E-Business Systems and Enterprise Systems Term Paper

  • Length: 8 pages
  • Subject: Business
  • Type: Term Paper
  • Paper: #41564316

Excerpt from Term Paper :

All of these systems are integrated with the company's Accounts Payable (a/P) and Accounts Receivable (a/R) and financial reporting systems so that a true measure of overall profitability can be attained. In conjunction with all of these systems the traffic and quotes on the e-commerce site also need to be fulfilled real-time from the supply chain, pricing and delivery location systems (Todd, 2007). This is a complex system design yet highly effective in telling customers interested in a specific tire when, where, and how much it will cost to purchase it. All of these systems need then to be focused on how to make the customers' experience as seamless and excellent as possible. To do that the many challenges of systems and process integration will need to be confronted head-on to make sure that customers' needs are addressed. The center of the systems must reside on the customer too; those ways the system will not over time deviate away from that focus and potentially lose its value.

4. Discuss and explain the privacy and security concerns and

associated security technologies necessary to protect the following information system.

As the e-commerce or e-business system is going to have pricing, tire availability and costs associated with it, it's critically important that there be 128 bit encryption of the application itself and the development of security levels within the application. The majority of companies actually do this through the use of role-based security where they concentrate on user rights by person in the organization. This works very well in small business as the entire series of roles can be quickly audited and accounted for over time (Hanna, 2005). Second, the use of secured dual-administrator logins for the e-business or e-commerce system and the enterprise business system are also critically important. This will alleviate the potential of one administrator getting into the system and potentially changing prices or setting prices to zero to give free tires to their friends. Third, the pricing and availability tables need to be locked over time to ensure that the system can be reliably updated and that the online prices shown are the real ones. There needs to be many security safeguards throughout the entire e-commerce and enterprise business systems platforms to ensure that no one can accidentally or intentionally get into the system and change prices, availability, tire descriptions or special pricing offers. The internal safeguards within small business, many argue, are as important if not more important than the external safeguards to protect these systems from the outside world. Having periodic audits of the security levels is also critically important to ensure that there are no lapses in security coverage over time and that passwords are often changed and well managed (Wynn, 2009). In conjunction with these many concerns the tire store needs to concentrate on the threats from criminals who try to break into company websites, get thousands of dollars of products mailed to them, and have to pay nothing. There are also safeguards critically important for managing the 128-bit security of the browser sessions and of the applications themselves. Running periodic threat analysis with an outside vendor is a good idea as many companies find there are major lapses in their firewalls and security systems for both their e-commerce websites and for the enterprise business systems they have as well. All of these factors ultimately need to be rolled into a strategic plan for it security that defines specific dates and objectives for attaining specific checkpoints and evaluations of external system security.

As many security threats outside companies have to do with impersonation of company logins, this also needs to be addressed and thwarted through the use of advanced AJAX-based programming and security features in that Web development language. The development of the e-commerce site online also needs to be replicated on a main server and a proxy server used to serve the actual site. This will protect the actual site from hackers and proxy servers are by nature exceptionally difficult to break through. All of these considerations taken together increase the odds of the e-business or e-commerce site and the enterprise business system being able to stay secure over the long-term.

References

Carayannopoulos, S.. (2009). How Technology-Based New Firms Leverage Newness and Smallness to Commercialize Disruptive Technologies. Entrepreneurship Theory and Practice, 33(2), 419-438.

J Carlton Collins. (2006). Small Business Software Grows Up. Journal of Accountancy, 201(3), 50.

Greg Hanna. (2005). PREVENTING COMPUTER FRAUD. Strategic Finance, 86(9), 30-35.

Barbara Elmore. (2006). it's a SMALL world after all. Baylor Business Review, 25(1), 8-9.

Stuart E. Jackson. (2009). The value of a dollar. The Journal of Business Strategy, 30(4), 55-57.

Malhotra, R., & Temponi, C.. (2010). Critical decisions for ERP integration: Small business issues. International Journal of Information Management, 30(1), 28.

Stuart McChlery, Alan D. Godfrey, & Lesley Meechan. (2005). Barriers and catalysts to sound financial management systems in small sized enterprises. Journal of Applied Accounting Research, 7(3), 1-26.

Robinson, D., Sherwood, a., & DePaolo, C.. (2010). Service-Learning by Doing: How a Student-run Consulting Company finds Relevance and Purpose in a Business Strategy Capstone Course. Journal of Management Education, 34(1), 88.

Kojo Saffu, John H. Walker, & Robert Hinson. (2008). Strategic value and electronic commerce adoption among small and medium-sized enterprises in a transitional economy. The Journal of Business & Industrial Marketing, 23(6), 395-404.

Anu Sanghvi. (2007). Improving Service Through Online Payroll. The CPA Journal, 77(3), 11.

Small, M.. (2009). Keeping the bad guys out: Keeping the customers happy. The British Journal of Administrative Management,32-33.

Tan, P., Sharma, R., & Theng, Y.. (2009). Effective e-commerce strategies for small online retailers. International Journal of Electronic Business, 7(5), 445.

Kristin Todd. (2007). helping local businesses aspire a little higher. Baylor Business Review, 25(2), 36-39.

Winter, S., Gaglio, C., & Rajagopalan, H.. (2009). The Value of Information Systems to Small and Medium-Sized Enterprises: Information and Communications Technologies as Signal and Symbol of Legitimacy and…

Cite This Term Paper:

"E-Business Systems And Enterprise Systems" (2010, March 30) Retrieved February 3, 2017, from
http://www.paperdue.com/essay/e-business-systems-and-enterprise-74626

"E-Business Systems And Enterprise Systems" 30 March 2010. Web.3 February. 2017. <
http://www.paperdue.com/essay/e-business-systems-and-enterprise-74626>

"E-Business Systems And Enterprise Systems", 30 March 2010, Accessed.3 February. 2017,
http://www.paperdue.com/essay/e-business-systems-and-enterprise-74626