Reflective Writing on E-commerce, User Interaction & Cyber Security
VerifiedAdded on 2023/06/12
|9
|1939
|92
AI Summary
This assignment presents a reflective writing piece focusing on three key areas: e-commerce implementation, mobile and web user interaction, and the creation of a cyber security manual. The reflection on e-commerce discusses the potential benefits of implementing an online store for SomStore, highlighting the importance of requirement gathering, user feedback, and marketing strategies. The section on user interaction explores the design considerations for web and mobile users, particularly in the context of a restaurant locator app, emphasizing the need to understand user interface differences and mitigate scope creep. Finally, the reflection on cyber security emphasizes the significance of training employees and developing mitigation plans to address security threats, highlighting the importance of communication between technical and business modules. This document is available on Desklib, a platform offering a range of study tools and resources for students.

Running head: REFLECTIVE WRITING
REFLECTIVE WRITING
Name of the Student:
Name of the University:
Author Note:
REFLECTIVE WRITING
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1REFLECTIVE WRITING
Table of Contents
Ecommerce......................................................................................................................................3
Description of the artifact:...........................................................................................................3
Discussion about the chosen artifact and its purpose:................................................................3
Justification of the artifact:..........................................................................................................3
The knowledge gathered from the discussion:............................................................................4
The knowledge required to implement the system:.....................................................................4
Reflection:....................................................................................................................................4
Mobile and the web user interaction................................................................................................4
Description of the chosen artifact:...............................................................................................4
Discussion about the chosen artifacts and the purpose:...............................................................5
Justification of choosing the artifact:...........................................................................................5
The knowledge gained from the discussion:...............................................................................5
The knowledge required to implement the system:.....................................................................5
Reflection:....................................................................................................................................6
Creation of the cyber security manual.............................................................................................6
Description of the chosen article:................................................................................................6
Discussion of the chosen article and its purpose:........................................................................6
Justification:.................................................................................................................................6
Knowledge gained from this article:............................................................................................7
Knowledge required to implement the system:...........................................................................7
Reflection:....................................................................................................................................7
References........................................................................................................................................9
Table of Contents
Ecommerce......................................................................................................................................3
Description of the artifact:...........................................................................................................3
Discussion about the chosen artifact and its purpose:................................................................3
Justification of the artifact:..........................................................................................................3
The knowledge gathered from the discussion:............................................................................4
The knowledge required to implement the system:.....................................................................4
Reflection:....................................................................................................................................4
Mobile and the web user interaction................................................................................................4
Description of the chosen artifact:...............................................................................................4
Discussion about the chosen artifacts and the purpose:...............................................................5
Justification of choosing the artifact:...........................................................................................5
The knowledge gained from the discussion:...............................................................................5
The knowledge required to implement the system:.....................................................................5
Reflection:....................................................................................................................................6
Creation of the cyber security manual.............................................................................................6
Description of the chosen article:................................................................................................6
Discussion of the chosen article and its purpose:........................................................................6
Justification:.................................................................................................................................6
Knowledge gained from this article:............................................................................................7
Knowledge required to implement the system:...........................................................................7
Reflection:....................................................................................................................................7
References........................................................................................................................................9

2REFLECTIVE WRITING
Ecommerce
Description of the artifact:
Ecommerce and its significance in the modification , improvisation and expansion of the
business:
Discussion about the chosen artifact and its purpose:
In the course of the development of the project, the reflective writing has been conducted
on the significance of the e-commerce for the development of the business. The organization
taken as the example in this case, is the SomStore. The SomStore deals with the selling of the
food items and the different home appliances (Salemink, Strijker & Bosworth,2017). The
organization is conducting the business offline. However, the business of the organization is not
running as expected. In order to improve the business implementation of the e-commerce for
ordering and delivering goods has been proposed by the company.
Justification of the artifact:
I have gathered information regarding the implementation process of the e-commerce in
the SomStore. The implementation process goes through the several stages. The most important
phase is the gathering of the requirements. The clarity of the requirement gatherings eliminates
the scope creep in the implementation of the project (Cuevas-Vargas et al.,2015). I have learned
that the requirement specification is not bounded to the technical field. Proper communication
between the technical module and the business module is important for the proper
implementation of the e-commerce.
Ecommerce
Description of the artifact:
Ecommerce and its significance in the modification , improvisation and expansion of the
business:
Discussion about the chosen artifact and its purpose:
In the course of the development of the project, the reflective writing has been conducted
on the significance of the e-commerce for the development of the business. The organization
taken as the example in this case, is the SomStore. The SomStore deals with the selling of the
food items and the different home appliances (Salemink, Strijker & Bosworth,2017). The
organization is conducting the business offline. However, the business of the organization is not
running as expected. In order to improve the business implementation of the e-commerce for
ordering and delivering goods has been proposed by the company.
Justification of the artifact:
I have gathered information regarding the implementation process of the e-commerce in
the SomStore. The implementation process goes through the several stages. The most important
phase is the gathering of the requirements. The clarity of the requirement gatherings eliminates
the scope creep in the implementation of the project (Cuevas-Vargas et al.,2015). I have learned
that the requirement specification is not bounded to the technical field. Proper communication
between the technical module and the business module is important for the proper
implementation of the e-commerce.

3REFLECTIVE WRITING
The knowledge gathered from the discussion:
I have learned that the company has a website which provides the basic information about
the company, however, the website does not provide the facility regarding the online ordering of
the products (Cuevas-Vargas et al.,2015). This indicates that the company can adopt the
implementation of the e-commerce. The article has described the implementation process and the
risks associated with the implemented system.
The knowledge required to implement the system:
The information I got from the article is related to the development of the system.
Different testing is done for the development of the website. I have gained knowledge about the
importance of the user feedback is important for the improvisation of the business (Rego et
al.,2016). One of the critical issue for me is to understand the user interface in the e-commerce.
Apart from that, I came to know that the marketing of the new business plan is important for the
expand of the business. The article delivers the roadmap for the implementation of the e-
commerce website.
Reflection:
According to me, the SomStore can consider this implementation useful as it will help to
expand the business in an effective way. However, certain requirements are needed to be
followed by the organization for the proper implementation of the system in the organization.
Mobile and the web user interaction
Description of the chosen artifact:
User interaction design for the mobile and web users
The knowledge gathered from the discussion:
I have learned that the company has a website which provides the basic information about
the company, however, the website does not provide the facility regarding the online ordering of
the products (Cuevas-Vargas et al.,2015). This indicates that the company can adopt the
implementation of the e-commerce. The article has described the implementation process and the
risks associated with the implemented system.
The knowledge required to implement the system:
The information I got from the article is related to the development of the system.
Different testing is done for the development of the website. I have gained knowledge about the
importance of the user feedback is important for the improvisation of the business (Rego et
al.,2016). One of the critical issue for me is to understand the user interface in the e-commerce.
Apart from that, I came to know that the marketing of the new business plan is important for the
expand of the business. The article delivers the roadmap for the implementation of the e-
commerce website.
Reflection:
According to me, the SomStore can consider this implementation useful as it will help to
expand the business in an effective way. However, certain requirements are needed to be
followed by the organization for the proper implementation of the system in the organization.
Mobile and the web user interaction
Description of the chosen artifact:
User interaction design for the mobile and web users
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4REFLECTIVE WRITING
Discussion about the chosen artifacts and the purpose:
In the course of the project course, another article has been discussed. This article has
discussed about the implementation of the user interface in case of web and mobile users
(Cuevas-Vargas et al.,2015). The main focus of the article is the discussion about the
implementation app that will locate the nearby restaurants.
Justification of choosing the artifact:
The concept of the restaurant locator app is an interesting implementation , as it will be
helpful for the tourists and the locals to find the restaurants located nearby.
The knowledge gained from the discussion:
In order to implement the system there are certain steps needed to be followed. I have
learned about the difference between user interaction of the web and the mobile users. I think,
initially, this difference is needed to be evaluated (Salemink, Strijker & Bosworth,2017). The
difference will indicate the requirement specification for different types of the users.
The knowledge required to implement the system:
In order to implement the system the difference between the way of interaction in case of
web users and the mobile users are needed to be evaluated. On the other hand, for developing the
restaurant app developer , the clear specification of the requirements is needed (Cuevas-Vargas et
al.,2015). The clarity in the requirement gathering and the well documentation of the
requirements will help to eliminate the scope creep in the process. The mitigation of the scope
creep will help to make the restaurant locator application effective.
Discussion about the chosen artifacts and the purpose:
In the course of the project course, another article has been discussed. This article has
discussed about the implementation of the user interface in case of web and mobile users
(Cuevas-Vargas et al.,2015). The main focus of the article is the discussion about the
implementation app that will locate the nearby restaurants.
Justification of choosing the artifact:
The concept of the restaurant locator app is an interesting implementation , as it will be
helpful for the tourists and the locals to find the restaurants located nearby.
The knowledge gained from the discussion:
In order to implement the system there are certain steps needed to be followed. I have
learned about the difference between user interaction of the web and the mobile users. I think,
initially, this difference is needed to be evaluated (Salemink, Strijker & Bosworth,2017). The
difference will indicate the requirement specification for different types of the users.
The knowledge required to implement the system:
In order to implement the system the difference between the way of interaction in case of
web users and the mobile users are needed to be evaluated. On the other hand, for developing the
restaurant app developer , the clear specification of the requirements is needed (Cuevas-Vargas et
al.,2015). The clarity in the requirement gathering and the well documentation of the
requirements will help to eliminate the scope creep in the process. The mitigation of the scope
creep will help to make the restaurant locator application effective.

5REFLECTIVE WRITING
Reflection:
The information and the knowledge I have gained from this article will help me to
develop this kind of application. I have learned the difference between the user interaction of
web users and the mobile users. I have also learned about the importance and the significance of
this kind of application. The specification and the challenges will help to mitigate the error scale
in the future application.
Creation of the cyber security manual
Description of the chosen article:
Creation of the manual for maintaining the cyber security for giving the training of the
employees:
Discussion of the chosen article and its purpose:
In this case, I have to create the training manual regarding the cyber security. The main
purpose of this article is to give the proper training to the employees regarding the importance of
the cyber security (Halder, Halder & Guha,2015). Apart from that this article also provides the
guidelines to the employees so that they can take required steps for resolving the solutions when
the critical situation regarding the cyber security arrives.
Justification:
The information that I have gained from this article is the significance of maintaining the
cyber security. I have learned that maintaining the security in the organization is an important
thing. The breaching of the information can cause the organization will be a huge loss (Halder,
Halder & Guha,2015). In order to prevent the problems and the security threats, the organization is
needed to take the strategies those will help to mitigate the issues. The article provides me the
Reflection:
The information and the knowledge I have gained from this article will help me to
develop this kind of application. I have learned the difference between the user interaction of
web users and the mobile users. I have also learned about the importance and the significance of
this kind of application. The specification and the challenges will help to mitigate the error scale
in the future application.
Creation of the cyber security manual
Description of the chosen article:
Creation of the manual for maintaining the cyber security for giving the training of the
employees:
Discussion of the chosen article and its purpose:
In this case, I have to create the training manual regarding the cyber security. The main
purpose of this article is to give the proper training to the employees regarding the importance of
the cyber security (Halder, Halder & Guha,2015). Apart from that this article also provides the
guidelines to the employees so that they can take required steps for resolving the solutions when
the critical situation regarding the cyber security arrives.
Justification:
The information that I have gained from this article is the significance of maintaining the
cyber security. I have learned that maintaining the security in the organization is an important
thing. The breaching of the information can cause the organization will be a huge loss (Halder,
Halder & Guha,2015). In order to prevent the problems and the security threats, the organization is
needed to take the strategies those will help to mitigate the issues. The article provides me the

6REFLECTIVE WRITING
information that will provide the guidelines for maintaining the security. The article defines
different mitigation plan for the different cyber security threats.
Knowledge gained from this article:
I have gained knowledge to identify different types of hackers. There are certain
techniques to mitigate the security threats. I have learned that there is no way to eliminate the
security breaches in the organization. However, the security threats can be mitigated through the
implementation strategies. The main challenge regarding this article , for me was to understand
right information about the information and security threats in the organization and the way
cyber crime is related to these breaches (Chatterjee,Sarker & Siponen,2017). The understanding and
the identification of the right information regarding the cyber security threats will help me to
implement the right policy in the manual.
Knowledge required to implement the system:
Important thing regarding this matter is to educate the employees and the workers about
the significance of maintaining the cyber security (Salemink, Strijker&Bosworth, 2017). Apart from
that, I have learned that the proper communication between the technical and the business
module of the organization is important along with that different technical and non technical
aspects are important (Abascal et al., 2016).
Reflection:
The training manual has described different policies and the protection strategies for
maintain the security of the systems in the organization. This article has helped me a lot to
understand the significance of maintaining the cyber security for smooth running of the business
(Salemink,Strijker & Bosworth,2017). The detailed discussion about the issues in maintaining the
information that will provide the guidelines for maintaining the security. The article defines
different mitigation plan for the different cyber security threats.
Knowledge gained from this article:
I have gained knowledge to identify different types of hackers. There are certain
techniques to mitigate the security threats. I have learned that there is no way to eliminate the
security breaches in the organization. However, the security threats can be mitigated through the
implementation strategies. The main challenge regarding this article , for me was to understand
right information about the information and security threats in the organization and the way
cyber crime is related to these breaches (Chatterjee,Sarker & Siponen,2017). The understanding and
the identification of the right information regarding the cyber security threats will help me to
implement the right policy in the manual.
Knowledge required to implement the system:
Important thing regarding this matter is to educate the employees and the workers about
the significance of maintaining the cyber security (Salemink, Strijker&Bosworth, 2017). Apart from
that, I have learned that the proper communication between the technical and the business
module of the organization is important along with that different technical and non technical
aspects are important (Abascal et al., 2016).
Reflection:
The training manual has described different policies and the protection strategies for
maintain the security of the systems in the organization. This article has helped me a lot to
understand the significance of maintaining the cyber security for smooth running of the business
(Salemink,Strijker & Bosworth,2017). The detailed discussion about the issues in maintaining the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7REFLECTIVE WRITING
cyber security will help me to understand the certain challenges those can be raised while
handling the critical situations in the organizations (Halder, Halder & Guha,2015). The description
of the possible problems n the manual will help the employees to become familiar with the issues
and challenges regarding the cyber security.
cyber security will help me to understand the certain challenges those can be raised while
handling the critical situations in the organizations (Halder, Halder & Guha,2015). The description
of the possible problems n the manual will help the employees to become familiar with the issues
and challenges regarding the cyber security.

8REFLECTIVE WRITING
References
Abascal, J., Barbosa, S. D., Nicolle, C., & Zaphiris, P. (2016). Rethinking universal accessibility: a broader
approach considering the digital gap.
Chatterjee, S., Sarker, S., & Siponen, M. (2017). How Do Mobile ICTs Enable Organizational Fluidity:
Toward a Theoretical Framework. Information & Management, 54(1), 1-13.
Cuevas-Vargas, H., Enríquez, L. A., Adame, M. G., & Servin, J. L. (2015). The use of ICTs and its relation
with the competitiveness of Mexican SMEs. European Scientific Journal, ESJ, 11(13).
Halder, I., Halder, S., & Guha, A. (2015). Undergraduate students use of mobile phones: Exploring use of
advanced technological aids for educational purpose. Journal of media and communication studies, 7(4),
81.
Jameson, J. (2015). Leading future pedagogies. Leading Futures Global Perspectives on Educational
Leadership, 222-232.
Masoumi, D. (2015). Preschool teachers’ use of ICTs: Towards a typology of practice. Contemporary
Issues in Early Childhood, 16(1), 5-17.
Rego, R., Sprenger, W., Kirov, V., Thomson, G., & Nunzio, D. D. (2016). The use of new ICTs in trade
union protests–five European cases. Transfer: European Review of Labour and Research, 22(3), 315-
329.
Salemink, K., Strijker, D., & Bosworth, G. (2017). Rural development in the digital age: A systematic
literature review on unequal ICT availability, adoption, and use in rural areas. Journal of Rural
Studies, 54, 360-371.
References
Abascal, J., Barbosa, S. D., Nicolle, C., & Zaphiris, P. (2016). Rethinking universal accessibility: a broader
approach considering the digital gap.
Chatterjee, S., Sarker, S., & Siponen, M. (2017). How Do Mobile ICTs Enable Organizational Fluidity:
Toward a Theoretical Framework. Information & Management, 54(1), 1-13.
Cuevas-Vargas, H., Enríquez, L. A., Adame, M. G., & Servin, J. L. (2015). The use of ICTs and its relation
with the competitiveness of Mexican SMEs. European Scientific Journal, ESJ, 11(13).
Halder, I., Halder, S., & Guha, A. (2015). Undergraduate students use of mobile phones: Exploring use of
advanced technological aids for educational purpose. Journal of media and communication studies, 7(4),
81.
Jameson, J. (2015). Leading future pedagogies. Leading Futures Global Perspectives on Educational
Leadership, 222-232.
Masoumi, D. (2015). Preschool teachers’ use of ICTs: Towards a typology of practice. Contemporary
Issues in Early Childhood, 16(1), 5-17.
Rego, R., Sprenger, W., Kirov, V., Thomson, G., & Nunzio, D. D. (2016). The use of new ICTs in trade
union protests–five European cases. Transfer: European Review of Labour and Research, 22(3), 315-
329.
Salemink, K., Strijker, D., & Bosworth, G. (2017). Rural development in the digital age: A systematic
literature review on unequal ICT availability, adoption, and use in rural areas. Journal of Rural
Studies, 54, 360-371.
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.