In: Operations Management
Case Study
ABC Company observes that the confidentiality of their workers is
compromised while using the eservices provided by the partner
company. Further investigation has highlighted that whenever a user
uses their unified profiles to access the partner’s company
services from the relevant mobile application, their
confidentiality is compromised and data theft patterns are
observed. The situation is alarming and makes them focus on how the
mobile application that gives access to partner’s eservices are
vulnerable. Further investigation is done in this regard and it is
found out that whenever a user sends a request to use any of the
partner company’s eservice, only at that instance the
confidentiality is being compromised. This may mean that the
gateway at either one of the party’s end has already been compromised. Further
investigation highlights that the cause is not the gateway but the
common reusable APIs used in their mobile application. It is also
noted that the same mobile application is working fine for the
internal accessible services but start malfunctioning when partner
company’s eservices are accessed. A team of researchers is hired to
establish a framework of utilizing the known reusable component for
unified service consumption from multiple sources considering the
security dynamics of ABC country.
A : Identify the problem area from the above Case study description
and elaborate how this problem area can be resolved using the
current world technical solutions or tools.
B: Highlight the titles of SIX (6) possible generic
research design phases applied for any research.
-Mention which of these highlighted phases are applicable in this
case.
-Also highlight whether the research methodology be quantitative
or qualitative in this case.
Answer A= The main area of concern in the stated case is the issue of the confidentiality of their workers as there are some security related issues with a mobile application that gives access to partner’s eservices indicating that there has been some violation in any of the gateways of both the company or its supplier. The other issue in the case is the portability of the mobile application with the partner company’s eservices
In order to overcome these two issues, it is advisable to implement greater security measures such as the use of a firewall, double authentication of the user and changing the mobile application platform so that it can work well with the company’s eservice platform.
Answer B= The SIX (6) possible generic research design phases applied for any research are as below=
Identify the problem
Define the main objectives
Design and development of the model
Testing of the model
Comparing and appraising the results of the testing
Conveying the outcomes of the testing
All the six phases will be implemented in the given case as the research team has to start from the very basic step of looking into the issues that are being faced and then trying to establish the main goals that are to be achieved. Then accordingly, the team will develop the new model, test it and compare it with the older models and if the tests are favorable and are helpful in overcoming the problem face din he existing model then the new model can be implemented.
This research will be qualitative research as the main focus will be on the features and possible security breaches