You are on page 1of 7

Student name:

Student ID:

Course:

Date:
Table of Contents
Introduction:...............................................................................................................................................3
Key Words:..................................................................................................................................................3
Presentation of the company:.....................................................................................................................3
The ethical approach used in this company:...............................................................................................3
How would prevent or at least reduces the risk within the organization?..................................................4
Conclusion:..................................................................................................................................................6
References...................................................................................................................................................7
Introduction:
Most businesses store sensitive person data in their records, such as names, Social Security
numbers, Visa numbers, or other record information that identifies clients or employees. This
information is usually required to handle requests, satisfy financial obligations, or execute other
essential company functions (Sloot, 2014). However, if sensitive information comes into the
hands of untrustworthy individuals, it might result in extortion, fraud, or economic damages.
Given the cost of a security breach, losing clients' trust, and maybe in any case, defending
yourself against a claim while protecting individual data is simply good business.

A few firms may have the expertise in-house to carry out an appropriate structure. Others may
find it beneficial to engage a person for hire. The principles in this brochure will go a long way
toward aiding with keeping information safe, regardless of the size or type of the firm.

Key Words:
Privacy, social security, web page.

Presentation of the company:


GameStop is a large specialty retail brand shop for computer games and well-known
innovations. They are regarded as a multichannel store for games, consumer gadgets, and remote
administrations and are centered on conveying development to customers (Betzer, 2022). As one
of the biggest merchants, it has several challenges in keeping up with its on-the-lookout scenario.
As they constantly re-plan their plan of action, the firm has a strong business structure.

The ethical approach used in this company:


GameStop has clearly been successful in diversifying its business in response to the threats
coming from the digital download of video games. At least it has been more successful than the
market expected. Tech brands is skyrocketing and other segments such as digital and collectibles
are growing as well - the latter at a very good pace (Zhang, 2021). GameStop also has
knowledge and experience in selling gaming products which is why it can handle a wide product
portfolio and already have international market segments. Current diversification is also working
and enables high dividend payout.
Since then, GameStop has seen and realized how sophisticated content has rapidly impacted the
company. It has made a few steps to advance about here in order to remain relevant to the buyer.
Speculation funds have gone to both acquisitions and critical firms that are attempting to increase
their revenue streams as well as develop innovative skills. Up to this time, the results have been
mixed. To remain relevant in the computerized computer game industry, GameStop needs adapt
its organisation and strategy. GameStop has just reimbursed the full of its obligation and has
achieved substantial positive activity revenue. Because of their strong position, they are able to
provide earnings as well as repurchase stock.

Overall, GameStop is in a fantastic position to invest in technological change while also


expanding their presence in physical shops, regardless of digitalization, and capture a larger
piece of the global market if they choose this path. The horizontal and/or vertical integration can
increase the control over whole value chain, result in improved access to raw material and quick
product delivery to the final customer.

How would prevent or at least reduces the risk within the organization?
When it comes to protecting data within the organization, there are several capacities and the
board options to consider. Arrangements can help to restrict access, screen action, and respond to
threats. The following are the most often used practices and advancements:

Information disclosure is the first stage in quite a lengthy insurance, and it entails determining
which data collections exist in the organisation, which are business essentials, and which contain
sensitive information that may be dependent on consistency criteria.

Information misfortune avoidance- a collection of approaches and devices that may be used to
protect data from being taken, misplaced, or accidentally wiped (Isaak, 2018). Data disaster
anticipatory strategies often comprise a few tools to protect against and recover from data
misfortune.

Capability with worked in information insurance current accumulating hardware gives worked in
plate grouping and obvious repetitiveness. Reinforcement creates duplicates of information and
stores them separately, making it possible to reestablish the information later if a mishap or
modification occurs. Reinforcements are a fundamental process for ensuring company
consistency when unique information is lost, erased, or damaged, whether mistakenly or
maliciously.

Previews a representation is similar to a reinforcement, but it is a completed image of a protected


framework, comprising information and framework documents. A representation can be used to
partially restore a full framework on time.

Replication is a mechanism for continuously replicating information from a secure framework to


another location. This creates a live, forward-thinking duplicate of the data, allowing for
recovery as well as speedy failover to the duplicate in the event that the primary framework fails.

Firewalls are tools that allow you to monitor and direct network traffic. Firewalls can be used to
ensure that only the most trusted clients have access to or transfer data (khare, 2020). Controls
for verification and approval that let you assess credentials and ensure that client honors are
applied correctly. These activities are frequently used as part of a personality and access the
board configuration and in conjunction with job-based admittance rules.

Encryption-modifies information content according to a calculation that must be switched with


the appropriate encryption key. Encryption protects the data against unauthorized access
regardless of whether it is taken by making it ambiguous. More information may be found in the
information encryption handbook.

Endpoint security protects GameStop organization's access points, such as ports, switches, and
connected devices. Endpoint security software often allows to screen the organization's perimeter
and route traffic based on the scenario.

It is not commonly anticipated to remove information that has been erased, which minimizes the
requirement. This should be allowed once information has been processed and examined, or on
rare occasions when information is no longer applicable. Several consistency requirements, such
as GDPR, require the deletion of unnecessary material.

Disaster recovery is a collection of methods and inventions that determine how an organisation
handles a tragedy, for example, a digital assault, a catastrophic event, or a wide range of
equipment failure. The deluge recovery procedure generally incorporates establishing a remote
disaster recuperation location with duplicates of protected frameworks and shifting activities to
those frameworks in the event of a catastrophe.

Short crush emergency at GameStop increased client stress and exposed opportunities as a result
of poor straightforwardness and work procedure inside resource the board firms such as flexible
investments, private value assets, and elective resource the executives firms It is suggested that
combining as much of their work process procedures as possible into a single, adjustable stage
should deliver perceivability, basic information, experiences, and proactive notices to the whole
staff within the movement of an interaction or exchange (Newell, 2018). Front, center, and
administrative center work processes and activities should be visible, examined, followed, and
thought out how to finish in a single, simple structure. From research to trading, operational risk
and consistency, client assistance and promoting, and internal and external announcing
requirements should all be considered.

Conclusion:
GameStop is an electronic gaming business which is highly competitive. It adopts to rapid
changes in consumer preferences and technology and introduces new products frequently to keep
the interest of its users. They compete with electronic stores, computer products, video games
and PC software specialty stores, direct sales by software publishers, toy chain stores, mobile
and smartphone technologies (Long, 2021). GameStop’s organizational strategy is driving the
company to move forward in a tough and competitive environment. With the company’s focus
and drivers, it is pulling in more clients through the process of development and innovation. As
always, the company’s corporate culture frames the significance of key administration in
defining the organization through organizational objectives and targets.
References
Betzer, A. (2022). How online discussion board activity affects stock trading: the case of
GameStop. Financial Markets and Portfolio Management.

Isaak, J. (2018). User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection.
Computer, 56-59.

khare, N. (2020). A Secure and Privacy-Preserving Approach to Protect User Data across Cloud
based Online Social Networks. International Journal of Grid and High Performance
Computing, 1-24.

Long, C. (2021). "I Just Like the Stock" versus "Fear and Loathing on Main Street" : The Role of
Reddit Sentiment in the GameStop Short Squeeze. SSRN Electronic Journal.

Newell, B. (2018). Forewords ∙ Privacy as Antipower: In Pursuit of Non-Domination. European


Data Protection Law Review, 12-16.

Sloot, B. v. (2014). Do data protection rules protect the individual and should they? An
assessment of the proposed General Data Protection Regulation. International Data
Privacy Law, 4(4), 307-325.

Zhang, M. (2021). Valuation of GameStop Corp. Share Price. BCP Business &
Management, 225-228.

You might also like