Skip to main content

Home/ ITGS News/ Group items tagged e-commerce

Rss Feed Group items tagged

Elisavet M

Tomorrow's Technology and You - 0 views

  •  
    The website enables the reader to look over an extensive amount of the significant content found in chapter 13, E-commerce within the textbook, Tomorrow's Technology and You.
Santiago P.

Dani's House of Pizza Home - 0 views

  •  
    This website shares similarities with Carmen's business. Dani's House of Pizza is a small neighborhood business that wishes to optimize commerce by minimizing loss and maximizing profit. Just like Carmen wants to do, Dani's Pizzeria has established a website that is not that attractive to customers. It is trying to attract a wider customer base, but it needs to get organized. As it is now, the website gives the audience some basic information on the menu, the prices, the location, history, reviews, contact information, and special events. I believe it could use a database to keep track of business goods, stock, customer information, and to keep a useful inventory that would help maximize profit in the business. Even better would be for the business to begin to sell through e-commerce - or sell pizzas online by having customers order it online, just like Dominos currently does. This would definitely boost sales and increase revenue.
Mark Gakin

Portofinos - 1 views

  •  
    This website would be very similar to one Carmen would have because it is also a small business that is trying to grow. Carmen is trying to create a website that will attract many customers, but it is important for her to get organized. This seems to be a well organized website that appears to be attractive to customers. I have some first hand knowledge on this because i have been to Portofinos many times and it is usually packed. Clearly their advertisement has an impact on their business, and this is something Carmen needs to improve on. This site is very neat and includes a variety of information such as their menu, events, history and more. It pretty clear that e-commerce has had a big impact on business and will hold a greater importance in the near future. I learned that since Carmen wishes to optimize commerce by minimizing loss and maximizing profit, she should follow a good example, such as this one. If all goes well, she may be looking at a brighter future.
Jackie C

Photo Editing Service | Photo Retouching Services | Edit Photos Online - 2 views

  •  
    Like in the situation given in our case study, this business offers a variety of services, but these focus mainly on photo retouching and editing. The site's design incorporates several elements which our own "client" business in the Case Study must deal with -- namely making site services and prices known to browsing users, and having customer help or an FAQ page on the website. In this site's case, the tour is also helpful for serving as a guide for new members, the role of which in the case study can be replaced by an about page or a help page instead.
T Graham

Credit Cards At Risk from High-Tech Pickpockets? - CBS News - 2 views

  •  
    In this article Walt Augustinowicz has shown and proved many people in the public how they can be pick pocketed with out a single finger being laid upon them. They can have their credit cards, debit cards, and passports information stolen quite easily with a simply passing by of the scanner. With this advanced technology that makes paying for things easier, also makes it easier for others to pay for their things using the same card. The card number, the expiration date, the type of card, and even the person's name can be found out. This can show how the social/ethical issue involved is thus privacy - security is another possible issue. The IT system is the RFID tags/microchips. The stakeholders are the people whose information is getting stolen and the people who are stealing the information - people who make the RFID tags/microchips are also possible stakeholders. The area of impact is politics and government - but also can be business and employment. People's private information is at stake and electronic pickpockets can easily steal the information and order products.
  •  
    This article talks about the security concerns related to RFID technology. RFID technology is susceptible to theft because it broadcasts radio frequencies about the information embedded in the card. This makes it very easy for thieves in possession of a card reader. A person with intent to steal information could just walk past a card carrier with a card reader and pick up the theft victim's credit card numbers, expiration dates and sometimes even the card owner's name. 20% of the card information that was stolen in an experiment has RFID chips. RFID technology increases the chance of identity theft, even passports have RFID implemented in them, this makes them very vulnerable. Passports carry very sensitive information and anyone with a RFID card scanner could wake pass a passport carrier and gain his or her personal information. The stakeholders in this issue include the card carrier or passport carrier whose security is endangered, the information thief who is gaining unauthorized access to a person's personal information and the businesses such as Visa or MasterCard whose reliability is being endangered. This is a security issue that has hampered the positive buzz surrounding RFID technology and its convenience.
Jackie C

RFID tags: Big Brother in small packages - 1 views

  •  
    A relatively old news article, that details concerns and issues about RFID tags that remain relevant, or have become more relevant over time. The article clearly defines law enforcement agents, criminals, marketing corporations, and the average consumer as stakeholders in the development and widespread use of RFID tags. The article describes the issue of privacy and unauthorized or undetected monitoring, whether for illegal use or law enforcement or for marketing schemes as rising from the continued functionality of RFID tags after they have served their purpose -- outside of the stores and past the RFID scanners. The article mentions several concerns, including the more widespread adoption of long-range RFID scanners by non-commercial groups or people, and their ability to be used as an invasion of privacy. Evidently, the technology that makes the continued functionality of RFID tags a privacy issue is in the way that each tag, which can be as small as a few centimeters long, can store various bits of data, such as when the item was bought, where the item was bought, for what price, and who bought it, in combination with the ability to use long-range RFID scanners to scan and detect this information outside of a store.
Elisavet M

Data Security Laws Seem Likely, So Consumers and Businesses Vie to Shape Them - 0 views

  •  
    During 2005, political organizations advocated for strict laws implementing data security enforcement, as rising concerns stemmed out of alarming statistical studies and research, revealing identity theft, credit card frauds and hacking as emerging and terrorizing practices overtaking much of the internet realm. This article introduces the beginning of the rise in public awareness, as technology strongly began to redirect the business world into another more digital phase. It was during that year, the primary stakeholders, also known as the businesses ( participants of e-commerce that stored, verified and utilized private consumer data), vocalized their needs clarifying their desire for the creation of constraints in regards to the consequences or negative implications of passing certain bills (for data security). The past exemplifies the various influences the introduction of data security measures, passed by the government legislatures, had upon newly initiated businesses; among the most significant implications discussed were: the need to build a secure database for reliable storage of clientele digital data with the utilization of particular software as well as improving business organizational structure in order to maximize the rate of security notifications towards consumers based on a foundation of rigid security standards. Far from the adaptation to such implications, the political crisis of establishing solid ground for a new set of security data policies and standards became an overwhelming process for politicians, congress members in conjunction with consumer and data privacy groups that rivaled in attaining the responsibilities of passing the needed laws. The politicians (stakeholders, holding the role of administering governmental legislation to stabilize data security breaches), came into opposition with the concerns of many members of advocacy groups (stakeholders, holding the responsibility of supervising and publicly navigating the direction of th
  •  
    continuation: the adjusted standards enforced by politicians). The problem of adhering to the instruction of newly created laws motioning businesses to appoint data security officers, draft policies, to comply with policies and procedures involving giving access to files in business databases for the Federal Trade Commission to check comes into collision with what most online businesses want to go through the process of doing. However, with the issue of security surfacing future consumer problems, as security breaches become major forces threatening the safe entering of digitally encrypted information (such as credit card codes), many companies become increasingly aware of the needed adherence to the strict security data laws, in order to continue profiting financially in order to keep the rate of consumer trust and payment increasing.
1 - 7 of 7
Showing 20 items per page