Monday, April 15, 2019

Electronic security Essay Example for Free

Electronic warranter measure EssayElectronic security is defined as any(prenominal) barb or technique that is used purposely to protect systems instruction as desexualises. E-security is very valuable element in e- employment since it adds value to the computer network as it composed of both soft and hard infrastructureE-security has been a matter of debate and it has been scientifically argued to be of ample importance to economic development as it charge efficient trade and trading. E-security has enhanced safe transaction and this has modify customers needs to be taken bring off off. Through e-security market place has expand since on line is very vital in that it enable many customers to be access to safe markets. Computer security systems enhance effectiveness, efficient, satisfaction of customers. E-security systems also acquired immune deficiency syndrome proper decision making concerning security susceptible situations through user interface design (Marco, 200 3)E-security has been considered to a fundamental aspect in ensuring that technology benefits an geological formation in bringing both social and economic development.Development of on line environment has the impact of creating pull amongst its users and this has been taken by many organizations as a priority in order to name competitive advantage. (Marco, 2003)Goals of the study of an academic study protection has been subjected to various studies because of the fact that it aids in organization operations. It has been viewed by government entities as an idea of great demand that should be given priorities. The academic study by the Carnegie Mellon University was conducted to ascertain the level of security that buttocks be derived from use of e-security in any given transaction (Marco, 2003)Goals of the private organization studyOn the other hand, a private organization study was conducted with almost similar goals to the former i.e. The aim of ascertaining that in that resp ect is protection of attributes of information security. These attributes include confidentiality, availability and fairness (Marco, 2003). It was also conducted with the objective of factors that keister lead to stroke of e-security in organizations either through poor planning and design or overall complexity of electronic security architecture that are concern with sustaining the above attributes. It is vital to comprehend that proper security influence encapsulates and consolidates the various processes in an organization such as detection, prevention and recovery of information and other germane(predicate) data..Reasons for conducting the studyThe academic study was conducted with the aim of ascertaining the methodological approach that can be adopted by organizations and other business institution when assessing the level of competency that it poses in implementation of e-commerce in presence of e-security.To crumple how organization can be effectively and efficiently f ormulate electronic security and electronic commerce strategies to enhance proper functioning of the organizationsTo enable the organization to understand the factors that contributes to wide spread of e-security and electronic commerce in the globose economy. The study was conducted to articulate major variables that bring about extensive use of the e-security by the business organizations.To compare electronic security, electronic procurement, electronic commerce, retributions systems and electronic portals. This is to ascertain the influence that these aspects capture brought in terms of global growth in economy.To comprehend and articulate the strategic implications of electronic security on private, public and civil organizations have been able to reduce risk associated cost and how market transactions have been carried out efficiently. It was done to draw inference on the impact of technology and faster stream of information on business transactions.To assess the available options in which e-security can be adopted as a tool for achieving organization goals through proper management strategiesTo monitor and evaluate e-commerces impact upon current global businessTransactions, technologies and public policy as related to electroniccommerce strategy and new practiced innovations.Type of data dispassionateThe data was collected during the academic study on e-security by the University was surveys from businesses and households on the importance and use of electronic security and ICT in general. The information collected was mainly pertaining trust on IT security. Specific question were macrocosm asked concerning the way different households perceived the importance and barriers to Internet commerce. The data collected depends entirely on the traditional strengths of the already collected data which was being used as unoriginal form of information. The data collected concerns trust and security of technology service which been employed currently by m any organizations.The report that came out of the study was an official data and semi-official data. Both types of data feature the trust that electronic security should be vested with. The official data carries the proposed questions that should be put into consideration before implementing any type of electronic security.How was data collectedThe data was collected in controlled experiment set up where students who used to attend introductory level business class were the main subjects. The University employed e-learning parcel when conducting the study due to the fact that Internet was available. They were randomly assigned certain conditions that were required to follow.Before the unfeigned experiment been conducted students were asked to fill the questionnaire that carries information concerning the demographic profile and other paramount features. The questionnaires were well validated in order to give correct measures of performance avoidance and any kind of reluctance that the students portrayed (Marco, 2003) explore Questions OF ACADEMIC STUDYThe following are common questions that were asked when conducting both studies and they cover important aspects of electronic security and to manage upon its implementation in the organization. These includes policy frameworks, principles, integration with management procedures and more so the significances to total tone management in an organizations. The questions which were asked during private organization study includeWhat are the some of the principles that influences the transition of electronic security?In what can enterprise security framework enhance the effective administration of electronic security in an organization?In what way can electronic security management be significant aspect to total quality management and enterprise strategic management model? look for questions of the private organization studyOn the other hand questions which were asked during academic study on electronic security in cludedIn your opinion, what are the significant differences between different ways of electronic payment?What are some of the organization where electronic security has been used extensively?What are safety go been offered electronic security?Instruments used when collecting the dataWhen conducting the study, the University used very powerful machines such as computers (Intel Pentium 4). The decision made on the use of these computers when collecting data was based on the physical accessibility barriers of the computers and their memory that could make the work of the student very easy. They collected packet traces for each of the experiment and these traces carried data that allowed the group to analyze control packets (AlAboodi, 2003).Results of the studyAfter conducting the study, what came out clearly was the fact that e-security and other sack up service technologies have had a far-reaching influence on business operations in organizations. Web service and electronic securit ies have enable organizations to carry out the transactions without the human intervention. It has enable data and applications to flow in without being monitored by the human being. It was also noted that electronic services can be put in place in wide variety of architectures hence can co-exist with other technologies.These services can be adopted in an evolutionary manner in absence of main transformations to legacy applications. Furthermore, it was realized that challenges posed by security cannot be avoided. From the study it was discovered that there exist ambitious issues that an organization should put into consideration before implementing any electronic security. These includeLack of confidentially and integrity of data that depend upon electronic security for its transmission. Service to service transactions are not being trusted by many business organizations due to lack of confidentiality.Availability in the face of defensive structure of service attacks that exploit vulnerabilities unique to Web service technologies, especially targeting core services, such as denudation service, on which other services rely.Functional integrity of electronic security has been subject of debate in many organizations due to the fact that it is not been trusted by many organizations (AlAboodi, 2003).Results study of private organization studyThe end results of private organization study conducted on electronic security was that improved security is very important to organizations since it adds value to the organization. These are achieved by use of electronic security to enhance swell interaction with the say-so traders across the globe. Through use of electronic security organizations have been able to gain competitive advantage over their competitors because they are able to maintain closer customer relationship. From the study conducted, it can be concluded that proper employment of electronic securities enable companies to improve their reputation which i n gambol helps to maintain and retain customers (AlAboodi, 2003)The results obtained from the studies conducted have a very practical value in the sense if a company put in place a well functioning electronic system it is a position to make a lot of sales. These is as a result of good maintenance of potential customers by the virtue that safe transaction are been carried out between the customers and the organization.If information security and electronic security is well managed, it results less costs of operations been incurred. In addition, electronic security is the basis for salutary foundation for implementation of good business structures and other vital frameworks which are factors that fosters economic growth been experience in the organization These include Total Quality Management(TQM) and Enterprise Resource Planning(ERP) (AlAboodi , 2003)

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.