Wednesday, May 6, 2020

IT for Business for Connectivity Issues -myassignmenthelp.com

Question: Discuss about theIT for Business for Connectivity Issues inE-commerce. Answer: Introduction Information security refers to the process of saving the sensitive information of the company from leakage. It helps the organization to make use of electronic software and initiate activities which implement concrete security system in the organization. The new suggests that cross-border e-commerce activities are to be regarded as one of the major development of this field (Ahmed, and Hossain 2014). Further, the report consists of e-commerce business which uses the information security technology. Also, it explains the four links of e-commerce with cyber security, the issues, and solutions as well. Although the information security is a part of the technology business, thus inefficiency of the business hampers the growth of an organization. Connectivity and Security issues The case study states that implementation of digital economy provides both great opportunities and challenges as well. Thus, it shall be noted that information technology is used wisely can create wonders for the organization. Also, connectivity is the cornerstone of the development of the information security system. Further, the major issue of connectivity involves four aspects that are: Connectivity for information: the article states that the only basis for the sales of the e-commerce business is the strong internet connectivity inherited with the business. But there is a huge difference despite fullest efforts of the Asian countries to upraise the use of information communication technology. Looking at the regional infrastructure of the internet it can be said that the speed is average, but not all people use the mobile internet instead the broadband and Wi-Fi service are also prevailing in the market. Thus, the sale process for the business is decreased as low connection due to which customer gets irritated with the services of the online business (Chen 2017). Further, it shall be known that it adversely affect the security system of the organization, as the internet connectivity carry the data and private information of the company from one source to another and if that source is broken, then the company might face issues (Niranjanamurthy, and Chahar 2013). Caches are created by the online websites and if the speed is not satisfactory, due to which the details of the transaction are stored in the computer of the people, and if that information is accessed by some outsider then it can affect the growth of both company and the customers. Also, connectivity in an e-commerce organization is adhered by investing in the fine business process, and if the information technology software is not efficient then automatically is can put the company in risks (Crossler, et. al., 2013). Logistic connectivity: although the e-commerce business activities are initiated on the internet but the logistic process is initiated through offline mode and the details of logistic are delivered to the customer through online mode. Thus, if the information communication technology does in give adequate details about the logistics then the issue can be raised by the customers of the organization which can risk the growth of the company. The ICT and information security practice align the working in the e-commerce business, thus if one of the processes is inefficiency then the other aspect is automatically affected by it and the growth becomes slow (Galliers, and Leidner 2014). Connectivity flow cash flow: the flow of cash is the basic need for which the business process is initiated in the market. And is the process with which revenue is earned in the organization, and then the company cannot survive in long run. In relation to the cash flow which the information security issue, if the electronic system connectivity is not efficient, then the e-payments can expire before time. This can raise issues as customers can say that amount is deducted from their account but it is not delivered to the company (Modi, et. al., 2013). Thus, to resolve this issue, the company shall ensure proper connectivity of internet in the business process. The security of customer, the privacy of transactions is maintained with efficiency internet infrastructure only. As the e-commerce is a non-physical industry thus the customer relies on the company by looking at its user interface and the image of the company in the market. Goodwill can be only maintained if the security is prop erly maintained and issues are properly redressed by the company (Habiba, et. al., 2016). Integrating connectivity: integrating connectivity refers to the process of supporting connectivity by providing extra effort in smooth functioning of the business. The public-private partnership shall develop co-operation with the society so that no non-ethical activities are initiated (Niranjanamurthy, et. al., 2013). Conclusion Thus in the limelight of the above-mentioned events, shall be noted that in an e-commerce industry is it very important to initiate effective internet connection so that transactions are held easily without barrier. The information technology system directly affects the information security system of the organization. As if connectivity is not strong then the working of the company might lose its effect. Recommendation Thus, by looking at the above case analysis it shall be taken in accounts that, information security is a major aspect which shall be looked after the company prevailing in the e-commerce industry. As there is no physical contact with any person in the company therefore if an issue occurs then it becomes typical for the company to find out the main culprit behind the problem. Thus, the adequate measure shall be taken by the company on an initial level so that future is saved. In order to maintain security and detract cyber-crime, the companies shall allow the entry of the customers by encrypted code only. This will initiate security of personal information of the customers. Also, the company shall not outsource their IT related work to other company, as with this they can access the cloud in which crucial detail of the company is stored. Only identified people of the organization shall make use of the price sensitive information. Thus, with these steps, an e-commerce company can init iate adequate security of customer and company's information. References Ahmed, M. and Hossain, M.A., 2014. Cloud computing and security issues in the cloud. International Journal of Network Security Its Applications, 6(1), p.25. Chen, L., 2017. Connectivity issues in e-commerce. Viewed on September 20, 2017 from https://www.bangkokpost.com/opinion/opinion/1324759/connectivity-issues-in-e-commerce Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013. Future directions for behavioral information security research. computers security, 32, pp.90-101. Galliers, R.D. and Leidner, D.E. eds., 2014. Strategic information management: challenges and strategies in managing information systems. Routledge. Habiba, U., Masood, R., Shibli, M.A. and Niazi, M.A., 2014. Cloud identity management security issues solutions: a taxonomy. Complex Adaptive Systems Modeling, 2(1), p.5. Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), pp.561-592. Niranjanamurthy, M. and Chahar, D.D., 2013. The study of e-commerce security issues and solutions. International Journal of Advanced Research in Computer and Communication Engineering, 2(7). Niranjanamurthy, M., Kavyashree, N., Jagannath, S. and Chahar, D., 2013. Analysis of e-commerce and m-commerce: advantages, limitations and security issues. International Journal of Advanced Research in Computer and Communication Engineering, 2(6).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.