E-Business Systems and Enterprise Systems Term Paper

Total Length: 2521 words ( 8 double-spaced pages)

Total Sources: 1+

Page 1 of 8

All of these systems are integrated with the company's Accounts Payable (a/P) and Accounts Receivable (a/R) and financial reporting systems so that a true measure of overall profitability can be attained. In conjunction with all of these systems the traffic and quotes on the e-commerce site also need to be fulfilled real-time from the supply chain, pricing and delivery location systems (Todd, 2007). This is a complex system design yet highly effective in telling customers interested in a specific tire when, where, and how much it will cost to purchase it. All of these systems need then to be focused on how to make the customers' experience as seamless and excellent as possible. To do that the many challenges of systems and process integration will need to be confronted head-on to make sure that customers' needs are addressed. The center of the systems must reside on the customer too; those ways the system will not over time deviate away from that focus and potentially lose its value.

4. Discuss and explain the privacy and security concerns and

associated security technologies necessary to protect the following information system.

As the e-commerce or e-business system is going to have pricing, tire availability and costs associated with it, it's critically important that there be 128 bit encryption of the application itself and the development of security levels within the application. The majority of companies actually do this through the use of role-based security where they concentrate on user rights by person in the organization. This works very well in small business as the entire series of roles can be quickly audited and accounted for over time (Hanna, 2005). Second, the use of secured dual-administrator logins for the e-business or e-commerce system and the enterprise business system are also critically important. This will alleviate the potential of one administrator getting into the system and potentially changing prices or setting prices to zero to give free tires to their friends. Third, the pricing and availability tables need to be locked over time to ensure that the system can be reliably updated and that the online prices shown are the real ones. There needs to be many security safeguards throughout the entire e-commerce and enterprise business systems platforms to ensure that no one can accidentally or intentionally get into the system and change prices, availability, tire descriptions or special pricing offers.

Stuck Writing Your "E-Business Systems and Enterprise Systems" Term Paper?

The internal safeguards within small business, many argue, are as important if not more important than the external safeguards to protect these systems from the outside world. Having periodic audits of the security levels is also critically important to ensure that there are no lapses in security coverage over time and that passwords are often changed and well managed (Wynn, 2009). In conjunction with these many concerns the tire store needs to concentrate on the threats from criminals who try to break into company websites, get thousands of dollars of products mailed to them, and have to pay nothing. There are also safeguards critically important for managing the 128-bit security of the browser sessions and of the applications themselves. Running periodic threat analysis with an outside vendor is a good idea as many companies find there are major lapses in their firewalls and security systems for both their e-commerce websites and for the enterprise business systems they have as well. All of these factors ultimately need to be rolled into a strategic plan for it security that defines specific dates and objectives for attaining specific checkpoints and evaluations of external system security.

As many security threats outside companies have to do with impersonation of company logins, this also needs to be addressed and thwarted through the use of advanced AJAX-based programming and security features in that Web development language. The development of the e-commerce site online also needs to be replicated on a main server and a proxy server used to serve the actual site. This will protect the actual site from hackers and proxy servers are by nature exceptionally difficult to break through. All of these considerations taken together increase the odds of the e-business or e-commerce site and the enterprise business system being able to stay secure over the long-term......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"E-Business Systems And Enterprise Systems" (2010, March 30) Retrieved May 5, 2024, from
https://www.aceyourpaper.com/essays/e-business-systems-enterprise-systems-74626

Latest MLA Format (8th edition)

Copy Reference
"E-Business Systems And Enterprise Systems" 30 March 2010. Web.5 May. 2024. <
https://www.aceyourpaper.com/essays/e-business-systems-enterprise-systems-74626>

Latest Chicago Format (16th edition)

Copy Reference
"E-Business Systems And Enterprise Systems", 30 March 2010, Accessed.5 May. 2024,
https://www.aceyourpaper.com/essays/e-business-systems-enterprise-systems-74626