Leverage of technology is when a business makes fundamental changes in the way they conduct every aspect of the business. The operation of Nike has shown that leverage technology is here to stay. One of the recent initiatives undertaken by Nike is when it expanded its digital footprint by launching the Nike app in Japan. The app has continuously increased new members at a strong double-rate and also increased the double-digit in member engagement and buying. Nike has managed to personalize retail by having consumer data and analysis around consumer data. Through the application of technology, Nike has managed to leverage its institution by using increasing it with real data as to what consumer preferences are.
One of the challenges that companies experience when expanding its digital footprint is security challenges through breach of data. Nike has managed to guard against the breach of data through the RCISC’S approach which deals with tracking of new strains of malware and vulnerable software. This warns retailers against any possible cyber threats. Nike makes use of a centralized system that gives them an easy way to spot any warning signs. However, the tracking approach may not address data breaches major issues. Another initiative held by Nike to prevent breach of data is the use of strong policies and updated technology. Customer personal information is usually self-regulated by Nike which makes use of rule to follow when handling customer information. Strong policies also ensure that there is an adequate protocol to be followed in case of any data breaches. For instance, the security protocol dictates that customers should be notified, credit cards may have to be reissued and the entire security system undergo scrutiny and updating.
Delegate your assignment to our experts and they will do the rest.
In comparison with the other student, truly leverage technology is not going anywhere and all organizations are working to preventing any breach of personal information. The organization used by my classmate makes use of hardware controls like that of a key card. Private information that stores data has restricted access. The organization engages in a significant amount of work but still strives to keep every information private. The analysis also showed that there were policies that were put in place to ensure that personal data is protected. Some of the policies include having the doors locked. This was similar to the policies incorporated by Nike that include having a system that is up to date and incorporates antimalware.