E-Business Strategy Assignment Solution (GC0651)
Table of Contents
Executive Summary.
1.0 Introduction.
2.0 Overview of business (Selected organization: Tesco e-business operations).
3.0 What is e-business?.
4.0 What is information management?.
5.0 What are internet technologies?.
6.0 Problems and deficiencies of information management in current internet technologies. And how these might be overcome?.
6.1 Legacy technology.
6.2 Security and privacy.
- 3 Programming and abstraction.
6.4 Problem with the speed of development.
6.5 Problems with the structure and data.
6.6 Problems with transactions.
6.7 Problems with design.
7.0 A systemic approach to e-business security.
8.0 Common security threats and e-business security objectives.
8.1 Security threats.
8.2 Significance of corporate information security.
8.3 E-business security objectives.
8.3.1 Confidentiality.
8.3.2 Integrity.
8.3.3 Availability.
8.3.4 Legitimate use.
8.3.5 Auditing or Traceability.
8.3.6 Non-repudiation.
9.0 Present process and tools for implementing e-business security.
10.0 Designing an effective security policy.
Conclusion.
References.
Executive Summary
E-business has been one of the significant facets of the internet in the current business world. This report has conducted a study on different aspects of e-business and its strategies based on a particular business sector, namely Tesco e-Business. Firstly, the report focuses on the problems and deficiencies of information management in current internet technologies. Secondly, the report emphasizes the solutions to overcome these problems. Thirdly, the report identifies internet security issues, and finally, the report shows the approach of implementing an effective security system for e-business.
The finding of this report mainly secondary sources including books, journal articles, website contents, etc.
Tesco.com, the selected e-business organization in this report, is the largest retailer in the UK serving millions of customers every week by more than 500,000 staff. Tesco is making consumer life easier providing facilities like e-business through business (B2C) to consumer and business to business (B2B) platforms.
E–businesses refer to the businesses which are run using internet technologies to promote performance and productivity with the profitability of the organizations. Information management is the organizing and controlling of processing, delivery, and structure of information. The modern internet technologies are smartphones, Java, E-commerce, Intranet and extranet, IOS, Web 2.0, etc.
The key problems of information management in current internet technologies are legacy technologies, problems with privacy and security, deficiencies with programming and abstraction, problems with the speed of technological development, deficiencies with business structure and information, and problems with transaction and design.
Our Recommended Resources:
The identified problems and deficiencies of information management can be overcome by developing a systematic approach to e-business security. Corporate security is essential to easily capture, store, and deliver information in the present internet world. The key e-business security objectives are confidentiality, integrity, availability, legitimate use, auditing or traceability, and non-repudiation. The common security policies target possible threats as well as vulnerabilities and then accommodate the potential technologies to alleviate them. The modern e-business security practices include sophisticated servers, intrusion detection systems, firewall software and services, digital certificates, etc. In addition, systematic risk assessment and management processes must be accomplished to address the risks and to overcome them using software and hardware devices.
In conclusion, the problems of information management in current internet technologies are presented together with comprehensive solutions applied to overcome them. It is recommended that both technological initiatives and risk management approaches are essential to promote user trust or to minimize risk level and to conduct e-business with confidence by both organizations and clients……………………………
For Full Documents Click Download Button