Verified Document

Business Productivity The Affects Of Research Proposal

Achievement of the objective will be difficult to measure because it represent something that will not happen if the project is successful. A reduction in threats due to the actions or inactions of employees will result in achievement of these objectives. An employee questionnaire or survey would be useful in determining if the policies result in a greater awareness and adherence to prescribed policies regarding how to treat spam in the company. Increased awareness and willingness to take actions to increase security, as measured by a survey conducted some time after the policies are in place will provide insight into the success or failure of the prescribed measures. Evaluation

There are several contributing factors that will affect the outcome of the project and the ability to achieve the intended objectives of the study. The first factor will be the willingness of managers to disclose the real risks associated with spam. They may have differing perceptions of the real risks. They may tend to minimize or overstate the real risks involved in the amount of spam or junk email that they receive. They may not be aware of the real risks involved with spam and the affect that it is having on their company, which may have an impact on their interview and questionnaire answers.

The impact of spam on companies will have to be considered in terms of the quality and level of spam security that the company has installed. It would be expected that companies with no spam or junk email protection would be inundated with unwanted email to a higher degree than companies that have installed sophisticated spam protection packages.

The key strategy that will be used to achieve the objectives will be careful analysis and identification of the root cause of the problems with security. For instance, if the interviews and questionnaires indicate that the problem is more software related, these issues will be at the forefront of the solution and more efficient software, or perhaps layers of software will be used to target the problems. However, if people are found to be the problem, then training and policies will be used to address the issues. For instance, if it is found that employees are engaging in activities during lunch that involve accepting solicitations from sponsors to play a game or take a quiz, then these issues will have to be addressed in order to reduce the amount of spam coming into the computers.

Interviews and questionnaires will be the key tools to evaluate the risks and root causes of problems found during the study. Ecommunication within the company will be used to evaluate the number and threats associated with spam and junk mail within the company. It might be noted that employee perceptions regarding email risks and threats may be different than the information revealed through the actual examination of the email itself. This analysis will serve as a comparison to the perceived threats and risks associated with spam and junk email within the company.

The strategy to be implemented in an attempt to reduce bandwidth usage and improve security protocols will entail a comparison of the perceived vs. The actual risks associated with spam and junk email will be to identify the causes of these problems. The solution to the problem will be to devise a published set of protocols to help reduce the amount of email coming into the company and to help improve security. Increased security will be achieved through a combination of action and awareness of the potential problems associated with spam. Employees will have a set of actions that they can take to help increase security and decrease spam and junk email within the company.

Target

This study will be directed towards department managers and those within the company that are responsible for helping to reduce operating costs and increase profits within the company. The primary audience will be managers who wish to take positive steps to help reduce the security risk and operational problems associated with spam and junk emails. It is intended to provide them with a strategy for helping to reduce their associated risks within the department. The target audience of the study will also be part of the sample population as well, but not all of them.

Chapter 2: Literature Review

The problem of spam began as a minor annoyance, mush on the same level as junk mail through the post office. It was easy enough to just delete it or ignore it. However, spam and junk...

Recently, this topic has caught the attention of the academic community and studies indicate that this problem is more than an annoyance. It represents a major cost and security risk for companies. The following will examine relevant literature regarding spam and issues of bandwidth and security issues due to spam and junk email.
The Affects of Spam and Junk Email on Business

Several studies examined the costs and other losses associated with the high number of spam that companies typically receive. The costs of spam can be divided into tangible and intangible costs. Tangible costs include the costs to purchase anti-spam software and hardware to combat the problem (Edwards 2007). Lost productivity due to the time it takes to read each email could be viewed as either a tangible or an intangible cost (Edwards 2007). Waster storage is another tangible cost, particularly if it results in the purchase of extra storage space or devices (Edwards 2007). One of the more difficult intangible costs is the amount of cost that is passed onto the customer from ISPs (Edwards 2007). Spam harms business and can lead to damage to their reputation, especially if it was their computer that acted as the zombie and sent out a virus to everyone in their customer base.

How does Spam Work?

Spam and junk emails are a form of direct marketing. This marketing technique relies on the statistical assumption that if one sends out enough ads, most people will reject it, but a certain number will respond (McCusker 2005). Unlike bulk mailing, which entails printing costs, stuffing envelopes, labels, and the costs of mailing, spam is a low cost alternative. Cost estimations indicate that the cost of sending an email is between U.S.$0.000082 and U.S.$0.000030 (McCusker 2005). This amounts to upwards of U.S.$0.50 to over a dollar for conventional bulk mail through the Post Office. As one can see, spam is the cheap alternative to the old fashioned version of direct mail. Companies can send out millions of emails and they can do it repeatedly every day. One case reported that a response rate of 0.0023 led to a sales of $1,500.00 (McCusker 2005). This venture only cost the spammer $350.00 (McCusker 2005). Almost 1/3 of all email respondents will click on the email and at least read it (McCusker 2005). This is a very lucrative marketing technique.

Spam can only be sent to valid email addresses. Spammers obtain these lists from internet sites, such as chat rooms, blogs, or other means. They may use corporate email addresses, as these sites are often designed to build customer relations (McCusker 2005). Spammers use software that tracks back to them to confirm that a recipient has read the email.

The most noxious of the techniques used to obtain valid email addresses is called a "directory harvest attack" (McCusker 2005). In this strategy, the spammer will attempt to deliver emails to corporate addresses using any number of possible name combinations. They send them out and see how many come back rejected. Those that do not bounce will be considered valid email addresses and can be used to target the marketing campaign (McCusker 2005). As one can see, spammers use a number of strategies to obtain valid email addresses. One might note that this approach does not represent a targeted audience.

One source of spam that is often not considered in spam threat analysis is the "friendly fire" spam where employees and their families send jokes and other such links through the company email for mass distribution. Internally generated email spam can be devastating for a large company (McCusker 2005). Companies that allow this type of behavior and do nothing to stop it risk liability, should damages arise from actions within their company.

Spam is filled with chain letters, bogus business opportunities, advance fee fraud, and get-rich-quick schemes (McCusker 2005). Although, some legitimate offers do arrive through spam, many are too good to be true and filled with empty promises that the originator cannot deliver. The art of "phishing" is another offshoot of email fraud. In this scam, an official mock (spoof) email is sent to the person. The most typical are those that look like a bank (McCusker 2005). These emails try to tempt the user to click on a link. When they do so, they will be asked for their user ID, password, and other information such as account…

Sources used in this document:
References

D'Antoni, H. 2003. Span Tests Employees' Productivity, Patience. Information Week. May 13, 2003. [online]

http://www.informationweek.com/news/software/showArticle.jhtml?articleID=9800038 [Accessed 17 March 2009].

McCusker, R. (2005). Spam: nuisance or menace, prevention or cure? Trends and Issues in crime and criminal justice. March 2005. No. 348. [online] http://www.aic.gov.au/publications/tandi2/tandi294.pdf [Accessed 17 March 2009].

Winslow, L. 2005. SPAM Killing Small Business Productivity. Ezine Articles. [online]
http://ezinearticles.com/?SPAM-Killing-Small-Business-Productivity&id=118360 [Accessed 17 March 2009].
Cite this Document:
Copy Bibliography Citation

Related Documents

Business Plan in Order to Accomplish Our
Words: 770 Length: 2 Document Type: Business Plan

Business Plan In order to accomplish our mission we set forth the following strategic goals, they include: Build the Financial perspective of our business by addressing how shareholders view the firm and which financial goals are desired from the shareholder's perspective. Goals are closely linked to the business lifecycle and must be adjusted over time. For example, in the early stages, our goal is revenue growth, but as the company becomes more

Business Plan Mom Spa
Words: 1526 Length: 5 Document Type: Business Plan

Running head : Mom Spa Business Plan Mom Spa Business Plan 7Mom Spa: Business PlanMom Spa is the type of company, and it is a service-based company. It�s a spa for mothers with preschool-aged children. Moms, like everyone else, like a nice two hours at a spa, but it isn�t easy to fit such trips into a routine when the kids are young. The Mom Spa solves this problem by

Productivity and Cost
Words: 1104 Length: 3 Document Type: Term Paper

Law of Marginal Productivity comes to Macy's In theory, the more demand there is for a good or service, the more a producer wishes to provide this good, and that producing in bulk lowers costs. Even when consumer demand is down, a supplier can also produce more, in the hopes of defraying a decrease in price with a bulk increase in sales. However, certain costs of production are fixed. In

Business Management Business Operations and Systems the
Words: 3206 Length: 11 Document Type: Essay

Business Management Business Operations and Systems The objective of this study is to outline the essential components for effective business operations management for a UK business whose products are delivered to the door. The parcel delivery conundrum will be examined using an appropriate system and methodology and a discussion will be provided to support appropriate business operations models. Included will be CATWOE, Root Definition and a detailed picture to illustrate the

Business Summaries This Chapter Addresses the Reasons
Words: 4707 Length: 13 Document Type: Essay

Business Summaries This chapter addresses the reasons that one should study business and businesses to begin with. The authors make the point that they do not intend for this to be a narrow study that just focuses on particular examples of successive and failed businesses, although it will include case studies too. But the major point of studying business, the authors write, is to provide a larger sense of what is needed

Business Report Compares the Two Australian Service
Words: 4286 Length: 12 Document Type: Essay

Business report compares the two Australian service providers where by various aspects are critically looked at in respect to the design elements of a retail store environment. The elements are categorized into exterior facilities, general interior, store layout, interior displays and the social dimensions. Each of these design elements are categorically looked into differently taking into account the services being offered by the two chosen service providers namely Fadez Barbershop

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now