Database Reference
In-Depth Information
A NetWeaver consultant's skills could be upgraded by
Training in ABAP development and further opportunities available in that activity
Training and participation in enterprise infrastructure upgrade projects
Training and participation in Web infrastructure projects
Training and participation in enterprise infrastructure management projects including
Web-enabled systems management, network management, and performance monitoring
systems
A functional consultant's skills could be upgraded by the following:
Cross-training in different modules. MM and PP consultants could be cross-trained in
either module as well as other related modules like QM, PM, PS, and SM. Similarly, FI and
CO consultants could be cross-trained in either module as well as other related modules like
AM, TR, FM, IM, CCA, PA, and EIS.
SCM systems.
Performance-enhancement programs like BPR, activity-based management, and Balanced
Scorecard.
14.6 Privacy and Security
The advent of the Internet has transformed the familiar issues of security and privacy beyond rec-
ognition. This is primarily because of the following:
Every computer can be accessed and influenced by any other computer anywhere on the
Internet; this effectively eliminates the concept of locality.
Businesses that are supported on such an extended and open IT substrate are vulnerable to
scrutiny and monitoring by interested parties.
Browsing and visitations of Websites to gather information in turn also expose the visitor's
behavior itself to interpretation and analyses.
Consumer privacy issues and concerns have a drastic effect on the enterprise's ability to market to,
connect to, and create an ongoing relationship with your customers (see Chapter 1, Section 1.2.6.5
“Permission Marketing” and especially NAOMI KLIEN). Consumers are gravely concerned regard-
ing the abuse of their privacy, but gathering a certain amount of information is necessary for com-
panies to personalize and to serve their customers better. Thus, there is a need for a balance between
protecting a consumer's privacy and the need for enterprises to target and personalize their offerings
to the customers. In 2000, the US Federal Trade Commission recommended fair information prac-
tices of notice , choice , access , and, security . Enterprises need to adhere to these practices when creating
and implementing their privacy policies. Third-party privacy seals are a good way to gain the trust
of consumers because these third-party consumer privacy protection organizations certify the enter-
prise's privacy policy.
There are two types of privacy seal programs. One has strict guidelines that prohibit sites from
sharing consumer information they collect with other business partners or from using it for direct
marketing programs. Secure Assure, which has 200 member companies, offers an audit program
but requires members to adhere to a stringent privacy guideline stating that the e-business will
never share a consumer's private information with a third party. Other privacy seal programs
Search WWH ::




Custom Search