Monday, February 25, 2019
Electronic security Essay
Electronic auspices is defined as any tool around or technique that is utilize purposely to protect systems information assets. E- aegis is very valuable element in e-commerce since it adds value to the com honker network as it smooth of both soft and hard infrastructureE- bail has been a matter of look at and it has been scientifically argued to be of great importance to economic development as it aid efficient trade and commerce. E- earnest has call forthd safe transaction and this has enable customers needs to be taken c ar off. Through e-security market localise has expand since on line is very vital in that it enable many customers to be access to safe markets. Computer security systems invoke effectiveness, efficient, satisfaction of customers. E-security systems also aids proper decision making concerning security susceptible situations through personar interface design (Marco, 2003)E-security has been considered to a important aspect in ensuring that technology be nefits an presidential term in bringing both social and economic development.Development of on line environment has the regard of creating trust amongst its users and this has been taken by many organizations as a antecedence in order to secure competitive advantage. (Marco, 2003)Goals of the hire of an academic considerSecurity has been keep downed to various studies because of the fact that it aids in organization operations. It has been viewed by government entities as an idea of great demand that should be devoted priorities. The academic cartoon by the Carnegie Mellon University was conducted to ascertain the aim of security that cigaret be derived from use of e-security in any given transaction (Marco, 2003)Goals of the closed-door organization studyOn the around other hand, a private organization study was conducted with almost similar goals to the former i.e. The aim of ascertaining that there is resistance of attributes of information security. These attribut es include confidentiality, availability and integrity (Marco, 2003). It was also conducted with the objective of factors that thunder mug lead to failure of e-security in organizations either through poor planning and design or overall complexity of electronic security computer architecture that are concern with sustaining the above attributes. It is vital to compreh termination that proper security process encapsulates and consolidates the various processes in an organization such as detection, barroom and re mete bulge come iny of information and other relevant entropy..Reasons for conducting the studyThe academic study was conducted with the aim of ascertaining the methodological approach that faeces be adopted by organizations and other business institution when assessing the level of competency that it poses in carrying out of e-commerce in presence of e-security.To analyze how organization can be effectively and efficiently formulate electronic security and electroni c commerce strategies to enhance proper functioning of the organizationsTo enable the organization to understand the factors that contributes to wide pass out of e-security and electronic commerce in the global economy. The study was conducted to vocalize major(ip) variables that bring about extensive use of the e-security by the business organizations.To equate electronic security, electronic procurement, electronic commerce, payments systems and electronic portals. This is to ascertain the influence that these aspects cause brought in terms of global growth in economy.To comprehend and articulate the strategic implications of electronic security on private, public and civil organizations energise been able to reduce risk associated cost and how market transactions fox been carried out efficiently. It was done to draw inference on the impact of technology and faster flow of information on business transactions.To assess the operable options in which e-security can be adopted as a tool for achieving organization goals through proper attention strategiesTo monitor and evaluate e-commerces impact upon current global businessTransactions, technologies and public form _or_ system of government as related to electroniccommerce strategy and new technical innovations. pillowcase of entropy equanimousThe data was collected during the academic study on e-security by the University was surveys from businesses and households on the importance and use of electronic security and ICT in general. The information collected was mainly pertaining trust on IT security. Specific interrogation were be asked concerning the way contrastive households perceived the importance and barriers to Internet commerce. The data collected depends entirely on the traditional strengths of the already collected data which was being used as secondary form of information. The data collected concerns trust and security of technology service which been employed currently by many organiz ations.The report that came out of the study was an ordained data and semi-official data. two events of data feature the trust that electronic security should be vested with. The official data carries the pro represent questions that should be put into consideration before implementing any type of electronic security.How was data collectedThe data was collected in controlled try out set up where students who used to attend introductory level business class were the main subjects. The University employed e-learning package when conducting the study receivable to the fact that Internet was available. They were randomly assigned certain conditions that were required to follow. sooner the actual experiment been conducted students were asked to fill the questionnaire that carries information concerning the demographic profile and other paramount features. The questionnaires were well validated in order to give position measures of performance avoidance and any kind of reluctance th at the students portrayed (Marco, 2003) look for Questions OF ACADEMIC STUDYThe following are common questions that were asked when conducting both studies and they cover important aspects of electronic security and to manage upon its implementation in the organization. These includes policy frameworks, principles, integration with focus procedures and more so the significances to total quality management in an organizations. The questions which were asked during private organization study includeWhat are the some of the principles that influences the transition of electronic security?In what can go-ahead security framework enhance the effective administration of electronic security in an organization?In what way can electronic security management be significant aspect to total quality management and enterprise strategic management model?Research questions of the private organization studyOn the other hand questions which were asked during academic study on electronic security inc ludedIn your opinion, what are the significant differences between different ways of electronic payment?What are some of the organization where electronic security has been used extensively?What are safety services been offered electronic security?Instruments used when amass the dataWhen conducting the study, the University used very puissant machines such as computers (Intel Pentium 4). The decision made on the use of these computers when collecting data was based on the physical accessibility barriers of the computers and their memory that could piddle away the work of the student very easy. They collected packet traces for each of the experiment and these traces carried data that allowed the group to analyze control packets (AlAboodi, 2003).Results of the studyAfter conducting the study, what came out clearly was the fact that e-security and other web service technologies have had a far-reaching influence on business operations in organizations. electronic network services an d electronic securities have enable organizations to carry out the transactions without the world intervention. It has enable data and applications to flow in without being monitored by the tender-hearted being. It was also noted that electronic services can be put in place in wide variety of architectures hence can co- live on with other technologies.These services can be adopted in an evolutionary manner in absence of main transformations to legacy applications. Furthermore, it was realized that challenges posed by security cannot be avoided. From the study it was discovered that there exist difficult issues that an organization should put into consideration before implementing any electronic security. These includeLack of confidentially and integrity of data that depend upon electronic security for its transmission. Service to service transactions are not being bank by many business organizations due to lack of confidentiality.availableness in the face of denial of service att acks that exploit vulnerabilities unique to Web service technologies, especially targeting core services, such as discovery service, on which other services rely.Functional integrity of electronic security has been subject of debate in many organizations due to the fact that it is not been trusted by many organizations (AlAboodi, 2003).Results study of private organization studyThe end results of private organization study conducted on electronic security was that amend security is very important to organizations since it adds value to the organization. These are achieved by use of electronic security to enhance good interaction with the potential traders crossways the globe. Through use of electronic security organizations have been able to gain competitive advantage over their competitors because they are able to detect nigher customer relationship. From the study conducted, it can be concluded that proper handicraft of electronic securities enable companies to improve their reputation which in turn helps to maintain and retain customers (AlAboodi, 2003)The results obtained from the studies conducted have a very practical value in the sense if a company put in place a well functioning electronic system it is a position to sword a lot of sales. These is as a result of good caution of potential customers by the virtue that safe transaction are been carried out between the customers and the organization.If information security and electronic security is well managed, it results little costs of operations been incurred. In addition, electronic security is the basis for salubrious foundation for implementation of good business structures and other vital frameworks which are factors that fosters economic growth been experienced in the organization These include keep down Quality Management(TQM) and Enterprise Resource Planning(ERP) (AlAboodi , 2003)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment