Online shop environment

Document Type:Review

Subject Area:Computer Science

Document 1

The shop could also be called an e-web store as well as an e-shop. Hypothetically, the presence of the internet allows customers to visit an online shop where a higher number of employees would meet their needs immediately (Zhou et al. The owners of online shops often develop some web service emails that could be used in reaching their regular customers and for answering queries from those who sought to know more about their products. Paying the products and services is done digitally over the internet. Customers willing to visit the online shop are free to visit any local offices located in their towns and cities such as Amazon's domestic premises. An online shop has a back up for storing their products and services in their computers. The use of cloud saving has been used by online shops as a backup store to reduce any loss of data. Task 3: Confidentiality in an online shop is essential as it helps the customers to trust the payment method and also helps the customers to trust the identity of the shop and its authenticity. A reduction in the level of confidence will reduce the number of regular customers in the e-bay due to fear of losing their properties. Making sure that the website is secure by being smart is the best way that can be used to ensure the online shop maintains customer confidentiality. The online shop is expected to be very honest by keeping its moral principles. To reduce the problems that might reduce the integrity of the system, owners of the online shops ought to put into practice an effective malware program.

Sign up to view the full document!

Encrypting the order area is also vital in an online shop environment as well as using strong passwords. Bad integrity ruins the nature of trust that customers in the system and hence reduces their ability to purchase goods and services. A 24/7 Availability of the employees is also critical in the online shop to respond to customer queries and sell commodities because customers can buy products anytime, anywhere. E-Bay customers may feel ignored if their emails are not answered quickly and product delay as well may weaken their trust in the system. Confidentiality is the most important of all in this environment (Gefen et al. This is because, without customer confidentiality, the site cannot manage to sell their goods and services. In case the online shop has employee availability and integrity, but the level of privacy is limited, achieving set objectives will be almost impossible.

Sign up to view the full document!

Task 4: Table 1. Central processing unit A reduction in the functioning of the CPU in the online shop computers will reduce the amount of monthly income. There is a major vulnerability if the online shop does not have IT specialists to clean the CPU of minor attacks. Inadequate functioning of the CPUs in the online shops will ultimately create a situation of low income. Network card A poor connection of the card to a computer leads to computer network failures in any system. Malware attacks add viruses to a computer slowing the wireless connection. Responsive controls In network cards they respond to any issues of data loss in the online shop and prevent any malware. CCTV surveillance It can help to check the reluctant management staff leaving desktops open after finishing the work.

Sign up to view the full document!

It will prevent a situation where important data is exposed to intruders. Task 6: Table 3. Reasons for Technical Controls Technical Security Control Reason / Description Software audit trials Used in protecting the way users use the system. It helps to reduce the likelihood of a cybercrime because they keep the online shop updated. Disaster recovery policy Used to protect the online firm in case there is a loss of data (Haddad et al. It is essential in helping the firm to overcome any adverse effects by developing critical protective skills. Acceptable use policy Important when utilized in desk tops. It helps when there is a need to terminate the work of certain staff that is prone to leaving them unlocked hence exposing important data. Reduction in the confidentiality of the customers. Crashing of the CPU Central processing unit Lack of IT experts Exposing computer data to third parties.

Sign up to view the full document!

Easy access to the systems software. Private data will be stolen and misused. Loss of funds and the management works to retrieve loss data. Poor management can easily cause loss of data to third parties, and the information can be manipulated for private purposes. Information technology assets are sources that an online firm can use to acquire funds by accomplishing various means. There are multiple types of IT assets such as desktops, network cards, google drives, Microsoft windows, and the CPU. Hypothetically, the presence of the internet allows customers to visit an online shop where a higher number of employees would meet their needs immediately. The owners of online shops often develop some web service emails that could be used in reaching their regular customers and for answering queries from those who sought to know more about their products.

Sign up to view the full document!

Trust and TAM in online shopping: an integrated model.  MIS quarterly 27. Ghai, Vikrant, Shailendra Sharma, and Ajay Jain. Physical access control and security monitoring system utilizing a normalized data format. U.  Journal of Consumer affairs 35. Zhou, Lina, Liwei Dai, and Dongsong Zhang. Online shopping acceptance model-A critical survey of consumer factors in online shopping.  Journal of Electronic commerce research 8.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable