10 pages. This case study looks into building electronic marketing capability for a specialty airlines that gives air tours from two to fourteen days. Dakota National Airlines will choose an option that is best for their particular situation and comments will be made on the advantages and disadvantages of choosing this particular method of marketing their services. Bibliography lists 11 sources.
Name of Research Paper File: D0_JAdakair.rtf
Unformatted Sample Text from the Research Paper:
Dakota National Airlines will choose an option that is best for their particular situation and comments will be made on the advantages and disadvantages of choosing this particular method of
marketing their services. DAKOTA NATIONAL AIR - INTERNET SECURITY The first matter that Dakota National Air wants to consider is that of Internet security. No matter which option
Dakota Air decides to choose as far as marketing their services, the fact is that Internet security is of utmost importance to them. Employing specific security providers may help to
avert potential breaches; however, there are inherent shortcomings with even the most sophisticated of systems. Mobile code attacks present one of the most difficult challenges, in that the increased
frequency is placing incredible pressure upon ways in which to stay ahead with solutions. All forms of Internet commerce can become victim to mobile code attacks, which threatens both
privacy and security aspects. Princeton University professor Ed Felten, co-author of Java Security: Hostile Applets, Holes and Antidotes notes that leaked or lost data represents a serious attack, which
could easily "involve industrial or military espionage, or could compromise personal privacy, corporate security, and trade secrets" (Keyser, 1998, p. PG). According to GTS consultant Robert Deets, representative of
a network security services company, these unwelcome security breaches have been a regular occurrence within industry and government but are kept quiet. "As with almost all security challenges, experts
say, the answer lies in a comprehensive approach that incorporates the three-pronged attack of policy, tools, and administration" (Keyser, 1998, p. PG). Another aspect of security providers that people do
not often consider is that of email systems. It had not been a problem just a few short years ago when the Internet was still more or less attracting