Information Management Systems
This is a concept through which producers endeavor to meet each customer’s or each market niche’s specific needs without necessarily altering major product or service aspects such as price and cost of production. It sets to overcome the pre-existing contrasts between customization and mass production. Customization avoids the intense correspondence otherwise needed between the supplier and the customer in the case of personalization and rather seeks to create standard products that nonetheless address individual concerns of preference (Pine, & Davis, 1999).
Issues of preference are much more important in the contemporary society since the recent blow up in the significance attached to individuality and an even greater shift in personal divergence. With a convergence of competitor aspirations resulting in a notable shift towards more standardized products and services, and a global influx of new players in pre existing industries, mass customization has become the new battle ground for customer loyalty. Mass customization has also been aided a lot by the versatility offered by ever changing technology world.
The idea of mass customization is now as much in the market as the products it is meant to market. A good example where mass customization has taken root is the clothing industry. Levi’s, for
Need essay sample on "Information Management Systems"? We will write a custom essay sample specifically for you for only $ 13.90/page
It authenticates data between server and client, ensures data integrity while in transit and also ascertains privacy of the said data. SSL (Rescorla, 2000) does this through three essential ways; • Encryption of information during online transactions • Authenticating information about the certificate owner • Verifying the identity of the certificate owner when issued. Secure Electronic Transactions (SET) on the other hand seeks to secure electronic transactions over unsafe networks.
It is not a payment system by itself but rather a protocol that enabled users to make use of open networks safely regarding credit and credit details. With SET, each user is issued with a digital certificate and each transaction is verified using a set of certificates. SET is used to verify the identity of a customer or sender of information. While from the definitions above SET and SSL are fundamentally different, both protocols are however concerned with security issues over networks especially the internet.
They both make use of digital certificates issued and registered by concerned authorities and which allow checks for authentification. They also employ cryptography, the process of encoding and decoding information, if only for different purposes, one to secure the information transferred and the other as a means of identifying parties involved in an online transaction. References Pine, B. J. , & Davis, S. (1999). Mass Customization: The new frontier in Business Competition. Watertown, MA: Harvard Business Press. Rescorla, E. (2000). Designing and Building Secure Systems. Maryland, MA: Addison Wesley Publishing.