Today is

Friday, January 28, 2011

The Inefficiency of Anti-Virus in Software Technology as Perceived by IBM Company

Introduction

Most of the people in the world are attached to the software technology and these people include the students, working society, and even the security departments. Every year, there is increasing number of users and demands that causes the software firms to innovate and different strategies are applied such as additional features just to stay in the competition. However, despite the goal of the manufacturers or developers to produce a kind of tool that not only promises efficiency but also the advantage, manufacturers sometimes overlook the other important details.

Background of the Study and Problem Statement

Computers as a software technology are used in different purposes and from the growing numbers of user that are everyday in touched with their computers, there are chances that the technologies might get flux due to the different viruses (Hardie and Tee, 2007). The virus is of course, not harmful on people but very detrimental on the computers. There are chances that a strong virus can damage all the important files stored in the computer. In today’s era, the computer became an effective tool as it one means of communication, especially when the user have a connection in the Internet but alongside, there are promulgated various virus that might set the computer in a high risk and needs to be diagnosed. The focus of the study centers in the idea inefficiency of the anti-virus system recognized by the IBM Company.

Research Aims

The study is dedicated not only to the professional users but to the entire society that are considered dependent in the use of software technologies. First, the study has an objective to provide clear definitions about the anti-virus that can affect the users’ software technology. Second, the study aims to provide additional thrust to develop a high-standard of anti-virus that can be applied in different settings or nature of work.

Research Questions

The proposal gathered certain questions that can help the study aligned in achieved the most applicable answers regarding the anti-virus software which is considered important in the working class and business sector.

1. What is the factor that considers an anti-virus system effective?

2. What are the qualities that the IBM created to excel in the field of software technology?

3. What are the actions taken by the company from recognizing an inefficient anti-virus in software technologies?

Literature Review

Computer virus is typical brief programs that are designed to disperse copies of it to other computer and disrupts or destroys the computers normal operations. There are known causes of it spread such as the use of the floppy disks, networks, or on-line services (Curtin, 1997; The Economist, 2007). Still, there are numerous computer viruses that are known and been discovered every day. It is a mystery for the anti-virus software provider to discover the origin of the viruses but their abilities to craft a great tool to lock the virus did not received so much demand because many computers had been corrupted before the release of an anti-virus software (Kuruppuarachchi, Mandal, and Smith, 2002).

There are virus control and protection policy that are intended to define the responsibility among the concerned participants. The policy is crucial and has an international scope but through the continuous management and IT training that can help detect and prevent viruses in the computers. Internal users within the organization are the factors in people, process, and technology are considered risky in computer security (Andres, 2003). By accident or intention, the corporate resources are being accessed to the point where the securities are destroyed (Marrinan, 2006). There are recommendations that suggest in enhancement of security, such as explaining to the personnel about the trouble they might find when there is an internal attack (Sims, 2002).

Methodology

The applied method of the study is the interview which is held with the participants who came from different economic settings. The demographic composition of the participants are based on their gender, age, level of education and basic knowledge in computers, and their current status which is about their social role such as student, businessman, IT professional, and ordinary individual. The questions being asked is connected to the topic which is the anti-virus and its inefficiency and most of their answers are based on their personal experience about the different software viruses.

Conclusion

The IBM Company is one of the leading companies in the software industry and already proved as a growing company despite of all the issues that placed on them. The IBM might be pressured by this truth but they already recognized it, the only thing that is left is to develop suitable anti-virus software in innovative ways to maintain their position in the market.

References:

Andress, A 2003, “Surviving Security: How to Integrate People, Process, and Technology,” Auerbach Publications, Boca Raton, FL.

Curtin, M., (1997), “Introduction to Network Security”, Kent Information Services, Accessed 27 Jan 2010, from http://www.interhack.net/pubs/network-security/

Hardie, E., & Tee, M., (2007), "Excessive Internet Use: The Role of Personality, Loneliness and Social Support Networks in Internet Addiction," Australian Journal of Emerging Technologies and Society, Vol. 5, No. 1

Kuruppuarachchi, P., Mandal, P., and Smith, R. (2002), “IT Project Implementation Strategies for Effective Changes: a Critical Review”. Logistics Information Management, Vol. 15, No.2;

Marrinan, M 2006, Beware the Wandering Mouse: How to Avoid Inappropriate Internet Use, Monster, Accessed 27 Jan 2010, from http://72.14.209.104/search?q=cache:lOTEHq4iuaoJ:wlb.monster.com/articles/internet/+Internet+access+policy+&hl=en&ct=clnk&cd=5

Sims, R., (2002), “Organizational Success through Effective Human Resources”, Management, Quorum Books, Westport, CT.

The Economist (2007), “The trouble with computers,” Economist, Vol. 384, Issue 8545, (September 8) special section p. 21-22.

No comments:

Post a Comment