Connectivity and Security Challenges in E-Commerce Businesses
VerifiedAdded on 2020/04/07
|8
|1431
|42
AI Summary
The analysis highlights that effective internet connectivity is crucial for e-commerce success, as it directly impacts transaction efficiency and customer satisfaction. Information technology (IT) plays a pivotal role in maintaining information security within the organization. However, inefficiencies i...

Running Head: IT for Business
IT for Business
IT for Business
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

IT for Business 1
Contents
Introduction.................................................................................................................................................1
Connectivity and Security issues..................................................................................................................1
Conclusion...................................................................................................................................................2
Recommendation........................................................................................................................................2
Contents
Introduction.................................................................................................................................................1
Connectivity and Security issues..................................................................................................................1
Conclusion...................................................................................................................................................2
Recommendation........................................................................................................................................2

IT for Business 2
Connectivity issues in e-commerce
Introduction
Information security refers to the process of saving the sensitive information of the company
from leakage. It helps the organization to make use of electronic software and initiate activities
which implement concrete security system in the organization. The new suggests that cross-
border e-commerce activities are to be regarded as one of the major development of this field
(Ahmed, and Hossain 2014).
Further, the report consists of e-commerce business which uses the information security
technology. Also, it explains the four links of e-commerce with cyber security, the issues, and
solutions as well. Although the information security is a part of the technology business, thus
inefficiency of the business hampers the growth of an organization.
Connectivity and Security issues
The case study states that implementation of digital economy provides both great opportunities
and challenges as well. Thus, it shall be noted that information technology is used wisely can
create wonders for the organization. Also, connectivity is the cornerstone of the development of
the information security system. Further, the major issue of connectivity involves four aspects
that are:
Connectivity for information: the article states that the only basis for the sales of the e-
commerce business is the strong internet connectivity inherited with the business. But there is a
huge difference despite fullest efforts of the Asian countries to upraise the use of information
communication technology. Looking at the regional infrastructure of the internet it can be said
Connectivity issues in e-commerce
Introduction
Information security refers to the process of saving the sensitive information of the company
from leakage. It helps the organization to make use of electronic software and initiate activities
which implement concrete security system in the organization. The new suggests that cross-
border e-commerce activities are to be regarded as one of the major development of this field
(Ahmed, and Hossain 2014).
Further, the report consists of e-commerce business which uses the information security
technology. Also, it explains the four links of e-commerce with cyber security, the issues, and
solutions as well. Although the information security is a part of the technology business, thus
inefficiency of the business hampers the growth of an organization.
Connectivity and Security issues
The case study states that implementation of digital economy provides both great opportunities
and challenges as well. Thus, it shall be noted that information technology is used wisely can
create wonders for the organization. Also, connectivity is the cornerstone of the development of
the information security system. Further, the major issue of connectivity involves four aspects
that are:
Connectivity for information: the article states that the only basis for the sales of the e-
commerce business is the strong internet connectivity inherited with the business. But there is a
huge difference despite fullest efforts of the Asian countries to upraise the use of information
communication technology. Looking at the regional infrastructure of the internet it can be said

IT for Business 3
that the speed is average, but not all people use the mobile internet instead the broadband and
Wi-Fi service are also prevailing in the market. Thus, the sale process for the business is
decreased as low connection due to which customer gets irritated with the services of the online
business (Chen 2017).
Further, it shall be known that it adversely affect the security system of the organization, as the
internet connectivity carry the data and private information of the company from one source to
another and if that source is broken, then the company might face issues (Niranjanamurthy, and
Chahar 2013). Caches are created by the online websites and if the speed is not satisfactory, due
to which the details of the transaction are stored in the computer of the people, and if that
information is accessed by some outsider then it can affect the growth of both company and the
customers. Also, connectivity in an e-commerce organization is adhered by investing in the fine
business process, and if the information technology software is not efficient then automatically is
can put the company in risks (Crossler, et. al., 2013).
Logistic connectivity: although the e-commerce business activities are initiated on the internet
but the logistic process is initiated through offline mode and the details of logistic are delivered
to the customer through online mode. Thus, if the information communication technology does
in give adequate details about the logistics then the issue can be raised by the customers of the
organization which can risk the growth of the company. The ICT and information security
practice align the working in the e-commerce business, thus if one of the processes is
inefficiency then the other aspect is automatically affected by it and the growth becomes slow
(Galliers, and Leidner 2014).
that the speed is average, but not all people use the mobile internet instead the broadband and
Wi-Fi service are also prevailing in the market. Thus, the sale process for the business is
decreased as low connection due to which customer gets irritated with the services of the online
business (Chen 2017).
Further, it shall be known that it adversely affect the security system of the organization, as the
internet connectivity carry the data and private information of the company from one source to
another and if that source is broken, then the company might face issues (Niranjanamurthy, and
Chahar 2013). Caches are created by the online websites and if the speed is not satisfactory, due
to which the details of the transaction are stored in the computer of the people, and if that
information is accessed by some outsider then it can affect the growth of both company and the
customers. Also, connectivity in an e-commerce organization is adhered by investing in the fine
business process, and if the information technology software is not efficient then automatically is
can put the company in risks (Crossler, et. al., 2013).
Logistic connectivity: although the e-commerce business activities are initiated on the internet
but the logistic process is initiated through offline mode and the details of logistic are delivered
to the customer through online mode. Thus, if the information communication technology does
in give adequate details about the logistics then the issue can be raised by the customers of the
organization which can risk the growth of the company. The ICT and information security
practice align the working in the e-commerce business, thus if one of the processes is
inefficiency then the other aspect is automatically affected by it and the growth becomes slow
(Galliers, and Leidner 2014).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

IT for Business 4
Connectivity flow cash flow: the flow of cash is the basic need for which the business process is
initiated in the market. And is the process with which revenue is earned in the organization, and
then the company cannot survive in long run. In relation to the cash flow which the information
security issue, if the electronic system connectivity is not efficient, then the e-payments can
expire before time. This can raise issues as customers can say that amount is deducted from their
account but it is not delivered to the company (Modi, et. al., 2013). Thus, to resolve this issue,
the company shall ensure proper connectivity of internet in the business process. The security of
customer, the privacy of transactions is maintained with efficiency internet infrastructure only.
As the e-commerce is a non-physical industry thus the customer relies on the company by
looking at its user interface and the image of the company in the market. Goodwill can be only
maintained if the security is properly maintained and issues are properly redressed by the
company (Habiba, et. al., 2016).
Integrating connectivity: integrating connectivity refers to the process of supporting
connectivity by providing extra effort in smooth functioning of the business. The public-private
partnership shall develop co-operation with the society so that no non-ethical activities are
initiated (Niranjanamurthy, et. al., 2013).
Conclusion
Thus in the limelight of the above-mentioned events, shall be noted that in an e-commerce
industry is it very important to initiate effective internet connection so that transactions are held
easily without barrier. The information technology system directly affects the information
security system of the organization. As if connectivity is not strong then the working of the
company might lose its effect.
Connectivity flow cash flow: the flow of cash is the basic need for which the business process is
initiated in the market. And is the process with which revenue is earned in the organization, and
then the company cannot survive in long run. In relation to the cash flow which the information
security issue, if the electronic system connectivity is not efficient, then the e-payments can
expire before time. This can raise issues as customers can say that amount is deducted from their
account but it is not delivered to the company (Modi, et. al., 2013). Thus, to resolve this issue,
the company shall ensure proper connectivity of internet in the business process. The security of
customer, the privacy of transactions is maintained with efficiency internet infrastructure only.
As the e-commerce is a non-physical industry thus the customer relies on the company by
looking at its user interface and the image of the company in the market. Goodwill can be only
maintained if the security is properly maintained and issues are properly redressed by the
company (Habiba, et. al., 2016).
Integrating connectivity: integrating connectivity refers to the process of supporting
connectivity by providing extra effort in smooth functioning of the business. The public-private
partnership shall develop co-operation with the society so that no non-ethical activities are
initiated (Niranjanamurthy, et. al., 2013).
Conclusion
Thus in the limelight of the above-mentioned events, shall be noted that in an e-commerce
industry is it very important to initiate effective internet connection so that transactions are held
easily without barrier. The information technology system directly affects the information
security system of the organization. As if connectivity is not strong then the working of the
company might lose its effect.

IT for Business 5
Recommendation
Thus, by looking at the above case analysis it shall be taken in accounts that, information
security is a major aspect which shall be looked after the company prevailing in the e-commerce
industry. As there is no physical contact with any person in the company therefore if an issue
occurs then it becomes typical for the company to find out the main culprit behind the problem.
Thus, the adequate measure shall be taken by the company on an initial level so that future is
saved. In order to maintain security and detract cyber-crime, the companies shall allow the entry
of the customers by encrypted code only. This will initiate security of personal information of the
customers. Also, the company shall not outsource their IT related work to other company, as
with this they can access the cloud in which crucial detail of the company is stored. Only
identified people of the organization shall make use of the price sensitive information. Thus, with
these steps, an e-commerce company can initiate adequate security of customer and company's
information.
Recommendation
Thus, by looking at the above case analysis it shall be taken in accounts that, information
security is a major aspect which shall be looked after the company prevailing in the e-commerce
industry. As there is no physical contact with any person in the company therefore if an issue
occurs then it becomes typical for the company to find out the main culprit behind the problem.
Thus, the adequate measure shall be taken by the company on an initial level so that future is
saved. In order to maintain security and detract cyber-crime, the companies shall allow the entry
of the customers by encrypted code only. This will initiate security of personal information of the
customers. Also, the company shall not outsource their IT related work to other company, as
with this they can access the cloud in which crucial detail of the company is stored. Only
identified people of the organization shall make use of the price sensitive information. Thus, with
these steps, an e-commerce company can initiate adequate security of customer and company's
information.

IT for Business 6
References
Ahmed, M. and Hossain, M.A., 2014. Cloud computing and security issues in the cloud.
International Journal of Network Security & Its Applications, 6(1), p.25.
Chen, L., 2017. Connectivity issues in e-commerce. Viewed on September 20, 2017 from
https://www.bangkokpost.com/opinion/opinion/1324759/connectivity-issues-in-e-commerce
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013.
Future directions for behavioral information security research. computers & security, 32, pp.90-
101.
Galliers, R.D. and Leidner, D.E. eds., 2014. Strategic information management: challenges and
strategies in managing information systems. Routledge.
Habiba, U., Masood, R., Shibli, M.A. and Niazi, M.A., 2014. Cloud identity management
security issues & solutions: a taxonomy. Complex Adaptive Systems Modeling, 2(1), p.5.
Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security
issues and solutions at different layers of Cloud computing. The Journal of Supercomputing,
63(2), pp.561-592.
Niranjanamurthy, M. and Chahar, D.D., 2013. The study of e-commerce security issues and
solutions. International Journal of Advanced Research in Computer and Communication
Engineering, 2(7).
References
Ahmed, M. and Hossain, M.A., 2014. Cloud computing and security issues in the cloud.
International Journal of Network Security & Its Applications, 6(1), p.25.
Chen, L., 2017. Connectivity issues in e-commerce. Viewed on September 20, 2017 from
https://www.bangkokpost.com/opinion/opinion/1324759/connectivity-issues-in-e-commerce
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013.
Future directions for behavioral information security research. computers & security, 32, pp.90-
101.
Galliers, R.D. and Leidner, D.E. eds., 2014. Strategic information management: challenges and
strategies in managing information systems. Routledge.
Habiba, U., Masood, R., Shibli, M.A. and Niazi, M.A., 2014. Cloud identity management
security issues & solutions: a taxonomy. Complex Adaptive Systems Modeling, 2(1), p.5.
Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security
issues and solutions at different layers of Cloud computing. The Journal of Supercomputing,
63(2), pp.561-592.
Niranjanamurthy, M. and Chahar, D.D., 2013. The study of e-commerce security issues and
solutions. International Journal of Advanced Research in Computer and Communication
Engineering, 2(7).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IT for Business 7
Niranjanamurthy, M., Kavyashree, N., Jagannath, S. and Chahar, D., 2013. Analysis of e-
commerce and m-commerce: advantages, limitations and security issues. International Journal of
Advanced Research in Computer and Communication Engineering, 2(6).
Niranjanamurthy, M., Kavyashree, N., Jagannath, S. and Chahar, D., 2013. Analysis of e-
commerce and m-commerce: advantages, limitations and security issues. International Journal of
Advanced Research in Computer and Communication Engineering, 2(6).
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.