Business Information Report: Floral Business, Technology, and Security
VerifiedAdded on  2020/05/11
|12
|1139
|59
Report
AI Summary
This report provides a comprehensive analysis of integrating technology into a floral business, exploring the evolution of business models with technological advancements, particularly e-commerce. It examines the benefits of technological support, including data management, online advertising, and ERP integration for streamlined operations and customer relationship management. The report also addresses ethical issues, emphasizing the importance of transparency and product quality, alongside information security measures like cyber security systems, firewall installation, and data encryption to protect against threats. It concludes that integrating technology, while adhering to ethical codes and robust security protocols, is essential for the floral business's progress and ethical expansion. The report references various sources on business ethics, e-commerce, and information security.

Running head: BUSINESS INFORMATION
Business information
Name of the Student
Name of the University
Author note
Business information
Name of the Student
Name of the University
Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1BUSINESS INFORMATION
Executive Summary:
Aim of the report is to present an idea of the effectiveness of technology in the business of
flower and floral products. The evolution of business has been studied along with the
advancement in technology has been studied accordingly. Ethical issues and threats of
information technology have been reviewed and effectiveness of the application of
information security has been discussed. The report concluded that it is necessary to integrate
technology and new business models in order to progress and expand the business and along
with that a good information security system must be present so that the business can prosper
ethically.
Executive Summary:
Aim of the report is to present an idea of the effectiveness of technology in the business of
flower and floral products. The evolution of business has been studied along with the
advancement in technology has been studied accordingly. Ethical issues and threats of
information technology have been reviewed and effectiveness of the application of
information security has been discussed. The report concluded that it is necessary to integrate
technology and new business models in order to progress and expand the business and along
with that a good information security system must be present so that the business can prosper
ethically.

2BUSINESS INFORMATION
Table of Contents
Introduction:...................................................................................................................3
Technological Support:..................................................................................................3
Ethical and Information Security Issues:.......................................................................5
Conclusion:....................................................................................................................6
References:.....................................................................................................................7
Appendix:.......................................................................................................................8
Screen Capture of DF Posts:......................................................................................8
Table of Contents
Introduction:...................................................................................................................3
Technological Support:..................................................................................................3
Ethical and Information Security Issues:.......................................................................5
Conclusion:....................................................................................................................6
References:.....................................................................................................................7
Appendix:.......................................................................................................................8
Screen Capture of DF Posts:......................................................................................8

3BUSINESS INFORMATION
Introduction:
Business information is an all over information package including business ethics,
effects of technology and information securities on the business and the perfection of
integration of advanced business models like e-commerce. Advancement in information
technology helps a business to evaluate its strategies and effectiveness and other issues like
business ethics and helps a business to be prepared in path of progress. Aim of the project is
to find out involvement of business ethics and information security with this business and the
ways for technology to improve the progress of the business.
Technological Support:
The business of floral and floral arrangement To extend the business I have to gather
accurate data faster, digitally. Technological advances have brought threats along with
benefits. Smaller and cheaper computers, computer hacking and cyber-crimes, lack of
computer and internet handling ability are the general threats to data protection.
Business techniques and strategies has been significantly evolved with the arrival e-
commerce and e-business. B2B, B2C, C2C, mobile commerce and e-government are
different kinds of e-business models depending on the nature of the business1. In my case,
B2B and B2C both will be primary targets. One of the benefits of e-commerce is cashless
transactions. Electronic payments are much faster and safer now-a-days with credit card,
digital cash and other systems and it also help to manage the accounts. With the help of e-
1Matos-Camarinha, E-business and Virtual Enterprises: managing business-to-business cooperation Vol. 56
(Springer, 2013)
Introduction:
Business information is an all over information package including business ethics,
effects of technology and information securities on the business and the perfection of
integration of advanced business models like e-commerce. Advancement in information
technology helps a business to evaluate its strategies and effectiveness and other issues like
business ethics and helps a business to be prepared in path of progress. Aim of the project is
to find out involvement of business ethics and information security with this business and the
ways for technology to improve the progress of the business.
Technological Support:
The business of floral and floral arrangement To extend the business I have to gather
accurate data faster, digitally. Technological advances have brought threats along with
benefits. Smaller and cheaper computers, computer hacking and cyber-crimes, lack of
computer and internet handling ability are the general threats to data protection.
Business techniques and strategies has been significantly evolved with the arrival e-
commerce and e-business. B2B, B2C, C2C, mobile commerce and e-government are
different kinds of e-business models depending on the nature of the business1. In my case,
B2B and B2C both will be primary targets. One of the benefits of e-commerce is cashless
transactions. Electronic payments are much faster and safer now-a-days with credit card,
digital cash and other systems and it also help to manage the accounts. With the help of e-
1Matos-Camarinha, E-business and Virtual Enterprises: managing business-to-business cooperation Vol. 56
(Springer, 2013)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4BUSINESS INFORMATION
commerce, I can design catalogues and make customers aware of services through websites.
Another major help of e-commerce is online advertising2.
Business flourishment also depends integrating ERP module with the business. Core
ERP module consists of operations management, financial management and human resource
management which is necessary to stabilize the business. Integration of ERP software for
these tasks along with maintaining business intelligence, supply chain management and
customer relationship management will reduce the manual labour and increase production
and distribution and enhance customer service3.
2 Colin Combe, Introduction to E-business (Routledge, 2012)
3 Pradeep Kumar Ray, Integrated management from e-business perspective: Concepts, architectures and
methodologies(Springer Science & Business Media, 2012)
commerce, I can design catalogues and make customers aware of services through websites.
Another major help of e-commerce is online advertising2.
Business flourishment also depends integrating ERP module with the business. Core
ERP module consists of operations management, financial management and human resource
management which is necessary to stabilize the business. Integration of ERP software for
these tasks along with maintaining business intelligence, supply chain management and
customer relationship management will reduce the manual labour and increase production
and distribution and enhance customer service3.
2 Colin Combe, Introduction to E-business (Routledge, 2012)
3 Pradeep Kumar Ray, Integrated management from e-business perspective: Concepts, architectures and
methodologies(Springer Science & Business Media, 2012)

5BUSINESS INFORMATION
E-commerce depends on internet, wireless network and mobile computing.Wireless
devices like PDAs, GPS, smartphones and others are the most effective method for business
networking4. Computer and mobile connectivity is maintained by WLAN, Wi-Fi and other
services. Depending on power requisition, bandwidth and data speed this connectivity
methods are used. I will prefer WLAN and WiMAX for large scale business like international
business.
A problem of the business was its dependence on internet via ADSL. Whole network
infrastructure was based on a single computer and no wireless connection. This drawback
needs to be eliminated at once for the globalization of the business. Mobile portals and voice
portal are effective in this case, so that any consumer can communicate with the business
using internet protocol5.
4 John R. Vacca, Computer and information security handbook (Newnes, 2012)
5 Robert Istepanian, Laxminarayan Swamy and S. Pattichis Constantinos, M-health (John Wiley & Sons, 2014)
E-commerce depends on internet, wireless network and mobile computing.Wireless
devices like PDAs, GPS, smartphones and others are the most effective method for business
networking4. Computer and mobile connectivity is maintained by WLAN, Wi-Fi and other
services. Depending on power requisition, bandwidth and data speed this connectivity
methods are used. I will prefer WLAN and WiMAX for large scale business like international
business.
A problem of the business was its dependence on internet via ADSL. Whole network
infrastructure was based on a single computer and no wireless connection. This drawback
needs to be eliminated at once for the globalization of the business. Mobile portals and voice
portal are effective in this case, so that any consumer can communicate with the business
using internet protocol5.
4 John R. Vacca, Computer and information security handbook (Newnes, 2012)
5 Robert Istepanian, Laxminarayan Swamy and S. Pattichis Constantinos, M-health (John Wiley & Sons, 2014)

6BUSINESS INFORMATION
Ethical and Information Security Issues:
Every business contains more or less ethical issues related with right or wrong. An
organisation must follow the code of ethics consisting of responsibility, liability,
accountability and other factors6. Using e-commerce business model for this business, many
customers cannot see the product lively; they will be seeing only the catalogues from the
internet7. Under any circumstances the customers should not be deceived by the lack of
product quality or the absence of the product entirely. I have to maintain the services properly
and the information confidential as per my claims or else the reputation of the organisation
will diminish quickly. Some of the other ethical issues that should be followed are;
1. Delivering the correct products to the correct people
2. Every detailed description of the article along with the correct price tag must be
maintained by the people
3. The company must not adapt any unethical practices
Coming to the matter of information security, threats like espionage, sabotage and
identity theft are common as well as cyber-crimes and attacks8. I have to install appropriate
cyber security system and firewall. Wireless cash transaction should be monitored by a
trained group of transaction risk management system. By setting up a SCADA system will
6 Joseph W. Weiss, Business ethics: A stakeholder and issues management approach (Berrett-Koehler
Publishers, 2014)
7 George G. Brenkert, and Beauchamp Tom L., The Oxford handbook of business ethics (Oxford University
Press, 2012)
8 Rossouw Von Solms and Johan Van Niekerk, "From information security to cyber security." (2013) computers
& security 38
Ethical and Information Security Issues:
Every business contains more or less ethical issues related with right or wrong. An
organisation must follow the code of ethics consisting of responsibility, liability,
accountability and other factors6. Using e-commerce business model for this business, many
customers cannot see the product lively; they will be seeing only the catalogues from the
internet7. Under any circumstances the customers should not be deceived by the lack of
product quality or the absence of the product entirely. I have to maintain the services properly
and the information confidential as per my claims or else the reputation of the organisation
will diminish quickly. Some of the other ethical issues that should be followed are;
1. Delivering the correct products to the correct people
2. Every detailed description of the article along with the correct price tag must be
maintained by the people
3. The company must not adapt any unethical practices
Coming to the matter of information security, threats like espionage, sabotage and
identity theft are common as well as cyber-crimes and attacks8. I have to install appropriate
cyber security system and firewall. Wireless cash transaction should be monitored by a
trained group of transaction risk management system. By setting up a SCADA system will
6 Joseph W. Weiss, Business ethics: A stakeholder and issues management approach (Berrett-Koehler
Publishers, 2014)
7 George G. Brenkert, and Beauchamp Tom L., The Oxford handbook of business ethics (Oxford University
Press, 2012)
8 Rossouw Von Solms and Johan Van Niekerk, "From information security to cyber security." (2013) computers
& security 38
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7BUSINESS INFORMATION
help to manage the transport system which is a main factor in e-commerce9. Encryption of
confidential data and authorisation of proper personnel is another responsibility of the
management. Moreover, I have to develop a back-up plan for disaster recovery.
Conclusion:
From the above reflective writing this can be shown that the requirement of
integration of technology, specifically information technology is a necessary thing for this
9 Thomas R. Peltier, Information security fundamentals, (CRC Press, 2013)
help to manage the transport system which is a main factor in e-commerce9. Encryption of
confidential data and authorisation of proper personnel is another responsibility of the
management. Moreover, I have to develop a back-up plan for disaster recovery.
Conclusion:
From the above reflective writing this can be shown that the requirement of
integration of technology, specifically information technology is a necessary thing for this
9 Thomas R. Peltier, Information security fundamentals, (CRC Press, 2013)

8BUSINESS INFORMATION
floral business. The integration of the technology must abide by all the ethical codes and it
must protect the data following proper information security steps.
floral business. The integration of the technology must abide by all the ethical codes and it
must protect the data following proper information security steps.

9BUSINESS INFORMATION
References:
Brenkert, George G., and Tom L. Beauchamp, The Oxford handbook of business
ethics(Oxford University Press, 2012)
Camarinha-Matos, E-business and Virtual Enterprises: managing business-to-business
cooperation Vol. 56 (Springer, 2013)
Combe, Colin, Introduction to E-business (Routledge, 2012)
Istepanian, Robert, Swamy Laxminarayan, and Constantinos S. Pattichis, M-health(John
Wiley & Sons, 2014)
Peltier, Thomas R., Information security fundamentals, (CRC Press, 2013)
Ray, Pradeep Kumar, Integrated management from e-business perspective: Concepts,
architectures and methodologies(Springer Science & Business Media, 2012)
Vacca, John R., Computer and information security handbook(Newnes, 2012)
Von Solms, Rossouw and Johan Van Niekerk, "From information security to cyber security."
(2013) computers & security 38
Weiss, Joseph W., Business ethics: A stakeholder and issues management approach(Berrett-
Koehler Publishers, 2014)
References:
Brenkert, George G., and Tom L. Beauchamp, The Oxford handbook of business
ethics(Oxford University Press, 2012)
Camarinha-Matos, E-business and Virtual Enterprises: managing business-to-business
cooperation Vol. 56 (Springer, 2013)
Combe, Colin, Introduction to E-business (Routledge, 2012)
Istepanian, Robert, Swamy Laxminarayan, and Constantinos S. Pattichis, M-health(John
Wiley & Sons, 2014)
Peltier, Thomas R., Information security fundamentals, (CRC Press, 2013)
Ray, Pradeep Kumar, Integrated management from e-business perspective: Concepts,
architectures and methodologies(Springer Science & Business Media, 2012)
Vacca, John R., Computer and information security handbook(Newnes, 2012)
Von Solms, Rossouw and Johan Van Niekerk, "From information security to cyber security."
(2013) computers & security 38
Weiss, Joseph W., Business ethics: A stakeholder and issues management approach(Berrett-
Koehler Publishers, 2014)
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10BUSINESS INFORMATION
Appendix:
Screen Capture of DF Posts
Appendix:
Screen Capture of DF Posts

11BUSINESS INFORMATION
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.