Monday, November 4, 2019
Information systems security management Research Paper
Information systems security management - Research Paper Example In 1915, there were 250 automobile manufactures in the United State that were utilizing information technology on large bases. By the 1994, this figure had increased up till 500 automobiles. In the field of telecommunication, around 2000 radio stations across the United States were found (Laudon, 2011). In 1925, these radio stations were broadcasting to local neighborhoods and run by non-professionals. By the year 1990, only 500 independent stations were functioning. Therefore, it is clear that the e-commerce will follow the same pattern along with some noticeable difference that is discussed further (Laudon, 2011). The development in the field of e-commerce has been increased significantly, but it is also not obvious that this field will tend to grow on this rate forever. Moreover, its growth will be limited in future as it is confronting its own fundamental limitations. For example, the B2C e-commerce is still a small part around 3% of the net retail market. In fact, in 2008, all t he B2C e-commerce will approximately equal to the annual revenue under recent projections. This research includes Wal-Mart, which is the worldââ¬â¢s largest and most effective retailer. On the contrary, with the only 3% of the entire retail sales, it is now introducing online methods (Laudon, 2011). Early Years of E-Commerce E-Commerce Today Technology-driven Business-driven Revenue growth emphasis Earnings and profits emphasis Venture capital financing Traditional financing Ungoverned Stronger regulation and governance Entrepreneurial Large traditional firms Disintermediation Strengthening intermediaries Perfect markets Imperfect markets, brands, and network effects Pure online strategies Integrated, multi-channel bricks-and-clicks strategies First mover advantages Strategic follower strength; complimentary assets Figure 1.1 1.1 Emphasizing Privacy One more study shows that online companies emphasize and focus more on online privacy policy rather than any other aspect. Even onli ne security is considered as the second option. Moreover, the study also concluded that online customers are more worried about their privacy rather than online threats as they are considered to be in control. In addition, the study also demonstrated a comparison between the two decades, i.e. 1999-2001 and 2005-2007, which highlighted the factors that are mentioned previously (Parayitam, Desai, & Desai, 2008). 1.2 Focusing on Customer Demands However, study concluded one interesting factor, i.e. the rankings and ratings of policies created for the Internet continues to focus on demands of the web users. Moreover, consumer privacy continues to be on top in both the decades (Parayitam, Desai, & Desai, 2008). The amplified awareness by the contributors, i.e. legislators and advocates, shows that the interest level is comparatively high. 2 Technology Infrastructure E-commerce is also described as the development and growth of digital computing, and communications technology is at the co re of modern technology of global digital economy. In order to understand the future of the digital e-commerce, we need to understand the technological basics on which it is dependent. The e-commerce is, basically, a technological motivated phenomenon that depends on a cloud of information technologies. Moreover, the fundamental ideas from computer science have developed this over for a
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.