stacyA ITM 301 Mod 4 case

Questions/Business/ManagementstacyA ITM 301 Mod 4 case
The case for this module is in two parts: online presence for business and information policies.
Case Part I
Everyday sales items purchased online like soaps, juices, shampoos etc. have almost doubled between the year 2006 and 2010 and it is expected that these figures will keep doubling by 2014. Few years back, e-commerce was not expected to be what is now. It is clear that all businesses need to provide online services sooner or later to remain in the market. The same is true for mobile commerce.
In order to identify what businesses need to do to start their online presence, go over the background readings and any other elective readings you find useful.
When you have read the articles listed in the background material and any other relevant reading you could find, imagine that you want take advantage of the Internet and communication technologies for your business.
“Tools and strategies needed to follow in order to implement electronic and mobile commerce in businesses”
Case Assignment
Case Part I
For part I, write a 4-5 page description of the steps businesses need to follow to create an online presence, the required skills and tools and the opportunities and challenges of electronic and mobile commerce.
Taking care of information falls to those who own the information to develop ethical guidelines about how to manage it. Treating sensitive corporate information as a valuable resource is good management. Building a corporate culture based on ethical principles that employees can understand and implement is responsible management. Organizations should develop written policies establishing employee guidelines, procedures, and organizational rules for information.
E-policies typically include: Ethical computer use policy, Information privacy policy, Acceptable use policy, email privacy policy, Internet use policy, and Anti-spam policy.
Case Part II
In this section, you are expected to read the required readings listed in the background material and at least one other elective reading.
When you complete the readings, write a 4-5 pages paper addressing the topic:
“Policies and procedures that organizations should implement to protect themselves”
In your paper, be sure to include: •What are security policies or e-policies? •Explain three security policies that you would primarily recommend to an organization to have and why? •How security policies should be implemented in organizations?
Assignment Expectations
Your assignments will be graded following these expectations:
The paper between part I and II should be 8-10 pages in length in one document submission. Other requirements to consider are as follows. •Precision: the questions asked are answered. •Clarity: Your answers are clear and show your good understanding of the topic. •Breadth and depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module. •Critical thinking: It is important to read the “required readings” posted in the background material plus others you find relevant. Your paper should include important concepts from these readings and incorporate YOUR reactions and examples that illustrate your reflective judgment and good understanding of the concepts. •Your paper is well written and the references are properly cited and listed (refer to the Student Guide to Writing a High-Quality Academic Paper). •Your paper meets the page requirements not counting the cover page or the references pages.

Join now or log in to start viewing answers.
Report DMCA

stacyAA+ 508 TUTOR Posted 806. Sold 811. Asked 1. Solution preview:

Attachments
ITM 301 – CASE – 4 .docx
STUDENT’S NAME
DATE
STEP * we should consider the tools required to set up an ******* ******** ****** ***** **** **** ******* ***** *** ******* ******** ****** **** ******** ******** ******** ******** ***** *** ******** ****** *** ***** ***** ** ******* ** ** ******* ******** ******** ** ******** ** ******* *** **** ******* ******* *** ******** ******* ******* * ******** ******* *** ** ** *** ** **** *** ******* ** addition, ** ** necessary ** *** * ******** **** ***** *** ****** ** *** **** ***** information, * *** analytics ******** ** ******** **** ***** ****** ** *** visitor’s ******** * **** ** *** ** ******** *** ******* ***** *** customizing *** ******** **** **** *** ******** *** **** **** ** * web-hosting **** * ****** **** registration *** ****** ******** *** **** ******** (Chaffey, *******
**** * *** ****** ****** ** implement electronic *** ****** ***** ** ******** ****** **** ** extensive knowledge ** *** ****** environment *** electronic *** ****** ***** ******** **** ** mercially ****** *** ****** **** * ***** understanding ** *** *** ****** *** ****** marketing priorities ******** *** ******* ******** **** ** **** ** ****** * **** *** ****** ******* * **** ****** ****** *** ******** **** **** ****** ******** ** ****** ** ** ****** environment
*** employees **** **** ******* ****** **** **** **** ****** technical ****** ** **** **** ****** ** implementing *** *** *** ***** *** ******* electronic *** ****** ***** businesses **** ******* ******* developing ****** ****** ******** ** publishing **** ** *** ****** ***** *** important *** **** businesses *** businesses **** **** *** *** ******** ****** *** ******** ****** **** ******* **** programming ****** Electronic *** ****** ***** businesses typically ******* ****** (Kalakota * Robinson, *******
**** *
****** *** ***** Environment Understand *** ******** ** *** ***** ****** ****** ***** *** ****** Applications
**** ******* ******* *** ****** ** **** ** *** * ****** ******* ** ***** *** *** *** ****** ******** ** ******* **** *** *** *** ****** ******* ***** *** *** environment ******* ***** ** *** ****** **** ***** *** ***** *** applications
**** **** ***** ** ******** **** ******** ***** ** ***** ** ** **** ** ***** *** ******* ****** according ** *** ***** ** *** ******** *** *** audience’s preferences *** convenience
*** ***** ** ****** ****** **** *** ***** ******* *** ** ** **** ** ******* * ******* **** ** ******* **** **** ** *** operating ******* ** **** ** **** *** **** friendlier **** ** **** ******* *** Apple’s *** *** *** **** shouldn’t ** *** ****** ****** ****** ** **** ** ****** ** ********
*** ****** ***** ****** ****** *** ******* ** *** internet-enabled ****** ****** *** ******** *** ***** ****** **** *** ****** ******* *** advantage ** ****** ***** ** **** ** ******* ** *** ******* ******* *** ****** **** *** **** connectivity ****** ** ******* *** facilities ****** ***** ** *** ******* *** **** ** ******** *** ****** *** ** *** ** carefully, **** *** ****** *** ******** ****** *** automatically ****** *** ******** *** ****** ******* ** **** interface
*** ****** applications ******* * device-specific ******** **** * marketplace, **** ** *** ***** *** ***** ** *** **** ***** **** ******* ****** ******* applications ******* ** ****** capabilities, **** ******* ******** ftionality **** ** GPS-enabled ******** services, scanning, *** *** ******* ** **** *** ******** *** ******* *** **** ******** applications **** ** ** ***** *** **** ****** platform, ** ** *** *** *** ******** ** *** build-outs ***** ** *** ****** ***** ** *** ******** *** *** ******* ****** ****** ******** * ******* *******
**** *
Prioritize ******* ***** ***** ******** ** ***** ******** *******
**** ******* ******** *** environments ** **** ** ******** ** **** ** ***** ** ***** ******* ** ****** ** ******* ** ** ***** ******* ** *** interested ** *** **** ******** ** *** ***** **** **** ** ** determine ***** platforms *** specified ****** ** ****** **** *** **** **** ** **** ******** *** **** **** **** *** behaviors ** *** ****** ******** landscape ** determine ***** ****** **** ***** *** ******** ****** **** *** ****** ***** ** ****** * ** ** ******** **** ** *** ****** ******* *** ******** ***** *** *** ****** ***** **** *** ******* engagement **** *** ****** ******* *** ******* ** *** **** ** *** ******* ** Microsoft ******** ******* ** ***** ** *** ***** *** *** Android-based ****** *** * ***** ******* ******** distantly ** ******** *** BlackBerry, *** ******* ****** OS–based ******* *** ****** ****** landscape ** fragmented *** ******** distributed ****** *** ** ***** *** ******** ***** ******* *** *** *** *** *** ******** **** ******* ** **** ******** ***** *** *** ***** ** ***** ******* *** capabilities ******* platform-specific **** engagement **** ****** ** *** *** customer’s *******
** ****** *** ******* ******** ***** ** ** ***** * **** ******* ** ******* ** *** ******** *** carefully ******* ***** *** *** *** ****** ****** ** ******** ** *** ****** **** *** ***** ** ** ***** *** * ****** ** device-specific applications, ****** *** ** *** ** *** ******** ******* ** ******** **** ****** ***** ***** ******** ** ****** *** *** *** ****** storefront *** * mobile-optimized *******
**** *
****** ******* ** *** ** Outsource Technology ******** Approaches *** ******** *** ********
Technology **** ***** ** *** ******** ** *** *** *** ****** initiative, *** ** *** ****** **** * ******* ** ******* ***** *** available ** ** ***** ***** **** ***** outsourced ** service-driven solutions *** **** developed technologies ***** *** ***** *** ******* ****** **** organizations ******** **** *** technology ******** ** ******* * ******** *** outsourced ******** ** **** ** ******* long-term ****** ** ** **** **** ** ** ** **** **** ******** *** ***** ******* investing ** * ****** infrastructure **** *** **** ** ***** ** ** **** ** ****** *** ****** *** ***** Available-to-hire ****** **** **** *** ** ****** ***** **** *** ******* ***** ** *** *** **** ******** ** organizations **** ******* providers *** following ***** ******** **** technology approaches ** developing * ****** strategy, describing *** **** *** **** ** **** *** **** framework ** determine *** **** ******** ** ******* *** ******* ***** *** ****** ******
****** * *** *** ****** ******** ********
****** * ******** ********
DESCRIPTION
****** * **** **** ******** ***** outsourced *** *** ****** solutions— including development *** ******* ** *** *** ****** ***** *** ** ******** *** **** ******* subscription *****
******** ******** **** **** *** *** ****** ***** *** ** ******** *** *** ***** *******
****** ** ******* ******** **** **** *** ******** **** Computers, ******* *** ******
****** * full-service ****** *** implementation **** **** ***** **** management *** ** *** ******** ** ******* ** *** * ***
***** *** *** *** *** ****** ***** *** applications ***** **** ******** expertise, typically ***** *** ******* ** technology *** ***** **** ***** *** currently ****
****
*** ****** capabilities *** ********
*** *** ** ****** maintained
*** Integration **** ******** infrastructure
*** ***** ******* **** ********
*** Integration **** ******** infrastructure
*** Typically, **** ** integration **** ******** **** infrastructure *** ******
*** ***** ***** ******** *** associated, **** ***** *** *******
*** *** *** ****** technology *** **** * **** ** ******* investment
*** Higher-cost engagements
*** ******** ** development ****** ******* ** *** *** ****** ********
*** Maintenance **** *** ***** significant
*** ******** ******** **** ***** ******* ****** **** ** ******
**** *
Determine **** Technology ** *** Repurpose ******** *** Technologies ** ******** ** ****** *** *** ***** *****
** **** ****** ** shouldn’t **** ** **** ***** investments ** *** technologies ** ******* ****** ** **** expansion ** ** **** * ******** ** **** **** ****** ** ******** *** **** technologies ******** platform, merchandising ****** **** ******** *** ******* information) ** *** ****** *******
******** *** *** ******** ** ** **** ****** ** **** ** ******** ** *** ******** technology **** *** ****** ******* ** ******** *** investments *** ******** management ** ** **** ** ** ******* *** ******** ******* ******* *** ****** ** *** ****** ******** ****** ** ***** ** ****** ***** ***** ** ***** ** ****** ***** *** *** **** ** incorporate *** ***** **** ** ****** *** ******* **** experience *** ****** storefront ****** ** ** ******** ******** *** ******* ** *** ******** ******** ***** ** *** ******* ******* *** ***** shouldn’t ** **** ** ******** ** *** ** *** *** ******* **** ****** *** *** ******* **** ** ** **** ** **** Integrating ***** ***** **** *** ****** ******** **** *** **** ******** *** ***** ** *** ******** technology investments *** **** ****** ******* consistency ** *** **** experience *** ******** ******* ****** *** ** *** ********
**** *
** **** *** *** technology **** ***** ** **** **** ***** ******** * effective ******* ******* ** *** ********
** ******** *** ****** *** *** *** ******** ******* ** * continuous ****** ** **** ** ***** *** development ** *** *** ****** ***** ******** **** *** ******** ******** *** **** ****** *** *** *** ****** build-out accordingly **** **** ******* selecting *** ***** technology ** ******* *** *** ***** *** ****** ***** ***** *** long-term ******** ** *** **** ** ** ***** ****** ****** incorporating confidence-building **** ******* ** investing ** * ******* ******** ******* **** ***** **** ******** **** ******* ******** **** ******** **** important ** *** strategy, ****** build-outs accordingly, *** ******* ***** ** *** *** customers *** interacting **** re-evaluating, *** ******* *** ******* ***** *******
CONCLUSION
** ****** petitive, ** **** **** ** **** * long-term *** *** **** **** **** * ****** ******** *** ******* ***** *** *** ******** ****** *** ******* ** *** *** ***** ***** ** ****** ******** **** *** ******** ** technology ******* **** *** ****** *** ***** ******** ** *** ****** audience, *** *** ****** ***** * ****** ****** ******** *** ******** ** **** ** ******** ** *** ******** technology ** *** ******** ******* ******** ******* *** ****** * consistent experience **** *** ******** *******
***** *
******** *** procedures **** organizations ****** implement ** ******* themselves **** Institution ******** *** procedures **** organizations ****** implement ** ******* themselves * ******* ******** environment ***** *** organizations ** ******* ***** ******* ******* ******* ***** **** facilitate * ****** **** ** information *** ******** ** correctly evaluating today’s ******** environment, information ****** *** * sheltered benchmark **** ****** ** *******
******* organizational ******** **** *** background ** *** organizations structures ******** ** corporate ******* ***** ***** ******** ***** *** ******* ** ******* ** information technology **** *** **** **** ******* ******** ***** Information ******** ******** **** * ******* **** ** *** ***** organization **** **** ** ******* ******* ** today’s ******** ******** ** *** ** ******* ** concerned, *** ******** ***** ******** *** ******** ** ** e-policies *** ***** ****** ** stakeholders ** *** development ** ***** ******** ****** ** overvalued, especially *** contribution ** petitors, suppliers *** employees
**** *** Securities ** E-policies *
******** ****** ***** ** ** **** ** ****** *** * ******* organization ** *** ***** ****** *** ** organization, ** ******* ** addresses *** constraints ** ******** ** *** ******* ** employees ** **** ** ***** constraints ******* ** oppositions ** mechanisms **** ** ****** ****** **** *** ***** *** **** ***** ******
Developing * corporate ******** ** * ******* **** **** ******** **** ******** electronic ****** establish ******** procedures; *** ******* ******** Internet, ******* *** ******** ***** ** ** **** *** ** *** **** **** ** ******** **** ******* *** ******* cyber-crises ****** **** ****** ******* *******
“Customers *** increasingly ***** ** *** **** ** ***** ***** ******** information *** ****** * **** ***** ** **** ******** ****** *** electronic transaction **** ******** **** ******* Hagen, a ******* ******* ** ****** ******* * ****** ******* ******** *** ******* ******** ****** *** ******* ****** organizations ** **** ***** ** ******** vulnerabilities, ******* ****** *** ******** ******* ******** ******* **** *** **** ****** **** ** ** ****** *** **** ***** **** **** trustworthy *** petitive”
***** ******** ******** **** *** ***** primarily ****** ** ** organization ** **** *** ****
***** ******** themselves ***** ***** problems, *** ** **** *** ******** ******* ****** ****** **** *** ******* ******* *** observed, ****** **** ****** *** ***** ****** ***** *** organizational ******* ****** ******* ** definition, ******** ****** ****** ** ****** prehensive *** **** organized ****** ****** *** practices **** ******** ****** ** ** organization’s ****** *** *** information ******** ** **** **** ****** ******** *** **** information *** ******** *** **** individual employees *** *** organization ** * ******* ** **** ****** ** * prominent statement ** *** ******* ***** ***** *** organization’s ******* ** ********
** *** therefore, incumbent **** *** administrators, *** *** ******* **** protecting *** institution’s **** interests, ** ****** **** ** appropriate *** effective ******** ****** ** developed *** *** **** ******** throughout *** organization (McLaughlin *******
**** ** ******* *** ***** different ***** ** ******** ******** **** ** organization **** **** *** ** **** ******** * ****** **** ***** *** ** **** ***** **** ******* ** **** *** **** ****** ******** ******** **** ****** ***** **** ** ******** ********
** ** ******** * ****** *** ******** ** *** ** department **** ** ****** *** ******* *** ******* ******** *** stability
** ******* ******** * **** ***** ******** ******** *** ** responsible *** *** ******** ***** **** ******** continuity ******** *** ********
******** ******** ****** ** implemented ** organizations ** * ****** ** **** ******* ***** ** procedures
**** *** ** **** Identifying *** ******* *** ******** *** **** ******** ****** ** confidential information
*** **** ******** ** ****** *** organizations ******* **** *** ** ******* ***** confidential information ** ** ***** categorizing ******** ***** ** ***** ****** *** confidentiality ** *** *** ** * ******** ***** ** *** ***** **** ** **** ** ******* ** **** **** confidential ****** ******** ******** ******* ******** ******** identification ******* ****** **** ******* *** ***** **** ** classified information *** **** ** *** ****** ***** **** **** ** ** definitely protected ******** unstructured information **** ** contracts ** ******** ** **** ** necessary **** **** ****** ** ****** *** ** ******** department
**** * ***** ******* information ***** *** ******* **** assessment ** *** *** **** *** ***** collected
**** essential ** understand ******* workflows, **** procedurally *** ** practice, ** *** *** confidential information ***** ****** ** organization Identifying *** ***** ******** processes **** ******* confidential information ** * straightforward exercise, *** determining *** **** ** ******* ******** * **** ******** examination Organizations **** ** *** themselves *** following questions ** **** ***** ******** *******
***** participants ***** ***** information *******
*** *** ***** ****** ******** modified, processed ** distributed ** ***** participants?
**** ** *** ***** ** *******
** ***** * *** ******* ****** policiesprocedures *** ****** behavior?
** analyzing information ***** **** ***** questions ** ***** ****** *** ******* ******** vulnerabilities ** ***** ******** ** sensitive information
Determine appropriate ******* ***** *** ******** *** Implement * monitoring *** enforcement ******
***** ** *** **** assessment, ** organization *** ******* ***** distribution ******** *** ******* ***** ** confidential information ***** ******** ****** ******* *** *** ******* *** ** ******* ***** **** ** ******* *** ***** ** **** ** ******* enforcement ******* *** violations ** ***** ********
******* **** ***** ** distribution ******** *** ********
******** Information
Executive Communications
Intellectual ********
******** *******
**** ***** distribution ******** *** ******** **** essential ** implement monitoring *** enforcement ****** ***** munication ***** *** ******* ** ******* *** ******* ****** adherence ** ******* ** *** protection ** confidential information ****** ******* ****** **** ** established ** ******* information ***** *** ******** verifying ******* **** distribution ******** *** performing enforcement ******* *** violation ** ***** ******** **** ******* ******** checkpoints, monitoring ******* **** ** **** ** accurately ******** ******* *** ******* **** **** ******* ***** ******* ******
*** ** *** ******* ****** ** ******* information ** ****** organizational workflows, ***** monitoring ******* ****** **** ******** identification abilities ** ***** ***** ****** *** **** *** ******* ** **** unauthorized ******* * ******* ** ******** ******** *** ******* *** ***** ** ******* electronic munication ******** *** sensitive information
Conclusion
Protecting confidential information ****** throughout ** enterprise ** * ******* ****** **** * ******** ***** ** fundamentally ******** * systematic *** ** ******** sensitive ***** understand ******* ******** processes; ***** appropriate ******* ***** *** distribution policies; *** ******* ******** *** ******** munications Ultimately, **** ** **** important ** understand *** *** potential ***** *** ramifications ** *** establishing * ****** ** ****** nonpublic information **** *** ****** ** *** *******
REFERENCES
Kalakota, ** * Robinson, * ****** E-business ** ******* *** ******* Addison-Wesley Professional
******** ** * ******* * ****** Strategies *** e-business ******** ***** ******* electronic *** ****** ***** ******** *** ***** ******* Education
******* * ** * Kauffman, * * ****** Reintermediation strategies ** business-to-business electronic ***** International ******* ** Electronic Commerce, ****
******* * ****** **** ** ***** security? ******** * ******** ***** ***** *****
McLaughlin, * * ****** ******** **** experience ******* **** ****** implementation Educational evaluation *** ****** analysis, ***** *******
****** * ** * Palenchar, * * ****** Strategic ****** management Organizations *** ****** ****** challenges **** PublicationsPrice: $70.00

  • We offer what we promise and unlike others our support staffs are online 24/7. We guarantee money back if you do not get value for your Money.
  • The calculator below shall help you compute your pay for this assignment or any other assignment.
  • WE OFFER 6 HRS URGENT ORDERS AS WELL

Use DISCOUNT CODE DISC15 to enjoy 15% Discount on all orders while at the order page.
Do you need any clarifications ?????????
Contact our support staff ONLINE NOW via the CHAT.

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: