1,405
28
Essay, 5 pages (1200 words)

Manage service desk

Educate and Train Users Human resource is the most important and valuable asset for an organization and more so if they are technically viable and talented. Hence, in order to make them more viable, they need to be trained and educated properly for the organization to reap maximum benefit out of them. Manage Service Desk and Incidents No matter how planned a business is, it is inevitable to avoid situations that are not predefined.

Every organization faces such incidents and only those are successful which manage them in the most successful way possible. Amazon has come a long way and through a lot of crisis and its survival is most evident proof of its efficient management. Manage the Configuration The configurations of matters are to be handled in the best manner possible for the procedure devised to be successful in the long run as well. Manage Problems As stated above, it is inevitable to avoid certain problems despite thorough procedures to handle unforeseen circumstances.

Hence, the Amazon more than concentrating on countering every problem possible should rather teach its employees to deal with any unforeseen circumstances in the best manner possible. Manage Data Especially in a business based in IT, there is a lot of information which needs to be handled tactfully in order to extract as much useful information as possible and leave out the one that may not benefit the business as much. Manage the Physical Environment Since Amazon is has its virtual front store on the internet and does not have a physical presence, therefore the concern for it are other retailers on the internet and the fierce competition that is facing day by day which is increasing with a dangerously drastic amount. Manage Operations The operations of an organization that has its transactions online and do not have a physical presence are not that huge, but still Amazon has to make sure that the operations are managed in the best manner possible.

Hence, it is very important for the business like Amazon to deliver the process in the most efficient manner in order to achieve the desired results and support the organization’s overall purpose. I. T. Governance Process Assessment in the Domain MEAfter the implementation comes the last stage of the cycle where the implemented process needs to be monitored as to everything is going right or not and evaluated as to whether the benefits achieved are surpassing the cost or not.

Monitor and Evaluate IT Performance The importance of IT in a business is mostly assessed by the benefits of implementing it surpassing the cost that it has incurred but for an organization that is entirely internet based it’s evaluation would be based on the consumer response to it which goes for Amazon as well. Monitor and Evaluate Internal Control Despite the importance of a free flow of information and a flat hierarchy, it is essential for the organization and similarly Amazon to make sure that it has some level of control over its employees as well in order to ascertain the proper implementations of procedure and reinforcement in case of repetitive mistake occurrence. Ensure Regulatory Compliance However important maybe the communication and lessening of gap among employees, it is more important to have compliance among the regulations that are laid down by the organizations. Hence, Amazon needs to make sure that the regulations in IT department are in coordination with that of the suppliers and so on and so forth. Provide IT Governance In every environment, governance is needed and when the entire business is based on IT, it is of utmost importance to make sure that not only the implementing is done in a proper way but the supervision is done in the most apt manner possible. Risks Involved for Amazon.

Com and RecommendationsDespite the existence of internet over the years, it has still not been able to gain trust regarding the transactions online. Amazon. com along with other organization based online for selling face the challenge of assurance of security to its customers. As for Amazon.

com, it failed to provide trust in regard of security to e-commerce project because they did not concern about technical risks. Despite the presence of a huge customer base, a lot of potential customers are hesitant to buy from amazon. com because of this particular reason. However, there is a long procedure regarding the security of credit cards and its personal information which is utilized by many websites present today. “ Many sites that accept credit cards claim they are secure when they have an encryption certificate.

This is where you can see the padlock symbol at the bottom of the screen. The encryption certificate encodes the message with the credit card details when it is sent and the organization issuing the certificate (e, g, Thawte or Verisign) verify the business before they issue it. (E-commerce Security, n. d. ). Amazon.

com follows the same long procedure of ensuring that the customer feels safe but even then there is a lot of chance of stealth of the information and its misutilization might lead to disastrous losses to an individual. This is the fear that stops the potential customers from entering into the market of internet. “ If credit card numbers are stored on a server they are still potential targets for a hacking attack. Afferent Media protects its server with anti virus and firewall systems. Its ultimate defense though is that it does not store any credit card numbers” (E-commerce Security, n.

d. ). Hence, despite the effort, due to technical risk involved Amazon. com is facing the same threat as many other online retailers.

Although Amazon. com has developed a trustworthy image over the years but when it comes to monetary losses people are hesitant to take risk as the loss incurred might get too huge to counter. This technical risk can however be countered in order to gain the potential customers that are hesitating at the moment. This can be countered if “ transactions are carried out in real time, in just the same way as an EFTPOS machine. The message is encoded and sent to the bank, if the card passes the checks then funds are transferred directly to the vendor. This is just like when you buy petrol or shop in a supermarket.

The vendor swipes your card in and EFTPOS machine, they do not store the card details. ” (E-commerce Security, n. d. ). Like every weakness, if this factor is also addressed in its early stages it might not even classify as a problem and may be included in one of the challenges but the more Amazon. com delays it, the more it might lead to disaster and reduction of customer base.

It has the advantage that the solution has already been identified, therefore the company just needs to incorporate this procedure in its security e-commerce procedure and keep proper checks and balances over a period of time and the job is done. Once the authenticity of the procedure is verified, it would not be hard for customer to develop trust in the online services. Despite the overall success of the organization, there are still factors that it needs to counter before the issues convert into real threat to the existence of the organization. The security factor is always vital in e-commerce as no customers would want to risk their monetary gains for shopping online. BibliographyJoin Associates. (2007).

Retrieved on 11th March 2007 from http://affiliate-program. amazon. com/gp/associates/join Business News. (2007). Amazon.

com to Webcast Investor Conference Presentation Morgan Stanley Technology Conference. Retrieved on 11th March 2007 from http://seattle. dbusinessnews. com/shownews. php? type_news= latest&newsid= 110363

Thank's for Your Vote!
Manage service desk. Page 1
Manage service desk. Page 2
Manage service desk. Page 3
Manage service desk. Page 4
Manage service desk. Page 5
Manage service desk. Page 6

This work, titled "Manage service desk" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Manage service desk'. 1 October.

Reference

AssignBuster. (2022, October 1). Manage service desk. Retrieved from https://assignbuster.com/manage-service-desk/

References

AssignBuster. 2022. "Manage service desk." October 1, 2022. https://assignbuster.com/manage-service-desk/.

1. AssignBuster. "Manage service desk." October 1, 2022. https://assignbuster.com/manage-service-desk/.


Bibliography


AssignBuster. "Manage service desk." October 1, 2022. https://assignbuster.com/manage-service-desk/.

Work Cited

"Manage service desk." AssignBuster, 1 Oct. 2022, assignbuster.com/manage-service-desk/.

Get in Touch

Please, let us know if you have any ideas on improving Manage service desk, or our service. We will be happy to hear what you think: [email protected]