Preview

Case Study Woldwide Games

Good Essays
Open Document
Open Document
358 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Study Woldwide Games
1. What steps could Worldwide Games have taken to prevent the hack into its system? Why do you think this was overlooked at this tech company and what can be done to rectify this problem in the future?

The company could have installed proper scanning software to identify any clues to suggest that the system could be hacked. They could have had a continuous test to check on any attacks and they can identify any vulnerable points in their network that can be accessed to prevent this the company should have set up a firewall. I think that the company never thought they would get hacked. The Firewall would prevent outside threats such as hackers and viruses.
2.
After the fix, the company announced a major shakeup within its corporate structure. Do you think that this was a good move? Why or why not?

It was necessary to make a major shake up within the corporation to make their customers feel safe and secure to use their system.

3.What makes innovation important at Worldwide Games? Give at least one example to support your answer?

Innovation is very important at the Worldwide Games because they need to keep the gamers interested and intrigued. They needed to use social networking as well as the ability of broadband Internet to deliver fast audio and video to keep the games exciting and keep the gamers online.
4. Following the hacking incident, how might bureaucracy be expected to interfere with innovation? How should the company engage in “bureaucracy busting”? How important do you think this is for the company and for its customers?

When bureaucracy gets involved it can be expected that they get more control, rules, policies, and procedures by the management. Bureaucracy puts limits on creativity on workers. Bureaucracy busting can be acquired by breaking down the company’s red tape. Employees can do more when they do not have constraints. To help this the company needs to have all employees know the policies and have open communication at all levels in the

You May Also Find These Documents Helpful

  • Good Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 946 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    United States: Why Our Institutions Fail Us and How to Fix Them, University of Pennsylvania…

    • 6251 Words
    • 26 Pages
    Powerful Essays
  • Better Essays

    Comparative Book Review: Making the Case or Beating the System? Charles T. Goodsell, The Case for Bureaucracy: A Public Administration Polemic (Washington, DC: CQ Press, 2004). 208 pp. $COST (paper), ISBN: 9781568029078. Russell L. Ackoff and Sheldon Rovin, Beating the System: Using Creativity to Outsmart Bureaucracies (San Francisco, CA: Berrett-Koehler Publishers, Inc., 2005).…

    • 2048 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    · How would you identify and characterize the roles of incentives, training, and education in promoting innovation in your organization? (250 words max.)…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 1 Exercise 1

    • 835 Words
    • 3 Pages

    Online gaming is big business these days, with thousands of people connected to each other every…

    • 835 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    After a thorough investigation by federal law enforcement it had been determined that hackers were able to infiltrate the network and place malware on several pieces of the companies Point of Sale (POS) systems. The attackers were meticulous and thought through their attack, attempting to…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    There are steps that the IT department could have taken to avoid the situation that occurred. There should have been policies in place to ensure that antivirus/malware software was installed on the computer before it was allowed to connect to any network. A machine build checklist could be implemented to where after a computer is initially setup with appropriate operating software, all relevant applications needed would then be installed, including the antivirus software. The endpoint protection software could be installed in a standalone mode if the system being deployed was not going to be part of the larger domain network or if it was going to be used for short term testing. Otherwise it could be deployed from a central management server. It would at the very minimum have that protection on it. Most antivirus vendors have auto update features in their software so that in the event the virus definitions become outdated the software automatically checks in to download the latest definitions.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Outline the external drivers and hindrances for innovation in relation to your chosen organisation (or product).…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your problem is which of the following?…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Online play allows you to play some on in china while you are in Ohio. The companies have expanded this tremendously. Its basically like an AOL or MSN chat room that players pick to play each other. So now instead of playing your friends and beating them to where it’s no fun anymore you can play anyone anywhere now from city to city or take it national. Gaming is going to continuously grow. The industry has made almost as much as Hollywood producers. More and more young adults are going towards game designing instead of producing movies. Gaming is as big now as cinemas where when they first game out. Instead of going somewhere you can buy a gaming system and stay at home and play.…

    • 864 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Bureaucracy may seem like something that was made during the modern times, but actually it has served in our government for almost as long as the government has existed. As a result of the use of bureaucracy in our government, it is also embedded into the people’s everyday lives. The people rely on bureaucracy every day, when you deposit financial aid check sent to you by the Department of Education, the use of medication approved by the Food and Drug Administration, or even driving to school in a car that meet safety demands by the Department of…

    • 685 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Eastman Kodak

    • 314 Words
    • 2 Pages

    The company seems to be in good standing from a profitability viewpoint. If they continue with the changes to the company’s structure, they should be able to stay in a profitable income…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Federal Bureaucracy

    • 1135 Words
    • 5 Pages

    The Federal Bureaucracy hires thousands of employees to complete specific goals. Those employed attempt to achieve these goals proficiently, however their goals and procedures are part of a continual struggle for power; which inevitably leads to ineffective behavior known as red tape (Pearson Education). Many have attempted to change the way the federal bureaucracy does business in order to help improve the services provided to the public.…

    • 1135 Words
    • 5 Pages
    Better Essays
  • Best Essays

    In the recent past few months of this year, a number of tech companies have been hacked into, a few of them being Facebook, Apple, Burger King, the New York Times and NBC. It is believed by some that the responsible parties for such cyber attack has been the Chinese Government, although no concrete proof has been dug out to support the same. The statistics by Symantec, the company behind the creation of Norton Anti-virus state that almost 40% of the cyber attacks committed in the year 2012 were aimed at business organizations with staff strength of not more than 300. Almost all the companies having a domain on the internet are prone to cyber attacks, given the tools and medium of…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    WebTel, one of the internet services providers in U.S., is looking for an opportunity to increase revenues coming from the gaming user segment. This segment is the main customer of the WebTel’s broadband internet services and spent $7 billion each year to the gaming industry that grows at an annual rate of 16 percent. WebTel aims to engage with this segment deeply by truly understanding their interests and priorities and get a share of the cake.…

    • 1561 Words
    • 7 Pages
    Powerful Essays

Related Topics