever being opened. Port Security Officers…

    • 146 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Linux Security Technologies John Pierce SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country, it should be very apparent why an organization like NSA had such an interest in heading up development of a more…

    • 1126 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    BUS508 – Contemporary Business Internet Technology, Marketing, and Security Submitted to : Anne Nelson Prepared by : Dunella Patel Date : 12/1/2012 Social Media Marketing: The use of internet and social networking in the workplace has grown substantially over the last few decades. Because of this, individuals are now using the internet in various ways. Technologies such as social networking sites, blog sites and other innovations give individuals a chance to interact with one another…

    • 3008 Words
    • 13 Pages
    Best Essays
  • Good Essays

    Effectiveness of Biometric Technology in our everyday life 3.2: Biometric Technology and Border Security Origins Following the horrific events that occurred on September 11th, border security has become one of the biggest concerns of governments around the world. As such, government agencies have turned to Biometric Technology to detect unauthorized personnel and prevent them from entering the country, or for apprehending them. Their main concerns involved the areas of visa and immigration documents…

    • 668 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems. A fingerprint reader captures the curves and indentations of a fingerprint. Fingerprint readers can be set up to…

    • 264 Words
    • 2 Pages
    Good Essays
  • Better Essays

    References: eBay. (n.d.). Summary of our privacy policy. Retrieved from http://pages.ebay.com/help/policies/privacy-policy.html Google Finance. (2011, Nov). ebay. Retrieved from http://www.google.com/finance?q=NASDAQ:EBAY Security breach at ebay. (2008, March 27). Retrieved from http://www.auctionbytes.com/cab/abn/y06/m03/i27/s04…

    • 1713 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    IS3110 Risk Management in Information Technology Security STUDENT COPY: Graded Assignments © ITT Educational Services, Inc. All Rights Reserved. -73- Change Date: 05/25/2011 Unit 1 Assignment 1: Application of Risk Management Techniques Learning Objectives and Outcomes You will be able to identify different risk management techniques for the seven domains of a typical IT infrastructure and apply them under different situations. Assignment Requirements Introduction: As discussed in this…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    TECHNOLOGY AND NIGERIA’S NATIONAL SECURITY: CHALLENGES AND PROSPECTS INTRODUCTION 1. Human existence has been characterized with attempts by man to apply technology to control his environment with a view to improving his material existence. This has resulted in epoch making developments such as the discovery of gun powder and the invention of industrial machines both of which have had significant impact on the development of the society.[i] These technological innovations also had significant…

    • 8834 Words
    • 36 Pages
    Powerful Essays