• Research Paper on:
    Case Study on Dakota National Air

    Number of Pages: 10

     

    Summary of the research paper:

    10 pages. This case study looks into building electronic marketing capability for a specialty airlines that gives air tours from two to fourteen days. Dakota National Airlines will choose an option that is best for their particular situation and comments will be made on the advantages and disadvantages of choosing this particular method of marketing their services. Bibliography lists 11 sources.

    Name of Research Paper File: D0_JAdakair.rtf

    Buy This Research Paper »

     

    Unformatted Sample Text from the Research Paper:
    Dakota National Airlines will choose an option that is best for their particular situation and comments will be made on the advantages and disadvantages of choosing this particular method of  marketing their services. DAKOTA NATIONAL AIR - INTERNET SECURITY The first matter that Dakota National Air wants to consider is that of Internet security. No matter which option  Dakota Air decides to choose as far as marketing their services, the fact is that Internet security is of utmost importance to them. Employing specific security providers may help to  avert potential breaches; however, there are inherent shortcomings with even the most sophisticated of systems. Mobile code attacks present one of the most difficult challenges, in that the increased  frequency is placing incredible pressure upon ways in which to stay ahead with solutions. All forms of Internet commerce can become victim to mobile code attacks, which threatens both  privacy and security aspects. Princeton University professor Ed Felten, co-author of Java Security: Hostile Applets, Holes and Antidotes notes that leaked or lost data represents a serious attack, which  could easily "involve industrial or military espionage, or could compromise personal privacy, corporate security, and trade secrets" (Keyser, 1998, p. PG). According to GTS consultant Robert Deets, representative of  a network security services company, these unwelcome security breaches have been a regular occurrence within industry and government but are kept quiet. "As with almost all security challenges, experts  say, the answer lies in a comprehensive approach that incorporates the three-pronged attack of policy, tools, and administration" (Keyser, 1998, p. PG). Another aspect of security providers that people do  not often consider is that of email systems. It had not been a problem just a few short years ago when the Internet was still more or less attracting 

    Back to Research Paper Results