Friday, June 7, 2019
Electronic security Essay Example for Free
Electronic hostage EssayElectronic protective cover is defined as any tool or technique that is employ purposely to protect systems information assets. E- auspices is very valuable element in e-commerce since it adds value to the computer network as it composed of twain soft and clayey infrastructureE-security has been a matter of debate and it has been scientifically argued to be of great importance to economic development as it aid efficient trade and commerce. E-security has compound pencil eraser transaction and this has enable guests needs to be taken care off. Through e-security mart place has expand since on line is very spanking in that it enable many a(prenominal) customers to be access to safe markets. Computer security systems enhance effectiveness, efficient, satis pointion of customers. E-security systems also aids puritanical decision reservation concerning security susceptible situations done user interface design (Marco, 2003)E-security has been cons idered to a fundamental aspect in ensuring that technology benefits an organization in bringing both social and economic development.Development of on line environment has the tinge of creating trust amongst its users and this has been taken by many organizations as a priority in order to gain competitive advantage. (Marco, 2003)Goals of the chew over of an academic admitSecurity has been subjected to various studies because of the position that it aids in organization operations. It has been viewed by government entities as an idea of great demand that should be given priorities. The academic study by the Carnegie Mellon University was conducted to ascertain the level of security that bottom of the inning be derived from use of e-security in any given transaction (Marco, 2003)Goals of the private organization studyOn the other hand, a private organization study was conducted with almost similar goals to the spring i.e. The aim of ascertaining that there is protection of attri butes of information security. These attributes embroil confidentiality, availability and integrity (Marco, 2003). It was also conducted with the objective of factors that butt end lead to failure of e-security in organizations either through poor planning and design or overall complexity of electronic security architecture that are concern with sustaining the above attributes. It is vital to comprehend that proper security process encapsulates and consolidates the various processes in an organization such as detection, prevention and recovery of information and other relevant data..Reasons for conducting the studyThe academic study was conducted with the aim of ascertaining the methodological approach that can be adopted by organizations and other business institution when evaluateing the level of competency that it poses in implementation of e-commerce in presence of e-security.To analyze how organization can be effectively and efficiently formulate electronic security and ele ctronic commerce strategies to enhance proper go of the organizationsTo enable the organization to understand the factors that contributes to wide spread of e-security and electronic commerce in the global economy. The study was conducted to articulate major variables that bring about lengthy use of the e-security by the business organizations.To compare electronic security, electronic procurement, electronic commerce, payments systems and electronic portals. This is to ascertain the influence that these aspects rent brought in terms of global process in economy.To comprehend and articulate the strategic implications of electronic security on private, public and civil organizations have been able to reduce risk associated cost and how market transactions have been carried out efficiently. It was done to draw inference on the impact of technology and faster flow of information on business transactions.To assess the available options in which e-security can be adopted as a tool fo r achieving organization goals through proper management strategiesTo monitor and evaluate e-commerces impact upon current global businessTransactions, technologies and public policy as related to electroniccommerce strategy and new technical innovations.Type of data quietThe data was collected during the academic study on e-security by the University was surveys from businesses and households on the importance and use of electronic security and ICT in general. The information collected was mainly pertaining trust on IT security. Specific question were being asked concerning the way different households perceived the importance and barriers to Internet commerce. The data collected depends entirely on the traditional strengths of the already collected data which was being utilize as secondary form of information. The data collected concerns trust and security of technology services which been engaged currently by many organizations.The report that came out of the study was an off icial data and semi-official data. Both types of data feature the trust that electronic security should be vested with. The official data carries the proposed questions that should be put into consideration before implementing any type of electronic security.How was data collectedThe data was collected in cookled experiment set up where students who used to attend introductory level business class were the main subjects. The University employed e-learning package when conducting the study due to the fact that Internet was available. They were randomly assigned certain conditions that were required to follow.Before the actual experiment been conducted students were asked to fill the questionnaire that carries information concerning the demographic profile and other paramount features. The questionnaires were tumefy validated in order to give correct measures of performance avoidance and any kind of reluctance that the students portrayed (Marco, 2003)Research Questions OF ACADEMIC S TUDYThe pursuance are common questions that were asked when conducting both studies and they cover important aspects of electronic security and to manage upon its implementation in the organization. These includes policy frameworks, principles, integration with management procedures and more so the significances to total quality management in an organizations. The questions which were asked during private organization study includeWhat are the some of the principles that influences the transition of electronic security?In what can enterprise security framework enhance the effective administration of electronic security in an organization?In what way can electronic security management be significant aspect to total quality management and enterprise strategic management model?Research questions of the private organization studyOn the other hand questions which were asked during academic study on electronic security includedIn your opinion, what are the significant differences between different ways of electronic payment?What are some of the organization where electronic security has been used extensively?What are safety services been offered electronic security?Instruments used when collecting the dataWhen conducting the study, the University used very powerful machines such as computers (Intel Pentium 4). The decision made on the use of these computers when collecting data was based on the physical accessibility barriers of the computers and their memory that could make the work of the student very easy. They collected packet traces for each of the experiment and these traces carried data that allowed the group to analyze control packets (AlAboodi, 2003).Results of the studyAfter conducting the study, what came out clearly was the fact that e-security and other web service technologies have had a far-reaching influence on business operations in organizations. Web services and electronic securities have enable organizations to carry out the transactions withou t the human intervention. It has enable data and applications to flow in without being monitored by the human being. It was also noted that electronic services can be put in place in wide variety of architectures hence can co-exist with other technologies.These services can be adopted in an evolutionary manner in absence of main transformations to legacy applications. Furthermore, it was realized that challenges posed by security cannot be avoided. From the study it was discovered that there exist difficult issues that an organization should put into consideration before implementing any electronic security. These include lack of confidentially and integrity of data that depend upon electronic security for its transmission. Service to service transactions are not being trusted by many business organizations due to lack of confidentiality.Availability in the face of denial of service attacks that exploit vulnerabilities unique to Web service technologies, especially targeting core se rvices, such as discovery service, on which other services rely.Functional integrity of electronic security has been subject of debate in many organizations due to the fact that it is not been trusted by many organizations (AlAboodi, 2003).Results study of private organization studyThe end results of private organization study conducted on electronic security was that improved security is very important to organizations since it adds value to the organization. These are achieved by use of electronic security to enhance good interaction with the potential traders crossways the globe. Through use of electronic security organizations have been able to gain competitive advantage over their competitors because they are able to maintain closer customer relationship. From the study conducted, it can be concluded that proper employment of electronic securities enable companies to improve their reputation which in turn helps to maintain and retain customers (AlAboodi, 2003)The results obtai ned from the studies conducted have a very practical value in the sense if a company put in place a well functioning electronic system it is a position to make a lot of sales. These is as a result of good maintenance of potential customers by the virtue that safe transaction are been carried out between the customers and the organization.If information security and electronic security is well managed, it results less costs of operations been incurred. In addition, electronic security is the basis for healthy foundation for implementation of good business structures and other vital frameworks which are factors that fosters economic growth been experienced in the organization These include Total Quality Management(TQM) and Enterprise Resource Planning(ERP) (AlAboodi , 2003)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.