E-Business Fundamentals and System
VerifiedAdded on 2023/06/08
|8
|2987
|134
AI Summary
This essay explores the impact of e-technology on modern organizations and the solutions to overcome the risks and threats related to it. It discusses the importance of innovation, the impact of e-technology, and the solutions provided by technology providers. The essay also covers the encryption method, IAM framework, and cloud technology. The subject is e-business fundamentals and system, and the course code is not mentioned. The college/university is not mentioned either.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: E-BUSINESS FUNDAMENTALS AND SYSTEM
E-business fundamentals and system
Essay
Student Name
[Pick the date]
E-business fundamentals and system
Essay
Student Name
[Pick the date]
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
E-BUSINESS FUNDAMENTALS AND SYSTEM 1
E-technology has changed modern organization business operation
Technological improvements carry huge chances as well as experiments for executives from all
expert fields. Maximum organizations do not assign great or best priority to urbane technology
that reduces down the company’s development (Wagner, Beimborn and Weitzel, 2014). In the
current competitive worldwide commercial scenario, organizations that flop to improve
technologically are at possible risk of sleeve low competition as well as in standings of output.
Innovation is one of the dominant and most important fundamentals related to actual operations
management in an organization (Arshad et al, 2014). It can be well-defined as a form of
information used to generate instruments, develop abilities, and extract the collection of
materials (Peng et al, 2016). It is also the presentation of science to come across an objective or
resolve a problem. Technology upsurges the outlook for directing business in more well-
organized and modest means that are systematically different from the past.
Along with the struggle of this e-technology which is increasing at a fast speed, the rate of
alteration is also flying fast. Development of up-to-date processor systems is the most
multifaceted human action so far under-occupied by organizations (Löfsten, 2016). Its features
are also highly composite and advantageous for firms of all kinds. The beginning of fresh
organization with new equipment in the workplace has produced golden openings of occupation
for the people. There is whole alteration in the organizational construction, staff and huge
increase in the efficiency and production due to the influence of e-technology on organizations
(Mian, Lamine and Fayolle, 2016). Another alteration with the starter of novel technology was
that it concentrated on the workers in mills, workshops, and mines which woke the welfares of
workforces by the development of trade unions (Kasemsap, 2018). Through 1814-1912 there was
a foremost rise in employee’s wages which was measured to be next organizational influence.
Because the degree to which combined and single efficiency in organizations seems to be
contingent on the actual and suitable use of technology by participants, the influences of novel e-
technology on persons in organizations have alleged extended and enduring attention for
investigators (Patton, 2014).
While practical abilities and technical precision are compulsory to prosper in today’s market,
they are insufficient to distinct an organization from its opponents. To gain a competitive benefit
in e-business, the organization needed to re-shape the manner of doing the trade (Carayannis,
Sindakis and Walter, 2015). By engaging a new innovative drop-ship business model for
business, organizations are able to decrease operation completion period from 4-5 weeks to 1-3
days; upsurge transport precision to 98% or improved, and lower down operating prices by 50%.
By the year 2018, e-technology network cultivated from approximately 8% to 57% of the
corporation’s business. E-technology business inflamed to contain the world major merchants
E-technology has changed modern organization business operation
Technological improvements carry huge chances as well as experiments for executives from all
expert fields. Maximum organizations do not assign great or best priority to urbane technology
that reduces down the company’s development (Wagner, Beimborn and Weitzel, 2014). In the
current competitive worldwide commercial scenario, organizations that flop to improve
technologically are at possible risk of sleeve low competition as well as in standings of output.
Innovation is one of the dominant and most important fundamentals related to actual operations
management in an organization (Arshad et al, 2014). It can be well-defined as a form of
information used to generate instruments, develop abilities, and extract the collection of
materials (Peng et al, 2016). It is also the presentation of science to come across an objective or
resolve a problem. Technology upsurges the outlook for directing business in more well-
organized and modest means that are systematically different from the past.
Along with the struggle of this e-technology which is increasing at a fast speed, the rate of
alteration is also flying fast. Development of up-to-date processor systems is the most
multifaceted human action so far under-occupied by organizations (Löfsten, 2016). Its features
are also highly composite and advantageous for firms of all kinds. The beginning of fresh
organization with new equipment in the workplace has produced golden openings of occupation
for the people. There is whole alteration in the organizational construction, staff and huge
increase in the efficiency and production due to the influence of e-technology on organizations
(Mian, Lamine and Fayolle, 2016). Another alteration with the starter of novel technology was
that it concentrated on the workers in mills, workshops, and mines which woke the welfares of
workforces by the development of trade unions (Kasemsap, 2018). Through 1814-1912 there was
a foremost rise in employee’s wages which was measured to be next organizational influence.
Because the degree to which combined and single efficiency in organizations seems to be
contingent on the actual and suitable use of technology by participants, the influences of novel e-
technology on persons in organizations have alleged extended and enduring attention for
investigators (Patton, 2014).
While practical abilities and technical precision are compulsory to prosper in today’s market,
they are insufficient to distinct an organization from its opponents. To gain a competitive benefit
in e-business, the organization needed to re-shape the manner of doing the trade (Carayannis,
Sindakis and Walter, 2015). By engaging a new innovative drop-ship business model for
business, organizations are able to decrease operation completion period from 4-5 weeks to 1-3
days; upsurge transport precision to 98% or improved, and lower down operating prices by 50%.
By the year 2018, e-technology network cultivated from approximately 8% to 57% of the
corporation’s business. E-technology business inflamed to contain the world major merchants
E-BUSINESS FUNDAMENTALS AND SYSTEM 2
such as Wal-Mart, Target, Amazon, BabysRUs, United Consumers Club, Sears, KMart, CSN
Stores, and others.
Impact of E-technology
Organizations currently are productively mixing fresh technologies to gain an advantage over
others in terms of efficiency and facilities. With the aid of technology, there are extraordinary
alterations in the procedures like advertising, manufacture, human progress. Technology is
valuable in precise choice making, time and cash saving etc. and similar is grounded these days
on a technical basis and exploration. Furthermore, it has implanted the main part in leading
monetary analysis and regulator. Though there are numerous consequences of technology, two
implications have the greatest effect on organizations currently. First one is the automation or E-
technology and the other one is information innovation. E-technology’ or automation is not
undisputed words somewhat they shield an extensive range of outfits, workings, and methods.
Mechanization, information technology or the mixture of both of these unruffled is termed as
great innovation. Improvement or upgrade in communications innovations allows organizations
to take advantage of the practical skills of workforces around the world. Current manufacture
systems use processor-based technology for mixing various features of engineering process in an
improved and impulsive way and also allow rapid and price efficient modifications of any
product. Technology can be redemptive in allowing persons to work at periods and in places of
their own selecting. Technology also has massive possible to exceed, topographical, social and
progressive limits and so increase partnerships between organizations and their associates. The
information may be shared and dispersed with this blustery technological alteration. The
electronic media is accountable to lower down the community features of communication
between the persons working together. As the electronics has been aggressive, valuable and
recognized, therefore, the previous association between technology and occupation may be
altered. It is predictable in future to have a new founding of organizational performance, a novel
feature of effort, new method of manufacture of merchandises and services and a new pattern of
employment. Leadership plays a very important role in the implementation of this e-technology.
In footings of e-technology processes, the organization touched its fineness but its e- technology
Occupational support and shares service front line are still yet to reach to their full potential. As
per the study, in order to uphold its modest benefit, the organization wanted to reorganize all
business procedures. E-technology backend group provides B2B client facilities to shipping
processes and wriggled with the capacity of transport connected inquiries. For clients not having
digital data exchange (DDE) abilities, a branded multi-brand trade's reportage portal was
established with time-based delivery recording and tracking. It is the e-technology which has
such as Wal-Mart, Target, Amazon, BabysRUs, United Consumers Club, Sears, KMart, CSN
Stores, and others.
Impact of E-technology
Organizations currently are productively mixing fresh technologies to gain an advantage over
others in terms of efficiency and facilities. With the aid of technology, there are extraordinary
alterations in the procedures like advertising, manufacture, human progress. Technology is
valuable in precise choice making, time and cash saving etc. and similar is grounded these days
on a technical basis and exploration. Furthermore, it has implanted the main part in leading
monetary analysis and regulator. Though there are numerous consequences of technology, two
implications have the greatest effect on organizations currently. First one is the automation or E-
technology and the other one is information innovation. E-technology’ or automation is not
undisputed words somewhat they shield an extensive range of outfits, workings, and methods.
Mechanization, information technology or the mixture of both of these unruffled is termed as
great innovation. Improvement or upgrade in communications innovations allows organizations
to take advantage of the practical skills of workforces around the world. Current manufacture
systems use processor-based technology for mixing various features of engineering process in an
improved and impulsive way and also allow rapid and price efficient modifications of any
product. Technology can be redemptive in allowing persons to work at periods and in places of
their own selecting. Technology also has massive possible to exceed, topographical, social and
progressive limits and so increase partnerships between organizations and their associates. The
information may be shared and dispersed with this blustery technological alteration. The
electronic media is accountable to lower down the community features of communication
between the persons working together. As the electronics has been aggressive, valuable and
recognized, therefore, the previous association between technology and occupation may be
altered. It is predictable in future to have a new founding of organizational performance, a novel
feature of effort, new method of manufacture of merchandises and services and a new pattern of
employment. Leadership plays a very important role in the implementation of this e-technology.
In footings of e-technology processes, the organization touched its fineness but its e- technology
Occupational support and shares service front line are still yet to reach to their full potential. As
per the study, in order to uphold its modest benefit, the organization wanted to reorganize all
business procedures. E-technology backend group provides B2B client facilities to shipping
processes and wriggled with the capacity of transport connected inquiries. For clients not having
digital data exchange (DDE) abilities, a branded multi-brand trade's reportage portal was
established with time-based delivery recording and tracking. It is the e-technology which has
E-BUSINESS FUNDAMENTALS AND SYSTEM 3
changed the way of tracking the location of the product with continuous email messages showing
exact location to the customers.
E-technology provides one of the unique features that allow organizations to outsource business
operation in domestic and international environment. It is the outsourcing which has helped the
organization to introduce cost-cutting in their operations. One of the best examples of e-
technology in form of outsourcing is technical support and customer care services. In case of
small business, e-technology has proven as the lifeline of the operation because small business
usually has the shortage of workforce or proper facilities.
Technologies provider have sought to overcome the threats and risks
Technology providers are well aware of risks and threats related to these technologies. In fact,
creating threats and risks for technologies have become a kind of new unethical industry which is
continuously growing day by day with a common objective in creating a fear environment for the
world regarding these innovations (Safa et al, 2015). Hence, considering all these threats to
account theses technology providers has come up with many solutions. One of these solutions is
that people should keep their technology operating devices in update mode by buying the latest
version of anti-virus software developed by software security companies which will provide their
devices protection against these unwanted interruption codes. Virus in software is nothing but a
bunch of code which can harm the structure of the operating software (Ahmad, Maynard and
Park, 2014). Antivirus software naturally turns as a foundation procedure, skimming computers,
servers or cellphone instruments to identify and limit the blowout of unwanted threats. Numerous
antivirus software packages comprise real-time risk recognition and security to protector
contrary to possible susceptibilities as they occur, as well as arrangement, scan that observer
instruments and method records observing for likely risks. Antivirus software regularly
accomplishes these basic purposes: Skimming almanacs or exact records for recognized
malevolent designs representative the occurrence of malevolent software, permitting consumers
to timetable scans so they outing automatically, Permitting users to start novel scans at the
required time and eliminating any malevolent software it notices (Flores, Antonsen and Ekstedt,
2014). Some antivirus software package does this automatically in the back shade, while others
inform customers of contaminations and request them if customer wants to remove the harm
files. In command to scan structures systematically, antivirus software must usually be
specified private admittance to the entire structure. This creates antivirus software himself a
changed the way of tracking the location of the product with continuous email messages showing
exact location to the customers.
E-technology provides one of the unique features that allow organizations to outsource business
operation in domestic and international environment. It is the outsourcing which has helped the
organization to introduce cost-cutting in their operations. One of the best examples of e-
technology in form of outsourcing is technical support and customer care services. In case of
small business, e-technology has proven as the lifeline of the operation because small business
usually has the shortage of workforce or proper facilities.
Technologies provider have sought to overcome the threats and risks
Technology providers are well aware of risks and threats related to these technologies. In fact,
creating threats and risks for technologies have become a kind of new unethical industry which is
continuously growing day by day with a common objective in creating a fear environment for the
world regarding these innovations (Safa et al, 2015). Hence, considering all these threats to
account theses technology providers has come up with many solutions. One of these solutions is
that people should keep their technology operating devices in update mode by buying the latest
version of anti-virus software developed by software security companies which will provide their
devices protection against these unwanted interruption codes. Virus in software is nothing but a
bunch of code which can harm the structure of the operating software (Ahmad, Maynard and
Park, 2014). Antivirus software naturally turns as a foundation procedure, skimming computers,
servers or cellphone instruments to identify and limit the blowout of unwanted threats. Numerous
antivirus software packages comprise real-time risk recognition and security to protector
contrary to possible susceptibilities as they occur, as well as arrangement, scan that observer
instruments and method records observing for likely risks. Antivirus software regularly
accomplishes these basic purposes: Skimming almanacs or exact records for recognized
malevolent designs representative the occurrence of malevolent software, permitting consumers
to timetable scans so they outing automatically, Permitting users to start novel scans at the
required time and eliminating any malevolent software it notices (Flores, Antonsen and Ekstedt,
2014). Some antivirus software package does this automatically in the back shade, while others
inform customers of contaminations and request them if customer wants to remove the harm
files. In command to scan structures systematically, antivirus software must usually be
specified private admittance to the entire structure. This creates antivirus software himself a
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
E-BUSINESS FUNDAMENTALS AND SYSTEM 4
shared objective for invaders, and investigators have exposed isolated code implementation and
other grim susceptibilities in antivirus software in latest years.
Another solution to overcoming these threats is to have a backup system in which all the
important data is being stored. But as today is the world of real-time system which means data
are being generated in not thousands, not in millions but in billions. Hence another problem
arises which is related to storage capacity. At that time the only option for companies was to
develop extra support storage devices like pen drive or hard disk which was not able to solve this
problem which was in need of storing data in billions. Then these technologies provider
companies came up with the new innovative idea.
They thought that instead of developing these devices, the company should develop a network
which was named cloud technology which exists in widespread data centers, which organization
can use with the help of internet (Chang, Kuo, and Ramachandran, 2016). It is a gathering of
schmoozed computer hardware that works combinable to deliver numerous features of
calculating in the form of operational services. People can’t actually touch the hardware itself in
the open cloud, but can regulator it remotely with web crossing point. One of the dominant
aspects of the cloud is visualization. Virtual equipment is formed with software that divides the
calculating power, recollection and storing of a given instrument into numerous smaller
components, all running their own working system (Webb et al, 2014). This visualization lets
computing assets to be united and assigned efficiently across the cloud. Cloud computing is a
common word that is better alienated into three groups: Substructure as a Service - where large
companies like Amazon and Google rental out huge calculating substructure to additional
companies; Stage as a service - online galaxies where designers make virtual applications for
customized sets of customers; and Software as a provision - where customers use this technology
with the help of internet (Stone et al, 2015).
Currently, these companies have developed a technology called as IAM or identity and access
management. With the help of IAM framework, a company can control user access to critical
information related to their company. It develops a role-based access control which restricts the
data related to the company according to the role and responsibilities of the user. This access
control increases the business operation by reducing the number of accesses (Safa and Von
Solms, 2016).
These companies have also formed an association with some vendors which only focuses on the
security system of the customer. In this association, the security protection is not only in control
of a single vendor but it provides multiple vendor support which helps the customer during the
shared objective for invaders, and investigators have exposed isolated code implementation and
other grim susceptibilities in antivirus software in latest years.
Another solution to overcoming these threats is to have a backup system in which all the
important data is being stored. But as today is the world of real-time system which means data
are being generated in not thousands, not in millions but in billions. Hence another problem
arises which is related to storage capacity. At that time the only option for companies was to
develop extra support storage devices like pen drive or hard disk which was not able to solve this
problem which was in need of storing data in billions. Then these technologies provider
companies came up with the new innovative idea.
They thought that instead of developing these devices, the company should develop a network
which was named cloud technology which exists in widespread data centers, which organization
can use with the help of internet (Chang, Kuo, and Ramachandran, 2016). It is a gathering of
schmoozed computer hardware that works combinable to deliver numerous features of
calculating in the form of operational services. People can’t actually touch the hardware itself in
the open cloud, but can regulator it remotely with web crossing point. One of the dominant
aspects of the cloud is visualization. Virtual equipment is formed with software that divides the
calculating power, recollection and storing of a given instrument into numerous smaller
components, all running their own working system (Webb et al, 2014). This visualization lets
computing assets to be united and assigned efficiently across the cloud. Cloud computing is a
common word that is better alienated into three groups: Substructure as a Service - where large
companies like Amazon and Google rental out huge calculating substructure to additional
companies; Stage as a service - online galaxies where designers make virtual applications for
customized sets of customers; and Software as a provision - where customers use this technology
with the help of internet (Stone et al, 2015).
Currently, these companies have developed a technology called as IAM or identity and access
management. With the help of IAM framework, a company can control user access to critical
information related to their company. It develops a role-based access control which restricts the
data related to the company according to the role and responsibilities of the user. This access
control increases the business operation by reducing the number of accesses (Safa and Von
Solms, 2016).
These companies have also formed an association with some vendors which only focuses on the
security system of the customer. In this association, the security protection is not only in control
of a single vendor but it provides multiple vendor support which helps the customer during the
E-BUSINESS FUNDAMENTALS AND SYSTEM 5
failure of one of the vendors regarding their security. When the vendor fails immediately the
other vendor takes place and provides the necessary support (Hashem et al, 2016).
Nowadays these technologies provider organizations have developed a unique way of providing
security against risks and threats which is known as encryption method. The encryption method
is actually a process of hiding data in the form of such script which are not readable. Under this
process, the whole data is converted in the form of codes and then a security key is fixed on it.
Without the accesses of this security keys, these codes cannot be converted into its original
shape. The key is divided into two forms one is private form and another is public form. Private
form key is only accessed able to the owner of the organization and the public key is access able
to everyone that is why it is called public.
Conclusion
The constant use of technical science of calculating and technology-based interaction reform has
many economic and public influences on current people and needs serious public discipline
exploration in order to achieve its dangers and hazards. Such effort would be appreciated for
both public rules and technology project. Choices have to be occupied prudently. Numerous
selections being made currently will be expensive or problematic to transform in the upcoming.
The evidence substructure deals both potential and threat: potential in the procedure of amazing
comfort of access to a massive collection of evidence, and the threat from chances both for
evidence to be reproduced unsuitably and for evidence access to be measured in new and
challenging means. Giving a suitable percentage of permission to data is dominant to
understanding the potential of the evidence base substructure.
failure of one of the vendors regarding their security. When the vendor fails immediately the
other vendor takes place and provides the necessary support (Hashem et al, 2016).
Nowadays these technologies provider organizations have developed a unique way of providing
security against risks and threats which is known as encryption method. The encryption method
is actually a process of hiding data in the form of such script which are not readable. Under this
process, the whole data is converted in the form of codes and then a security key is fixed on it.
Without the accesses of this security keys, these codes cannot be converted into its original
shape. The key is divided into two forms one is private form and another is public form. Private
form key is only accessed able to the owner of the organization and the public key is access able
to everyone that is why it is called public.
Conclusion
The constant use of technical science of calculating and technology-based interaction reform has
many economic and public influences on current people and needs serious public discipline
exploration in order to achieve its dangers and hazards. Such effort would be appreciated for
both public rules and technology project. Choices have to be occupied prudently. Numerous
selections being made currently will be expensive or problematic to transform in the upcoming.
The evidence substructure deals both potential and threat: potential in the procedure of amazing
comfort of access to a massive collection of evidence, and the threat from chances both for
evidence to be reproduced unsuitably and for evidence access to be measured in new and
challenging means. Giving a suitable percentage of permission to data is dominant to
understanding the potential of the evidence base substructure.
E-BUSINESS FUNDAMENTALS AND SYSTEM 6
References:
Ahmad, A., Maynard, S.B. and Park, S. (2014) Information security strategies: towards an
organizational multi-strategy perspective. Journal of Intelligent Manufacturing, 25(2), pp.357-
370.
Arshad, A.S., Rasli, A., Arshad, A.A. and Zain, Z.M. (2014) The impact of entrepreneurial
orientation on business performance: A study of technology-based SMEs in Malaysia. Procedia-
social and behavioral sciences, 130, pp.46-53.
Carayannis, E.G., Sindakis, S. and Walter, C. (2015) Business model innovation as lever of
organizational sustainability. The Journal of Technology Transfer, 40(1), pp.85-104.
Chang, V., Kuo, Y.H. and Ramachandran, M. (2016) Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.
Flores, W.R., Antonsen, E. and Ekstedt, M. (2014) Information security knowledge sharing in
organizations: Investigating the effect of behavioral information security governance and
national culture. Computers & Security, 43, pp.90-110.
Hashem, I.A.T., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I., Gani, A., Ahmed, E. and
Chiroma, H. (2016) The role of big data in smart city. International Journal of Information
Management, 36(5), pp.748-758.
Kasemsap, K. (2018) The role of information system within enterprise architecture and their
impact on business performance. In Global Business Expansion: Concepts, Methodologies,
Tools, and Applications, 25 (2), pp. 1078-1102.
Löfsten, H. (2016) Business and innovation resources: Determinants for the survival of new
technology-based firms. Management Decision, 54(1), pp.88-106.
Mian, S., Lamine, W. and Fayolle, A. (2016) Technology Business Incubation: An overview of
the state of knowledge. Technovation, 50, pp.1-12.
Patton, D. (2014) Realising potential: The impact of business incubation on the absorptive
capacity of new technology-based firms. International Small Business Journal, 32(8), pp.897-
917.
Peng, J., Quan, J., Zhang, G. and Dubinsky, A.J. (2016) Mediation effect of business process and
supply chain management capabilities on the impact of IT on firm performance: Evidence from
Chinese firms. International journal of information management, 36(1), pp.89-96.
Safa, N.S. and Von Solms, R. (2016) An information security knowledge sharing model in
organizations. Computers in Human Behavior, 57, pp.442-451.
References:
Ahmad, A., Maynard, S.B. and Park, S. (2014) Information security strategies: towards an
organizational multi-strategy perspective. Journal of Intelligent Manufacturing, 25(2), pp.357-
370.
Arshad, A.S., Rasli, A., Arshad, A.A. and Zain, Z.M. (2014) The impact of entrepreneurial
orientation on business performance: A study of technology-based SMEs in Malaysia. Procedia-
social and behavioral sciences, 130, pp.46-53.
Carayannis, E.G., Sindakis, S. and Walter, C. (2015) Business model innovation as lever of
organizational sustainability. The Journal of Technology Transfer, 40(1), pp.85-104.
Chang, V., Kuo, Y.H. and Ramachandran, M. (2016) Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.
Flores, W.R., Antonsen, E. and Ekstedt, M. (2014) Information security knowledge sharing in
organizations: Investigating the effect of behavioral information security governance and
national culture. Computers & Security, 43, pp.90-110.
Hashem, I.A.T., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I., Gani, A., Ahmed, E. and
Chiroma, H. (2016) The role of big data in smart city. International Journal of Information
Management, 36(5), pp.748-758.
Kasemsap, K. (2018) The role of information system within enterprise architecture and their
impact on business performance. In Global Business Expansion: Concepts, Methodologies,
Tools, and Applications, 25 (2), pp. 1078-1102.
Löfsten, H. (2016) Business and innovation resources: Determinants for the survival of new
technology-based firms. Management Decision, 54(1), pp.88-106.
Mian, S., Lamine, W. and Fayolle, A. (2016) Technology Business Incubation: An overview of
the state of knowledge. Technovation, 50, pp.1-12.
Patton, D. (2014) Realising potential: The impact of business incubation on the absorptive
capacity of new technology-based firms. International Small Business Journal, 32(8), pp.897-
917.
Peng, J., Quan, J., Zhang, G. and Dubinsky, A.J. (2016) Mediation effect of business process and
supply chain management capabilities on the impact of IT on firm performance: Evidence from
Chinese firms. International journal of information management, 36(1), pp.89-96.
Safa, N.S. and Von Solms, R. (2016) An information security knowledge sharing model in
organizations. Computers in Human Behavior, 57, pp.442-451.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
E-BUSINESS FUNDAMENTALS AND SYSTEM 7
Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A. and Herawan, T. (2015)
Information security conscious care behaviour formation in organizations. Computers &
Security, 53, pp.65-78.
Stone, D.L., Deadrick, D.L., Lukaszewski, K.M. and Johnson, R. (2015) The influence of
technology on the future of human resource management. Human Resource Management
Review, 25(2), pp.216-231.
Wagner, H.T., Beimborn, D. and Weitzel, T. (2014) How social capital among information
technology and business units drives operational alignment and IT business value. Journal of
Management Information Systems, 31(1), pp.241-272.
Webb, J., Ahmad, A., Maynard, S.B. and Shanks, G. (2014) A situation awareness model for
information security risk management. Computers & security, 44, pp.1-15.
Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A. and Herawan, T. (2015)
Information security conscious care behaviour formation in organizations. Computers &
Security, 53, pp.65-78.
Stone, D.L., Deadrick, D.L., Lukaszewski, K.M. and Johnson, R. (2015) The influence of
technology on the future of human resource management. Human Resource Management
Review, 25(2), pp.216-231.
Wagner, H.T., Beimborn, D. and Weitzel, T. (2014) How social capital among information
technology and business units drives operational alignment and IT business value. Journal of
Management Information Systems, 31(1), pp.241-272.
Webb, J., Ahmad, A., Maynard, S.B. and Shanks, G. (2014) A situation awareness model for
information security risk management. Computers & security, 44, pp.1-15.
1 out of 8
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.