.

Wednesday, May 6, 2020

Commerce Implementation Report Services †Myassignmenhelp.Com

Question: Discuss About The Commerce Implementation Report Services? Answer: Introduction Cleaning trade services has decided to go online with the setting up of a website for their business. The decision has been taken with the expansion of the business and the website will allow the business to reach out to more number of customers. There will be various steps and processes that will be present in the project and all of these activities shall be covered with required standards and protocols. The report covers the implementation plan, mobile web presence, e-commerce security along with the information privacy in social media. Implementation Plan SDLC Approach The web site that will be designed for online cleaning trade services shall be developed and implemented with the aid of the SDLC approach as iterative Waterfall model. There are numerous techniques that have been defined in order to develop a website out of which iterative Waterfall provides an amalgamation of traditional and the new and improved practices. It comprises of the dedicated steps to proceed towards the development of a site and also includes the mechanism to gain feedback regarding the progress in each of the iterations or phases (Kaur, 2015). SDLC Steps There will be five major steps that will be involved in the development of the website. These steps have been listed and described below. System Planning and Analysis This will be the first step that will be involved in the development of the website for cleaning trade services. It is the step that will include the execution of planning tasks and activities which will determine the scope for the web site and will also estimate the budget and schedule that will be involved with the entire project (Cohen, 2010). The requirements will be gathered and analyzed in this step which will then be divided into categories such as functional requirements, non-functional requirements, user requirements etc. Finalization of the scope along with the budget and schedule will be the outcomes from this phase. System Design Designing of the system is essential to make sure that the steps that lie ahead in terms of execution and development are completed with utmost perfection. The activities that will take place in this step will be carried out from the outputs provided by the previous phase. There are several design principles that have been created and provided in terms of web development which will be utilized for designing the layout and other UI aspects associated with the site. Qualities such as usability and reliability will be paid much attention during this step. System design document will be the outcome from this phase (Mohankumar and Anand Kumar, 2016). Building the System System Development Development and building of the website will be a very important phase that will be involved with the site and there will be several activities and sub-activities that will be involved in this phase. The developmental activities will be based upon the outcomes of the analysis and design steps. It will include the creation of the source code which will be carried out on the basis of the requirements and specifications that will be provided and finalized. Also, the development team will carry out unit testing on the source code that will be created in order to make sure that there are no major defects present in the website (Sabale, 2012). System Testing Testing is a very important activity and step that plays a significant role in the performance of the websites and other systems. In case of the website for cleaning trade services, testing will be carried out in order to highlight the defects that will be associated with the site. The defects will be reported and logged in to the defect tracking and management tool and a report will be provided to the senior management and the development team. There will many testing types that will be executed on the website such as system testing, integration testing, regression testing, performance testing, security testing and load testing. The primary aim of all of these testing types will be to make sure that during the actual usage of the site, the customer does not experience any major defects or bugs that may lead to deviation from the actual path. There will also be a test plan that will be created for the entire testing activity that will state the testing methodology and approach that w ill be used along with the types of testing and defect reporting mechanisms that will be covered (Habib, 2014). System Maintenance Web development does not come to an end with the deployment and implementation of the site. However, technology that is involved in web development is transforming with each passing day and it is necessary to ensure that the pace is maintained with the change in technology. It is therefore necessary to maintain and upgrade the web site at regular intervals. The same will be applied in case of the website for cleaning trade services. The practice will also offer advantages in terms of the security of the website as the attacks and threats that will designed for a specific version will get avoided and prevented with the upgrade on the website. Mobile Web Presence In order to reach out to increased number of customers, it will be essential that the presence is ensured on the mobile platforms as well. There will be several components that will be involved to make sure that the presence on the mobile platforms is utilized to the fullest. Mobile OS There are several mobile operating systems that are being used by the users all across the globe. The mobile application that will be designed for cleaning trade service shall make sure that the compatibility with all the major mobile operating systems is ensured. There are a few major operating systems that are in use such as Android, iOS and Windows. The mobile app that will be designed will be required to confirm to the requirements of the devices that run on these operating systems (Barolli, Hsu and Shibata, 2008). Design of the Application There is a lot of difference between the design of the website that will run on desktops and laptops and the design of the application for the mobile devices such as Smartphones and tablets. It is because of the reason that there is a huge difference in the resolution and screen size between the two categories of the devices. The design of the application for cleaning trade services will therefore be required to adhere to the design principles that have been defined for the mobile devices. The following specifications will be required to be maintained and reflected in the screens of the application. There shall be extra attention that shall be paid to the navigation on the screens of the mobile devices as the aspects of the laptops/personal computers and mobile devices are different. It shall be made sure that there is not too much of navigation present on any of the screens of the application. The layout that will be used in the mobile app shall also be kept simple to make sure there is congestion avoided and the use of spaces is adequately done (N Inukollu et al., 2014). Consistency is one of the major principles that are involved in the applications that are designed and developed for the mobile devices. It shall be made sure that the screens of the mobile app are consistent in terms of the layout and design and also in terms of the colors and style. There shall also be no overuse of colors done on the screens of the mobile app and it shall also be made sure that the visual appeal that is offered along with the application is high. Mobile App Security The security attacks and threats that are associated with the mobile devices and mobile applications are huge in number and there are also several protection measures that are available to fight against the attacks. Some of the attacks and risks that are associated with the mobile apps include the threats that are related with the security of the device itself. There may be occurrences wherein these devices may get lost or stolen which will be dangerous from the point of view of the security of the information. There shall be measures installed within the app to make sure that the information related to the application stays safe in such a case. Apart from the device related threats, there will also be a number of other threats and risks that will be associated with the mobile devices in terms of the information security and privacy. It will be necessary to make sure that there are security mechanisms and measures built within the application to fight against these risks and attacks (Vasileiadis, 2014). Some of the measures that will be necessary to be built in the app will include the automated encryption of the information associated with the application while it travels from one place to the other. Also, the measures around access control and authentication will be essential so that the basic security of the mobile app is enhanced. Front end and Back end The front end of the mobile app will be required to be developed in a programming language such as JAVA or PHP that offers inter-operatibility to the application. Also, it will provide the application with the abilities such as scalability, flexibility and adaptability. There will also be certain back end requirements that will be necessary with the setting up of database using the database engine as MySQL or any of the NoSQL databases. The information will be efficiently managed and stored using these database engines in the application of cleaning trade services (Chen, 2016). E-Commerce Security Environment Security will be a prime area of concern for the e-commerce website of cleaning trade services. There will be numerous security risks and threats that will be associated with the web site. Security Threats and Risks The primary threats that will be associated with the website of the cleaning trade services will be around the security and privacy of the information. These threats will impact the properties of the information such as its confidentiality and integrity. Also, the availability of the website will be demanded and desired by the users which will also be adversely impacted by these attacks (Herrmann, 2004). The website will be accessible and will be made available to the users with the aid of information networks and there will be many access points that will be present in the website. These access points will lead to become the cause for various security attacks and risks such as unauthorized tracking, breaching of information and eavesdropping on the network. There will also be numerous attacks that will be related with the system availability as the same will be impacted by the security attacks on the website. Many of the flooding attacks will be possible and probable which will lead to the damage to the availability of the website and will also impact the user experience. Some of the other attacks will involve server impersonation, phishing and spoofing attacks, malware attacks, man in the middle attacks, alteration of media contents etc (Stubblefield, Rubin and Wallach, 2005). Security Steps and Measures Technology has allowed the technocrats to develop protection measures against the security threats and attacks and it is essential to ensure that these measures are implemented in case of the website for cleaning trade services as well. The security steps that shall be implemented shall include a mix of administrative controls along with logical and physical controls. Administrative Controls There are numerous activities that will take place during the design, development, deployment and post-deployment of the website for cleaning trade services. These activities will be required to be monitored and reviewed at regular intervals so that the deviations of any sorts are avoided. Also, it will be essential to come up with enhanced protocols and review policies so that the frequent validation and evaluation is carried out by the administrative department and senior management. Network will be the prime cause of the threats which will be required to be monitored and reviewed at frequent basis (Hein, Morozov and Saiedian, 2011). Logical Controls Application of technology in order to manage the security risks and attacks will be essential and there are several logical and technical controls that have been created for the same. Basic security of the website for cleaning trade services will be required to be improved by making sure that the authentication and access control measures are effectively taken and there are enhanced measures such as one time passwords, single sign on, two-fold authentication etc. are adapted (Schaupp, 2010). There shall also be implementation of advanced mechanisms in terms of technical controls such as use of the automated tools for avoiding the attacks. Some of these tools include anti-denial tools, Intrusion Detection Prevention systems, anti-malware tools and many more. Information encryption is a process that is mandatory in case of all the e-commerce sites and applications so that the risk to the information security and privacy is nullified. The same shall be applied in this case as well. There are also technical and automated tools that are available for backing up of the data and information which shall be used in the website for scheduling automated backups so that the information remains safe(Changchit, 2011). Physical Controls There are many physical controls that will be applicable in this case. The website of the cleaning trade services will be accessed by the users through the aid of a device such as laptops, personal computers or any of the mobile devices. These devices will be required to be safeguarded so that there are no occurrences of loss or stealing of the device. Application and implementation of all of the measures that have been stated above will be required to be done so that the timely prevention and detection of the security attacks and risks can be done and the damage can be controlled. Frequent occurrences of these risks and attacks will be damaging for the success of the website as it will lead to the minimization of the customer trust and will also lead to reduction of the customer engagement with the website. Information Privacy in Social Media Use of social media and social networking has enhanced and the same will be incorporated on the website as well. The website will be integrated with all the popular social media platforms that will allow the customers to connect with their respective social media accounts and share the information through the same. The information that is shared through any of these social media accounts is either shred with public or with the friends that are added in the social media account. There are privacy and account settings that are usually required to be done to make sure that the information does not go in wrong hands (Chung, 2016). Problems to Customers There may be several problems that the customers may face while they share information with the aid of their social media accounts. There are several security risks that are associated with sharing of information on social media. The hackers and attackers make use of suspicious URLs so that the users may click on them which will introduce the viruses or other malware on the system and website that the user is using for accessing the social media account. The privacy of the user information is out at stake because of such activities (Montaquila and Godwin, 2016). The users can also post information through the website on the basis of location based services. For instance, in order to apply as a cleaner or for searching a cleaner in particular area or locality, the location will be picked up by the website. The same will be reflected on the information shared on the social media accounts through the website. Malicious entities may take advantage from this situation and the enemies of the users may cause physical harm by tracking the user location(Rosenblum, 2007). The information that is once posted on the social media accounts may be misused by the entities such as the preferences and choices may be studied and the patterns may be acquired to gain important and significant information about the users. Also, in case of making the information available to public, there are many entities that can view the information (Hazari and Brown, 2013). Steps to Follow by the Organization The organization shall follow certain steps and procedures to make sure that the risks that are associated with the social media accounts and networks are avoided and the information of the users is protected and secured at all times. There is an option of restriction on the access that shall be used by the website to put a check on the risks and attacks that are associated with the information present on the social media accounts. The restriction will make sure that only the entities that the user wants can view the information that is shared by the user and no other entity can gain access to the same. There shall be disclaimers and alerts included on the website regarding the probable and possible risks that may emerge if the user shares the information from his or her account on any of the social media platforms (Zhang, 2016). There shall also be used and installation of in-built anti-spyware, anti-virus and other anti-malware packages in the website and all of its components so that the information that is shared by the user remains safe and secure at all times. There is an ethical code of conduct that the employees and the entities associated with the organization and the website must follow to make sure that there are no internal threats and risks that are given shape. The employees of the organization will have added privileges to access the user information for several purposes such as analysis or testing. This information may be misused by the employees and may be transferred in the wrong hands. Such occurrences shall be avoided and there shall be timely and regular trainings regarding the ethical practices and professional code of conduct that shall be given to the employees. Social media along with its use and application in the field of e-commerce will provide several advantages to the industry and the same will apply to cleaning trade services as well. However, there are certain guidelines that shall be followed to make sure that there are no risks and threats to the information that is associated with the website. It will also be essential and necessary to make sure that the stakeholders and employees that are associated with the organization also follow ethical and professional practices to avoid any of the risks (Qi and Edgar-Nevill, 2011). Conclusion E-commerce is an industry that has flourished and is developing itself with each passing day. The online presence of a particular business has become a necessity in the current times. Cleaning trade services has also agreed to go with the flow and a website will be set up for the business to make sure that more number of customers may access the site. The entire process involved in the setting up of the website shall be completed in a series of five phases as system analysis, system design, system development, system testing and maintenance of the system. It will also be essential for cleaning trade services to have mobile web presence as well with the creation of a mobile application for the business. It will allow more and more number of customers to get associated with the same. There are certain security risks that will be associated with the website and mobile application that will be developed. It has been recommended that the users and the organization shall take steps to make sure that these risks and attacks are avoided. On the side of the user, it shall be ensured that the physical safety of the devices is maintained and they do not click on any suspicious or malicious links. Also, sharing of the information on social media accounts and platforms shall be controlled. The organization shall also take steps to put a check on the security attacks by applying administrative, technical and physical controls. These controls shall have the basic security aim as the prevention of attacks and control of the damage that may be caused. References Barolli, L., Hsu, H. and Shibata, Y. (2008). Mobile Systems and Applications. Mobile Information Systems, 4(2), pp.77-79. Changchit, C. (2011). Security Systems Framework, Security-Related Research, Web Threats. Journal of Information Privacy and Security, 7(4), pp.1-2. Chen, C. (2016). Cognition and Cooperation in Advanced Wireless and Mobile Information Systems. Mobile Information Systems, 2016, pp.1-2. Chung, W. (2016). Social media analytics: Security and privacy issues. Journal of Information Privacy and Security, 12(3), pp.105-106. Cohen, S. (2010). A Software System Development Life Cycle Model for Improved Stakeholders Communication and Collaboration. International Journal of Computers Communications Control, 5(1), p.20. Habib, B. (2014). Relationship between the System Development Life Cycle and Software Quality Criterions for Achieving a Quality Software Product. International Journal of Computer Applications, 104(10), pp.17-23. Hazari, S. and Brown, C. (2013). An Empirical Investigation of Privacy Awareness and Concerns on Social Networking Sites. Journal of Information Privacy and Security, 9(4), pp.31-51. Hein, D., Morozov, S. and Saiedian, H. (2011). A survey of client-side Web threats and counter-threat measures. Security and Communication Networks, 5(5), pp.535-544. Herrmann, G. (2004). Introduction: Security and Trust in Electronic Commerce. Electronic Commerce Research, 4(1/2), pp.5-7. Kaur, A. (2015). Suitability of Existing Software Development Life Cycle (SDLC) in Context of Mobile Application Development Life Cycle (MADLC). International Journal of Computer Applications, 116(19), pp.1-6. Mohankumar, M. and Anand Kumar, M. (2016). Green based Software Development Life Cycle Model for Software Engineering. Indian Journal of Science and Technology, 9(32). Montaquila, J. and Godwin, C. (2016). Personnel security and open source intelligence: Employing social media analytics in pre-employment screening and selection. Journal of Information Privacy and Security, 12(3), pp.145-159. N Inukollu, V., Keshamon, D., Kang, T. and Inukollu, M. (2014). Factors Influncing Quality of Mobile Apps: Role of Mobile App Development Life Cycle. International Journal of Software Engineering Applications, 5(5), pp.15-34. Qi, M. and Edgar-Nevill, D. (2011). Social networking searching and privacy issues. Information Security Technical Report. Rosenblum, D. (2007). What Anyone Can Know: The Privacy Risks of Social Networking Sites. IEEE Security Privacy Magazine, 5(3), pp.40-49. Sabale, R. (2012). Comparative Study of Prototype Model For Software Engineering With System Development Life Cycle. IOSR Journal of Engineering, 02(07), pp.21-24. Schaupp, L. (2010). Web Site Success: Antecedents of Web Site Satisfaction and Re-use. Journal of Internet Commerce, 9(1), pp.42-64. Stubblefield, A., Rubin, A. and Wallach, D. (2005). Managing the Performance Impact of Web Security. Electronic Commerce Research, 5(1), pp.99-116. Vasileiadis, A. (2014). Security Concerns and Trust in the Adoption of M-Commerce. Social Technologies, 4(1), pp.179-191. Zhang, J. (2016). Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective. Decision Sciences.

No comments:

Post a Comment