Using Sprinklr, Nike could have a digital customer profile for each of its customers. Provide two examples of computer security procedures that Nike (or Sprinklr) could use to protect Nike’s customer data from unauthorized disclosure, specific to the last point listed in Table 3.3 “Data should not be disclosed for reasons incompatible with the business objective for which they are collected.

Case answers must be different for each question part. Clearly label your answer question parts (e.g. A (i), B (ii) ). (i) link to the specified case using terms specific to the business and functional area under discussion, (ii) clearly illustrate the concept or theory being addressed or examined using an example and (iii) differentiate […]

© 2020 EssayQuoll.com. All Rights Reserved. | Disclaimer: For assistance purposes only. These custom papers should be used with proper reference.