Reflective Writing: Reflecting on Technology Application in Business

Verified

Added on  2023/06/12

|8
|1600
|252
AI Summary
This reflective writing assignment discusses the application of technology in various business areas, focusing on three articles: e-commerce implementation for SomStores, user interaction design for web and mobile restaurant locator applications, and the creation of a cyber security training manual. The reflection highlights the knowledge gained from each article, including the importance of project scheduling, user feedback, and marketing plans for e-commerce; the differences between web and mobile user interactions; and the significance of cyber security policies and employee training for mitigating security threats. The author reflects on the challenges faced, such as understanding user interface nuances and gathering information on security breaches, and emphasizes the importance of digital security in modern organizations. The assignment concludes that these reflections provide a deeper understanding of technology's impact across different business functions.
Document Page
Running head: REFLECTIVE WRITING
REFLECTIVE WRITING
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1REFLECTIVE WRITING
Introduction
The advancement of the technology has lead to the application of the technology on the
various field of the business. The main purpose of this paper is reflect the three articles which
describes the application of the advanced technology on three various areas of the application.
These three articles are- e-commerce, user interaction design for the web and the mobile users
and the review of the manual of the cyber leet technology. The reflective view on these article
will help to understand the use and purpose of the deployment of application more clearly. The
significance of the each paper has been described along with the knowledge gained from theses
paper. The implementation of the gained knowledge is presented in a realistic way.
Discussion
Ecommerce and its impact on the modification and improvisation of the business:
In order to complete the project I have to reflect the discussion written about the e-
commerce and its implementation and the impact on the business modification and the
improvisation. The article is about the analysis of the business of the SomStores. SomeStores
sells different food and beverages. However, the organization is planning to do business through
using the internet. The paper discusses about the requirements for launching the dedicated
website for the Somstores, where the orders can be given by the users and the food items will be
delivered through home delivery system.
The information those I have gathered from this discussion are regarding the
implementation of the e-business process for the food delivering company. The development of
the website is no bounded to the technical field. The requirement gathering and the project
scheduling is an important procedures to be followed. I have learned that the company has a
Document Page
2REFLECTIVE WRITING
website which shares only the general information about the SomStores, and they are also not
responsive. The proposed website will be designed in such a way that it will take care of the
supply chain management of the products along with the registration of the users. The reason I
have selected this article , for the reason that it shows the way or the process aa existing business
system in an organization can adopt the e-commerce and the e-business in order to expand the
business and improvise the service. The paper also shows the necessary procedures for
implementation of the system along with the risks associated with it.
I have learned various steps like system testing for the development of the dedicated
websites. I have also learned about the importance of taking user feedback and the acceptance
testing of the website and I will implement these things in practical way. The most challenging
issue for me is to understand the nature of the user interface in the system. I have gained the
knowledge about the marketing plan and its importance. I will try to implement a good
marketing plan for promotion of the website. It can be said that this article works as a guidance
about the implementation of the e-commerce for the website for a company.
Designing of the user interaction for web and mobile users:
Another case study for the project is the discussion about the designing of the user
interaction for the web and the mobile users. The article discusses about the development of the
restaurant locator application. The concept seems interesting to me as it can be helpful for the
users to find the nearby restaurants. This app can also become a life saver for those who are new
in the city. The restaurant app locator will indicate the nearby restaurant along with its details to
the users.
Document Page
3REFLECTIVE WRITING
I have gained the information regarding the restaurant locator app, it working principal
and the development process from this discussion. There are certain factors associated with this
locator app. I have learned that there is a slight difference between the users interaction in case of
the web users and the mobile users. Initially, during the development of the app, this difference
is needed to be evaluated. I have decided to learned more about the different user interaction
processes, so that the difference can indicate the requirements needed for the development of the
app for the certain users.
The information I have gathered from the discussion can help me to make the app with
the similar functionality. I have learned about the requirements needed to develop such app.
Apart from that I have also gained information about the challenges those can be faced in this
system. The discussion will help to make the difference between the web and mobile user
interaction. Apart from that I have also gained knowledge about the working principal of the app.
This will help me during the development of any other app that will use location detection as the
main functionality.
Creating the manual for the cyber security and providing the training to the employees:
I have to create the training manual for the project. The provided manual gives the insight
about the policies of the cyber security in the organization. Apart from that the main objective of
this training manual is to provide the guideline to the employees of the organization about
maintaining the cyber security, so that they can mitigate the risks regarding the security threats.
The knowledge I have gained from this article is regarding the importance of the cyber
security in the organization. I have learned that each and every organization has to maintain the
security o the information and data. In order to do this the organization need to maintain the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4REFLECTIVE WRITING
security policies so that they can mitigate the security threats. The main reason behind choosing
this article is that this article will help me to develop the policy regarding the cyber security as it
provides thee information regrading the possible security threats in the organization along with
the mitigation plans. This article provides me the information regarding the way the organization
works with the information and possible ways ro prevent the data breaches in the organization.
This will help to develop the security policies manual in the organization.
I have gained knowledge about the way the hackers can get access to the system. The
mitigation plans of the sudden attacks described through the set of policies. The chances of the
security threats can not be eliminated completely, however, the risks regarding the security
threats can be mitigated using these policies in the organization. The main challenge for me was
to collect the right information about the happening of the security breaches in the organization,
so that I can apply the right policy for the respective situation. Another challenge is to educate
the employees in the organization about the significance of maintaining the security so that they
can apply theses policies in the right time. In order to make the further modification, I would like
to expand the manual so that it can cover a broader areas of possibilities and situations regarding
the threats and the data breaches. I have realized that apart from the managerial and the technical
development the organization needs a training manual and the security policy for the protection
of the data and information. The article helps me a lot to understand the significance of the
digital security in the organization.
Conclusion
It can be concluded from the above discussion that the reflection on these three article
will help to understand the significance of the use of the technologies in different field of its
application.
Document Page
5REFLECTIVE WRITING
Document Page
6REFLECTIVE WRITING
References
Finamore, A., Newman, J., Perino, D., Rattanavipanon, N., Soriente, C., & Vallina-Rodriguez,
N. (2017). Characterising users experience and critical path in mobile applications.
Fridman, L., Weber, S., Greenstadt, R., & Kam, M. (2017). Active authentication on mobile
devices via stylometry, application usage, web browsing, and GPS location. IEEE
Systems Journal, 11(2), 513-521.
Hua, N., Morosan, C., & DeFranco, A. (2015). The other side of technology adoption: examining
the relationships between e-commerce expenses and hotel performance. International
Journal of Hospitality Management, 45, 109-120.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7REFLECTIVE WRITING
Kurnia, S., Choudrie, J., Mahbubur, R. M., & Alzougool, B. (2015). E-commerce technology
adoption: A Malaysian grocery SME retail sector study. Journal of Business
Research, 68(9), 1906-1918.
Sadeh-Koniecpol, N., Wescoe, K., & Ferrara, J. A. (2016). U.S. Patent No. 9,398,029.
Washington, DC: U.S. Patent and Trademark Office.
Sadeh-Koniecpol, N., Wescoe, K., Brubaker, J., & Hong, J. (2017). U.S. Patent No. 9,558,677.
Washington, DC: U.S. Patent and Trademark Office.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]