Reflective Writing on Ecommerce, User Interaction Design, and Cyber Security Manual
Verified
Added on  2023/06/12
|9
|1939
|92
AI Summary
This reflective writing discusses the implementation of ecommerce, user interaction design, and cyber security manual. It includes the artifact description, discussion, justification, knowledge gained, knowledge required, and reflection.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: REFLECTIVE WRITING REFLECTIVE WRITING Name of the Student: Name of the University: Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1REFLECTIVE WRITING Table of Contents Ecommerce......................................................................................................................................3 Description of the artifact:...........................................................................................................3 Discussion about the chosen artifact and its purpose:................................................................3 Justification of the artifact:..........................................................................................................3 The knowledge gathered from the discussion:............................................................................4 The knowledge required to implement the system:.....................................................................4 Reflection:....................................................................................................................................4 Mobile and the web user interaction................................................................................................4 Description of the chosen artifact:...............................................................................................4 Discussion about the chosen artifacts and the purpose:...............................................................5 Justification of choosing the artifact:...........................................................................................5 The knowledge gained from the discussion:...............................................................................5 The knowledge required to implement the system:.....................................................................5 Reflection:....................................................................................................................................6 Creation of the cyber security manual.............................................................................................6 Description of the chosen article:................................................................................................6 Discussion of the chosen article and its purpose:........................................................................6 Justification:.................................................................................................................................6 Knowledge gained from this article:............................................................................................7 Knowledge required to implement the system:...........................................................................7 Reflection:....................................................................................................................................7 References........................................................................................................................................9
2REFLECTIVE WRITING Ecommerce Description of the artifact: Ecommerce and its significance in the modification , improvisation and expansion of the business: Discussion about the chosen artifact and its purpose: In the course of the development of the project, the reflective writing has been conducted on the significance of the e-commerce for the development of the business. The organization taken as the example in this case, is the SomStore.The SomStore deals with theselling of the food itemsand thedifferent home appliances(Salemink,Strijker&Bosworth,2017).The organization is conducting the business offline. However, the business of the organization is not running as expected. In order to improve the business implementation of the e-commerce for ordering and delivering goods has been proposed by the company. Justification of the artifact: I have gathered information regarding the implementation process of the e-commerce in the SomStore. The implementation process goes through the several stages. The most important phase is the gathering of the requirements. The clarity of the requirement gatherings eliminates the scope creep in the implementation of the project (Cuevas-Vargas et al.,2015).I have learned that the requirement specification is not bounded to the technical field. Proper communication betweenthetechnicalmoduleandthebusinessmoduleisimportantfortheproper implementation of the e-commerce.
3REFLECTIVE WRITING The knowledge gathered from the discussion: I have learned that the company has a website which provides the basic information about the company, however, the website does not provide the facility regarding the online ordering of theproducts(Cuevas-Vargasetal.,2015).Thisindicatesthatthecompanycanadoptthe implementation of the e-commerce. The article has described the implementation process and the risks associated with the implemented system. The knowledge required to implement the system: The information I got from the article is related to the development of the system. Different testing is done for the development of the website. I have gained knowledge about the importance of the user feedback is important for the improvisation of the business (Rego et al.,2016).One of the critical issue for me is to understand the user interface in the e-commerce. Apart from that, I came to know that the marketing of the new business plan is important for the expand of the business. The article delivers the roadmap for the implementation of the e- commerce website. Reflection: According to me, the SomStore can consider this implementation useful as it will help to expand the business in an effective way. However, certain requirements are needed to be followed by the organization for the proper implementation of the system in the organization. Mobile and the web user interaction Description of the chosen artifact: User interaction design for the mobile and web users
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4REFLECTIVE WRITING Discussion about the chosen artifacts and the purpose: In thecourse of the project course, another article has been discussed. This article has discussed about the implementationof the user interface in case of web and mobile users (Cuevas-Vargasetal.,2015).Themainfocusofthearticleisthediscussionaboutthe implementation app that will locate the nearby restaurants. Justification of choosing the artifact: The concept of the restaurant locator app is an interesting implementation , as it will be helpful for the tourists and the locals to find the restaurants located nearby. The knowledge gained from the discussion: In order to implement the system there are certain steps needed to be followed. I have learned about the difference between user interaction of the web and the mobile users. I think, initially, this difference is needed to be evaluated (Salemink,Strijker & Bosworth,2017). The difference will indicate the requirement specification for different types of the users. The knowledge required to implement the system: In order to implement the system the difference between the way of interaction in case of web users and the mobile users are needed to be evaluated. On the other hand, for developing the restaurant app developer , the clear specification of the requirements is needed (Cuevas-Vargas et al.,2015).Theclarityintherequirementgatheringandthewelldocumentationofthe requirements will help to eliminate the scope creep in the process. The mitigation of the scope creep will help to make the restaurant locator application effective.
5REFLECTIVE WRITING Reflection: The information and the knowledge I have gained from this article will help me to develop this kind of application. I have learned the difference between the user interaction of web users and the mobile users. I have also learned about the importance and the significance of this kind of application. The specification and the challenges will help to mitigate the error scale in the future application. Creation of the cyber security manual Description of the chosen article: Creation of the manual formaintaining the cyber security for giving the training of the employees: Discussion of the chosen article and its purpose: In this case, I have to create the training manual regarding the cyber security. The main purpose of this article is to give the proper training to the employees regarding the importance of the cyber security (Halder,Halder & Guha,2015). Apart from that this article also provides the guidelines to the employees so that they can take required steps for resolving the solutions when the critical situation regarding the cyber security arrives. Justification: The information that I have gained from this article is the significance of maintaining the cyber security. I have learned that maintaining the security in the organization is an important thing.The breaching of the information can cause the organization will be a huge loss (Halder, Halder & Guha,2015).In order to prevent the problems and the security threats, the organization is needed to take the strategies those will help to mitigate the issues. The article provides me the
6REFLECTIVE WRITING information that will provide the guidelines for maintaining the security. The article defines different mitigation plan for the different cyber security threats. Knowledge gained from this article: I have gained knowledge to identify different types of hackers. There are certain techniques to mitigate the security threats. I have learned that there is no way to eliminate the security breaches in the organization. However, the security threats can be mitigated through the implementation strategies. The main challenge regarding this article , for me was to understand right information about the information and security threats in the organization andthe way cyber crime is related to these breaches (Chatterjee,Sarker & Siponen,2017).The understanding and the identification of the right information regarding the cyber security threats will help me to implement the right policy in the manual. Knowledge required to implement the system: Important thing regarding this matter is to educate the employees and the workers about the significance of maintaining the cyber security (Salemink, Strijker&Bosworth, 2017).Apart from that, I have learned that the proper communication between the technical and the business module of the organization is important along with that different technical and non technical aspects are important (Abascal et al., 2016). Reflection: The training manual has described different policies and the protection strategies for maintain the security of the systems in the organization. This article has helped me a lot to understand the significance of maintaining the cyber security for smooth running of the business (Salemink,Strijker & Bosworth,2017). The detailed discussion about the issues in maintaining the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7REFLECTIVE WRITING cyber security will helpme to understand the certain challenges those can be raised while handling the critical situations in the organizations (Halder,Halder & Guha,2015). The description of the possible problems n the manual will help the employees to become familiar with the issues and challenges regarding the cyber security.
8REFLECTIVE WRITING References Abascal, J., Barbosa, S. D., Nicolle, C., & Zaphiris, P. (2016). Rethinking universal accessibility: a broader approach considering the digital gap. Chatterjee, S., Sarker, S., & Siponen, M. (2017). How Do Mobile ICTs Enable Organizational Fluidity: Toward a Theoretical Framework.Information & Management,54(1), 1-13. Cuevas-Vargas, H., EnrĂquez, L. A., Adame, M. G., & Servin, J. L. (2015). The use of ICTs and its relation with the competitiveness of Mexican SMEs.European Scientific Journal, ESJ,11(13). Halder, I., Halder, S., & Guha, A. (2015). Undergraduate students use of mobile phones: Exploring use of advanced technological aids for educational purpose.Journal of media and communication studies,7(4), 81. Jameson, J. (2015). Leading future pedagogies.Leading Futures Global Perspectives on Educational Leadership, 222-232. Masoumi, D. (2015). Preschool teachers’ use of ICTs: Towards a typology of practice.Contemporary Issues in Early Childhood,16(1), 5-17. Rego, R., Sprenger, W., Kirov, V., Thomson, G., & Nunzio, D. D. (2016). The use of new ICTs in trade union protests–five European cases.Transfer: European Review of Labour and Research,22(3), 315- 329. Salemink, K., Strijker, D., & Bosworth, G. (2017). Rural development in the digital age: A systematic literaturereviewonunequalICTavailability,adoption,anduseinruralareas.JournalofRural Studies,54, 360-371.