How Did Macy's Inc Negatively Harm Its Business

Decent Essays
Macy’s Inc. relies extensively on technology and on its information systems to process transactions, compile results and operate its business. As an advantage, Macy’s Systems and Technology, Inc. engages in creating, collecting, and directing pieces of data to form management tools. The company implements integrated retail, e-commerce, and data warehouse systems. As a disadvantage, the information systems can be subject to interruption from power outages, damage from viruses, cyber-attack or other security breaches. In these cases, companies like Macy’s may experience the loss of critical data and delays in its processes. Additionally, any material interruption in the Company’s computer systems could negatively harm its business and the results

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Software maintenance could also be a potential problem with systems inaccessible due to scheduled maintenance…

    • 1517 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    The contributing attributes of a company`s ability to recognize and take action to business crisis and disruptive threats include: • Geographic areas of vulnerability – Consumers have a reduced attention to their geographic areas to consider fault lines in the case of earthquakes, tropical storms, potentially target of manmade attacks. • Global reliance systems - Resilience Systems are focused on protecting and improving the health, human security, resilience and sustainability of human populations (OVIAR Global Resilience Systems, Inc.,2014) • An effected service result in the disruption or completely termination of program. • Poverty- employees with limited resources in their availability or geographical location are more likely to accept positions in high…

    • 650 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Disaster Recovery Plan Wichita State Shockerthon is a company focused on creating awareness and support by raising money for the Children’s Miracle Network. Shockerthon uses a database to store many of our clients personal medical information, donor emails, and supporter credit card/debit card information. It is important that Shockerthon creates a plan of action incase the information system is threatened. These threats could arise from natural disasters, security breaches or a virus. Although Shockerthon may not be comparable to Koch Industries, in size, it is imperative to have a plan for any situation concerning the threat of information systems as risking personal information may discredit the reputation Shockerthon has built for itself.…

    • 519 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This standard specifies the resistance required for vehicle security barriers, which is also known as Hostile Vehicle Mitigation or HVM. Barriers used in the United Kingdom must meet this standard of protection. In the United States, various standards apply including the Department of State, Department of Defense, U.S. Army Corps of Engineers and various city and state governments. New York City standards are among the most complex because they involve protecting skyscrapers while allowing public access.[2] Considerations for Installing Security Bollards Like any security product, there 's a tradeoff when installing security bollards that involves confidentiality issues, security parameters and choosing between premade bollards or authorizing…

    • 950 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Macy's Work

    • 295 Words
    • 2 Pages

    1. When I worked at Macy’s, the first boss I had was amazing. By trusting in their co-workers and, defending their rights as workers were some of the characteristics that made him a great leader. He set expectations clear from the beginning. In addition, he used to give feedbacks about the work done and about future duties also.…

    • 295 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Huge department stores such as Macy’s stand for almost everything that Theodore Adorno and Max Horkheimer despise. Arguably, department stores minimize a person’s capability to act and think in a logical and self-governing manner. Adorno argues that “standardization develops due to the ability of the ‘people in power’ to regulate the manufacturing of cultural goods in order to try and gage and control what people like and want to buy to increase how much profit they make. Furthermore, he states that “under monopoly all mass culture is identical” (Adorno 1). Indeed, whether it be a sweater, a pair of shoes, makeup or jewelry, Macy’s offers multiple versions of the same product, promoting standardization and pseudo-individuality.…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Macy's Competitors

    • 92 Words
    • 1 Pages

    Macy’s is facing significant competition in the retail industry is the top risk that the firm needs to find the solution. According to the National Retail Federation, they are more than three million in the retail corporation in the United States, and they are 286,225 corporations that operating in Clothing and accessories stores. Even though Macy’s is one of the largest retail stores in America, but they are confronting with the major competitor in the same market industry. They are competing not only national retailers but also the regional and online retailer.…

    • 92 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    What Is Macy's?

    • 209 Words
    • 1 Pages

    Macy’s continues to execute strategies based on M.O.M Strategies implemented five years ago. M.O.M is an acronym for “My Macy’s Location, Omnichannel, and MAGIC selling”(Forbes). However, Macy’s revamped their previous strategies with M.O.M 2.0 which plans to increase profits and sales in the future. These improved strategies will allow quicker customer service, better control of inventories, and add to the company’s gross margins(Forbes).…

    • 209 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    A time when I experienced a communication breakdown was when I was a Sales Associate for the Women’s Department at Macy’s. I usually worked on the weekends and sometimes after class depending if there was an upcoming exam. During one of the weekends, I had a customer who called the department and asked for a four pairs of Michael Kors. I looked for them and saved the two pairs of shoes for the customer and labelled them under their Name and my employee ID number in order for me to get my commission. The following day the customer came in and asked for the shoes.…

    • 427 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Ransomware Essay

    • 1262 Words
    • 6 Pages

    Information systems permeate the fabric of everyday life. Families use them to remain in touch, organize their lives, and store memories. Multibillion dollar businesses use them to store critical data, increase efficiency, and maximize profits. They exist on cell phones, laptops, ATMs, televisions, servers, and more. A vast amount of data is gathered, stored, and processed from millions of devices worldwide to influence commerce and advise governments.…

    • 1262 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Cenartech Case

    • 884 Words
    • 4 Pages

    Given your understanding of the history and status of Cenartech,make some general observations about the firm 's security readiness. Is Cenartech at low, moderate, or high risk of a security problem? On what aspects of the description do you base your assessment? Cenartech has invested a significant amount in it’s information technology infrastructure and I would rank it moderate in risk of security problems.…

    • 884 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Command Prompt

    • 1077 Words
    • 5 Pages

    Introduction Organizations handle vast amounts of data. A large organization may have to deal with terabytes or petabytes worth of data. For a company to be successful, there must be a meaningful way in which the data that is used as a part of company operations is managed. This includes an effective file management system, in which the files are appropriately secured, and the information is backed up in order to meet company requirements. The files generated as a part of company operations are company property, and as such the information must be managed effectively.…

    • 1077 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Brain Drain In Lebanon

    • 889 Words
    • 4 Pages

    It is shocking news to hear when famous banks, financial institutes and large organizations are shutting down their businesses due to an unexpected system crash, security or virus…

    • 889 Words
    • 4 Pages
    Improved Essays