Tuesday, May 14, 2019

Information systems security management Research Paper

Information systems security management - Research Paper ExampleIn 1915, there were 250 automobile manufactures in the United State that were utilizing information technology on large bases. By the 1994, this figure had increase up till 500 automobiles. In the field of telecommunication, around 2000 radio station across the United States were found (Laudon, 2011). In 1925, these radio stations were broadcasting to local neighborhoods and run by non-professionals. By the year 1990, only 500 independent stations were functioning. Therefore, it is clear that the e-commerce will follow the said(prenominal) pattern along with some noticeable difference that is discussed further (Laudon, 2011). The development in the field of e-commerce has been increased significantly, but it is also not obvious that this field will tend to grow on this gait forever. Moreover, its growth will be limited in future as it is confronting its own fundamental limitations. For example, the B2C e-commerce is s tock-still a sm on the whole part around 3% of the net retail market. In fact, in 2008, all the B2C e-commerce will approximately equal to the annual revenue under recent projections. This research includes Wal-Mart, which is the worlds largest and most effective retailer. On the contrary, with the only 3% of the entire retail sales, it is now introducing online methods (Laudon, 2011). Early historic period of E-Commerce E-Commerce Today Technology-driven Business-driven Revenue growth emphasis Earnings and profits emphasis Venture capital support Traditional financing Ungoverned Stronger regulation and governance Entrepreneurial Large traditional firms Disintermediation Strengthening intermediaries completed markets Imperfect markets, brands, and ne twork effects Pure online strategies Integrated, multi-channel bricks-and-clicks strategies First mover advantages Strategic follower strength panegyric assets Figure 1.1 1.1 Emphasizing Privacy One more submit shows that online co mpanies emphasize and focus more on online privacy policy rather than any other aspect. Even online security is considered as the second option. Moreover, the study also concluded that online customers argon more worried about their privacy rather than online threats as they are considered to be in control. In addition, the study also demonstrated a comparison between the two decades, i.e. 1999-2001 and 2005-2007, which highlighted the factors that are mentioned previously (Parayitam, Desai, & Desai, 2008). 1.2 Focusing on Customer Demands However, study concluded one interesting factor, i.e. the rankings and ratings of policies created for the net income continues to focus on demands of the web users. Moreover, consumer privacy continues to be on top in both the decades (Parayitam, Desai, & Desai, 2008). The amplified ken by the contributors, i.e. legislators and advocates, shows that the interest level is comparatively high. 2 Technology Infrastructure E-commerce is also describ ed as the development and growth of digital computing, and communications technology is at the core of modern technology of spherical digital economy. In order to understand the future of the digital e-commerce, we need to understand the technological rudiments on which it is dependent. The e-commerce is, basically, a technological motivated phenomenon that depends on a cloud of information technologies. Moreover, the fundamental ideas from electronic computer science have developed this over for a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.