Online shop environment

Document Type:Review

Subject Area:Computer Science

Document 1

The shop could also be called an e-web store as well as an e-shop. Hypothetically, the presence of the internet allows customers to visit an online shop where a higher number of employees would meet their needs immediately (Zhou et al. The owners of online shops often develop some web service emails that could be used in reaching their regular customers and for answering queries from those who sought to know more about their products. Paying the products and services is done digitally over the internet. Customers willing to visit the online shop are free to visit any local offices located in their towns and cities such as Amazon's domestic premises. E-Bay customers may feel ignored if their emails are not answered quickly and product delay as well may weaken their trust in the system.

Sign up to view the full document!

Confidentiality is the most important of all in this environment (Gefen et al. This is because, without customer confidentiality, the site cannot manage to sell their goods and services. In case the online shop has employee availability and integrity, but the level of privacy is limited, achieving set objectives will be almost impossible. Task 4: Table 1. Central processing unit A reduction in the functioning of the CPU in the online shop computers will reduce the amount of monthly income. There is a major vulnerability if the online shop does not have IT specialists to clean the CPU of minor attacks. Inadequate functioning of the CPUs in the online shops will ultimately create a situation of low income. Network card A poor connection of the card to a computer leads to computer network failures in any system.

Sign up to view the full document!

Malware attacks add viruses to a computer slowing the wireless connection. Responsive controls In network cards they respond to any issues of data loss in the online shop and prevent any malware. CCTV surveillance It can help to check the reluctant management staff leaving desktops open after finishing the work. It will prevent a situation where important data is exposed to intruders. Task 6: Table 3. 1 - Reasons for Technical Controls Technical Security Control Reason / Description Software audit trials Used in protecting the way users use the system. It helps to reduce the likelihood of a cybercrime because they keep the online shop updated. Disaster recovery policy Used to protect the online firm in case there is a loss of data (Haddad et al.

Sign up to view the full document!

It is essential in helping the firm to overcome any adverse effects by developing critical protective skills. Acceptable use policy Important when utilized in desk tops. It helps when there is a need to terminate the work of certain staff that is prone to leaving them unlocked hence exposing important data. Reduction in the confidentiality of the customers. Crashing of the CPU Central processing unit Lack of IT experts Exposing computer data to third parties. Easy access to the systems software. Private data will be stolen and misused. Loss of funds and the management works to retrieve loss data. Poor management can easily cause loss of data to third parties, and the information can be manipulated for private purposes. Information technology assets are sources that an online firm can use to acquire funds by accomplishing various means.

Sign up to view the full document!

There are multiple types of IT assets such as desktops, network cards, google drives, Microsoft windows, and the CPU. Hypothetically, the presence of the internet allows customers to visit an online shop where a higher number of employees would meet their needs immediately. The owners of online shops often develop some web service emails that could be used in reaching their regular customers and for answering queries from those who sought to know more about their products. "Trust and TAM in online shopping: an integrated model. " MIS quarterly 27. Ghai, Vikrant, Shailendra Sharma, and Ajay Jain. "Physical access control and security monitoring system utilizing a normalized data format. " U. " Journal of Consumer affairs 35. Zhou, Lina, Liwei Dai, and Dongsong Zhang. "Online shopping acceptance model-A critical survey of consumer factors in online shopping.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable