Limited Time OfferFLAT 20% off & $20 bonus sign up. Order Now
New! Hire Essay Assignment Writer Online and Get Flat 20% Discount!!Order Now
Provides excellent discussion of the selected business strategy for the relevant online business – based on a realistic assumption of the competition, product/ services offered, value proposition, distinct processes applied and level of personalisation/ customisation offered.
Clearly discusses the selected business strategy for the relevant online business – based on a realistic assumption of the competition, product/ services offered, value proposition, distinct processes applied and level of personalisation/ customisation offered.
Provides excellent discussion of four components of the e-commerce business model for your online business: value proposition, revenue model, competitive advantage and organisational development.
The paper reflects on “Risco Cleaning Services” that helps in offering extraordinary services of cleaning to the customers with the help of appropriate professionals. The assignment mainly focuses on the implementation of e-commerce in order enhance the efficiency of the website by incorporating various features within it. The E-commerce website that is created for Risco cleaning helps in providing number of facilities to the organization. The organization wants to incorporate various types of features including log in facility, registration facility for new users and more. The website must also be incorporated with various social sites like Facebook in order to increase the profitability of the organization.
In this assignment, SDLC approach is utilized by the organization for implementing the construction plan for the e-commerce presence. The SDLC approach has five steps which include system analysis, system design, building the system testing as well as maintaining the system that are useful in developing the website. It is identified that the organization also wants to implement mobile web services for providing effective as well as easily accessible services. The organization needs to consider several steps that include responsive design, single layout, vertical hierarchy as well as tappable feature for enhancing the usability of the customers. It is analysed that the organization faces number of issues due to the use of e-commerce website in spite of its advantages. The main issue that is faced by the organization is the security issue that must be managed appropriately in order to reduce the security as well as privacy related challenges.
System development life cycle is defined as a methodology that helps in understanding the objectives of an information system for designing proper as well as effective information system. The SDLC approach is utilized for constructing implementation plan for the e-commerce presence for various online businesses (Pereira and Teixeira 2017). It is identified that SDLC for an e-commerce site mainly includes five steps that include Systems analysis, systems design, building the system, testing the system and continuing maintenance of the system. The steps are discussed below:
System analysis: In this step the system or the e-commerce website that is implemented must be analysed properly. The website of the Risco cleaning services that is implemented earlier is analysed in order to gain proper knowledge as well as information about the various features that re provided by the website (Qiqieh et al. 2017). This step also prepares the needs that are required to be incorporate in the website for making is much more advantageous. Thus requirement if the website which is required to be incorporated must be analyzed.
System Design: The system is designed in this step that includes incorporation of various steps into the website. The website is designed appropriately and the features that are requires to be added into the website must be analyzed properly. Therefore proper system design documentation is made.
Building the system: The system or the website must be built as per the needs as well as requirements that are analyzed in the system analysis steps (Qiqieh et al. 2017). The document that helps in providing information about the design of the website must be used and the entire website is built as per the design that is provided.
Test the system: The system must be tested appropriately in order to determine that the features that are incorporated within the website are advantageous (Pandey and Banerjee 2015). Testing is also needed to verify that the implemented or designed system is working appropriately to meet the various needs as well as requirements of the customers.
Maintenance of the system: Proper maintenance must be provided to the system. This is important for appropriate functioning of the designed system. The system must be monitored regularly as per the analyzed problem, it must be maintained.
Mobile web services are considered as one of the prior need for every business organization.It is not only advantageous for the customers but the organizations also achieve success in the competitive market due to the presence of Mobile services (Amrutkar et al. 2015). The factors of the mobile platform that is required to be considered during the designing of the mobile web services include the following:
Define the necessity of the mobile site: This step is considered as the most important step that is required to be considered during designing of the mobile web services. The requirement as well as need that lead to the development of mobile web services must be clear. It is identified that Risco cleaning services is an organization that helps in providing extraordinary cleaning services to its customers. The customers generally book their requirement with the help of the website (Freixa, Ribas and Codina 2015). However due to the growing demand smart phones, the organization wants to provide its customers an option so that they can also utilize their Smartphone for booking. The requirement of mobile web services is generally to offer convenient as well as appropriate services to the customers by meeting their various needs as well as requirements which further helps the organization to achieve proper competitive advantage in the market.
Consider business objectives: The next step that must be considered is the objective of the Risco cleaning services. It is identified that the main objective of the Risco cleaning services s to provide proper as well as effective services to the customers so that the customers can book for their cleaning needs even by utilizing their smart phones, which assists them to achieve proper competitive advantage in the market.
Practice responsive web design: it is very much important to design the mobile web services in a very much responsive way. This is because those numbers of mobile phones are coming in the market with different screen resolution, supported technologies as well as user base (Mutchler et al. 2015).Therefore it is very much important to use the technologies like CSS3, web fonts as well as HTML.
Simple designing: The design of the mobile web services must be designed simply so that the users can easily utilize them and does not face any time of difficulty in managing them. The various options must be viewable so that the customers can find various options very much easily.
Single column layout: During the design of the mobile web services, it is quite important to consider that a simple structure works best. It not only works best but also helps in managing the limited space on the smaller screen of the smartphone (Fruehauf et al. 2017). It also helps in easily scaling various device resolutions as well as flipping between both the landscape as well as portrait mode. .
Vertical Hierarchy: It is identified that in the mobile site, the most important way to organize the information in a simple as well as digestible way so that it can be able to set proper as well as collapsible navigation.
Move from clickable to tappable: While designing the mobile web services the most important need is move from various clickable elements that are required in the desktop to tappable elements. This is because mobile phones are generally used by the users by utilizing their thump. Therefore, this factor is one of the appropriate factors that must be considered.
Providing interaction feedback: It must be analyzed that the mobile web services that is designed helps in providing proper feedback for any type of actions that mainly occur on the front end of the mobile site. This is quite important to test the usability the mobile site. In this step, the various actions that are required to be performed by the users must be tested so that the customers do not require facing any type of problem while operating the mobile site (Want Schilit and Jenson 2015). The features that needs to be tested is time taken for providing response, navigation feature, time taken for booking, appropriate opening of various links and more. If all the features are working properly then it will be helpful in reflecting that the web application will provide appropriate feedback to the needs as well as requirements of the customer.
Testing mobile Website: The last and the most important step that must be considered is the testing of the website by installing the developer SDK for the platform as well as various web dependent emulators for viewing different type of other mobile platforms.
The e-commerce environment faces number of threats for both the consumers as well as business owners. Therefore the online business have achieves improvement to its entire e-commerce security. The steps that are undertaken for providing e-commerce security include:
Employee an address as well as card verification system: Address verification system must be enabled within the organization that requires roper card verification value for various types of transactions including credit card that helps in reducing fraudulent charges. This helps in minimizing the chances of data hacking.
Using strong passwords: It is quite necessary to utilize proper as well as strong passwords so that another individual does not access the confidential information of both the organization as well as customers. Strong passwords help in minimizing the chances of hacking of important data as well as information (Koser 2014). If appropriate password is not utilized then the information related with the customers or the organization is accessed by a third party and can be misused. This can create number off challenges for both the organization as well as customers. Therefore using appropriate as well as secure passwords is considered as one of the prior step in minimizing security as well as privacy related issues.
Setting up proper alerts for different types of suspicious activities: It is identified that further organization generally set alerts for various types of suspicious transactions that generally come through same IP addresses. Setting up appropriate alerts in credit cards, mobile phones, billing is important (Rushton and Youde 2014). This also helps in minimizing the security as well as privacy related issue that occurs due to hacking of important data as well as information of both the customers as well as organization. Therefore it is considered that setting up of alerts system within the organization is considered as oe of the important step in managing security related risks.
Layering security: It is very much important to keep the entire business of the organization safe from various cybercriminals. Firewalls must be utilized which helps in stopping various types of attackers to access the information. It acts as an obstruction in network breaching as well as in offering access to various types of confidential information. Extra layer security must also be provided that include search queries, login boxes as well as contact forms. This helps in ensuring that the environment of the e-commerce is protected from various applications like SQL injections as well as cross site scripting.
Providing training to the employees: Appropriate training must be provided to the employees of the organization so that they can handle any type of security breach that occur within the organization effectively (Arafat, Alam and Ahmed 2014). If the employees are provided effective training then the chances of security breaches reduces as the employees will take appropriate actions that helps in reducing the attackers to access confidential information that so related both to the organization as well as customers.
Monitor the site regularly: The site must be monitored regularly as monitoring site regularly helps in detecting various types of fraudulent as well as suspicious activities. It is identified that appropriate monitoring of the site helps in minimizing the chances of data breach within the organization (Almorsy, Grundy and Muller 2016).If suspicious activities are detected then the organization can take proper step that will be helpful in resolving the issues related with hacking of information as well as data.
Perform PCI scans: It is quite important to perform PCI scans regularly through different services as it helps in reducing the risks that your e-commerce platform is mainly vulnerable to hacking (Schneier 2013). If you are third party proper software must be utilized that helps in controlling the issues that are related with hacking as well as misusing important data as well as information of both the organization as well as customers.
DDos protection:DDos protection must be provided in order to mitigate the chances of data as well as information hacking. It not only provides security but also helps in minimizing the chances of data hacking. It helps in providing proper transactional capacity for handling proactive mitigation and it also helps in eliminating the requirement of significant investments in various equipments.
The various types of risks that can face by the customers due to sharing personal information on the social site include:
Hack of personal information: Due to sharing of appropriate information on various social site number of problems can occurs. One of the most important problems is hacking of personal information of the customers. This can create number of problem for the customers. Personal details include name, address, phone number as well as email-id can be hacked will can cause identity theft. The hackers due to which the live of customers can be in danger (Alangar and Swaminathan 2013) can misuse important or confidential information related with the customers. Therefore, it is very much important to take some significant steps that helps in minimizing the chances of hacking and helps in providing appropriate security to the customers in context to confidential information.
Misusing of financial details: The various types of details include credit card detail as well as debit card detail can be hacked due information sharing on the social site. It can create number of financial issues for the customers if once their financial related data are hacked. Therefore appropriate privacy is very much needed to secure the important data as well as information of the users. Hacking of financial data must be avoided as it can create huge challenges before the customers.
Phishing scams: The hackers can utilize the phishing scams trick for hacking personal data of the customers. Once the file of malicious mode is installed in the Facebook of an user then it would easily help in extracting personal information of the users include name, age, phone number address, location and more. Hacking of personal data with the help of malicious code must be avoided, as it can create number of challenges before the customers (Hesse et al. 2014). Appropriate methods require to be used to minimize these types of issues as well as challenges.
The steps that are taken by the organization to minimize the issues that occur due to sharing of personal information on social sites are as follows:
Social media training to employees: Proper social media training must be provided to the organization so that they can handle any type of problem that is associated with security issues (Soofi et al. 2014). The employee helps in providing appropriate steps so that problem associated with security risk does not occur.
Limiting access to social media: Access to social media, must be reduced so that the customers does not face any type of problem that is associated with it. This also helps in securing confidential data as well as information of the users.
Invest in secure technology: Appropriate technology must be utilized that helps in providing proper security to both the information as well as data that are present on the social site (Kao et al. 2014). This not only helps inn providing proper security to the information of the users but also helps in minimizing the chances of data hacking.
Monitoring social media channels: The social media channels on which important information as well as data are shared must be monitored properly Monitoring helps in detecting suspicious as well as fraudulent activities on the social media. This helps in minimizing the rate of data hacking.
It can be concluded that Risco cleaning services utilizes SDLC approach for implementing various types of plans that is helpful for the e-commerce environment of the organization,. The organization incorporates several features in order to develop the website and for providing appropriate usability to its users. It is identified that the organization uses mobile web services for providing effective as well as easily accessible services. The organization needs to consider several steps that include responsive design, single layout, vertical hierarchy as well as tappable feature for enhancing the usability of the customers. The use of e-commerce website creates number of challenges for the organization. The most important challenges are security related issues. It is identified that number of security related issues occurs which must be handled properly for avoiding hacking of important data as well as information. Use of social media also creates problem for the users which must be managed appropriately. This helps in minimizing the risks that occur due to hacking of important data as well as information.
Several recommendations are provided for the organization:
Employees must be trained: The employees of the organization must be trained appropriately so that they can handle any security related issue properly. The employee helps in providing appropriate steps so that problem associated with security risk does not occur.
Managethe information of the users properly: The information of the users must be managed properly by the organization so that it cannot be hacked by cybercriminals. Appropriate management helps in avoiding hacking off important data as ell as information.
Invest in proper secure technology: Proper investment must be made by the organization in the secure technologies as they can be helpful in securing various types of important data as well as information that is related with the customers. This also helps in providing appropriate security to the data of both the organization as well as customers.
Hesse, T.M., Gärtner, S., Roehm, T., Paech, B., Schneider, K. and Bruegge, B., 2014, August. Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring. In Evolving Security and Privacy Requirements Engineering (ESPRE), 2014 IEEE 1st Workshop on (pp. 1-6). IEEE.
Alangar, V. and Swaminathan, A., 2013. Ipv6 security: Issue of anonymity. International Journal Of Engineering And Computer Science, 2, p.7.
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Amrutkar, C., Traynor, P. and Van Oorschot, P.C., 2015. An empirical evaluation of security indicators in mobile Web browsers. IEEE Transactions on Mobile Computing, 14(5), pp.889-903.
Arafat, M.Y., Alam, M.M. and Ahmed, F., 2014. Study on Security issue in open source SIP server. Modern Applied Science, 8(2), p.124.
Freixa, P., Ribas, J.I. and Codina, L., 2015. Comparative analysis of mobile web applications for the main international news agencies: state of the art and preliminary results. Active Audiences and Journalism. Analysis Of The Quality And Regulation Of The User Generated Contents, pp.143-162.
Fruehauf, H., Knobloch, N., Knobloch, S., Semela, D., and Vavricka, S. R., 2017. FRI-221-The “HCV Advisor” App–A web-based mobile application to identify suitable treatments with direct antiviral agents for chronic hepatitis C infection. Journal of Hepatology, 66(1), S507.
Gemenne, F., Barnett, J., Adger, W.N. and Dabelko, G.D., 2014. Climate and security: evidence, emerging risks, and a new agenda. Climatic Change, 123(1), pp.1-9.
Kao, K.F., Chen, W.C., Chang, J.C. and Te Chu, H., 2014, June. An accurate fake access point detection method based on deviation of beacon time interval. In Software Security and Reliability-Companion (SERE-C), 2014 IEEE Eighth International Conference on (pp. 1-2). IEEE.
Koser, K., 2014. When is migration a security issue?.
Mohankumar, M. and Anand, M.K., 2015. A Green IT Star Model Approach for Software Development Life Cycle. International Journal of Advanced Technology in Engineering and Science, 3(1), pp.548-559.
Mutchler, P., Doupé, A., Mitchell, J., Kruegel, C. and Vigna, G., 2015. A large-scale study of mobile web app security. Mobile Security Techologies.
Pandey, A. and Banerjee, S., 2015. Search based software testing: An emerging approach for automating the software testing phase of SDLC. Proc. ICRCWIP.
Pereira, J. and Teixeira, L., 2017. Contribution of Lean Principles in the Information Systems Development: An Experience Based on a Practical Case. In Engineering Systems and Networks (pp. 117-125). Springer, Cham.
Qiqieh, I., Shafik, R., Tarawneh, G., Sokolov, D. and Yakovlev, A., 2017. Energy-Efficient Approximate Multiplier Design using Bit Significance-Driven Logic Compression.
Rushton, S. and Youde, J., 2014. Routledge handbook of global health security. Routledge.
Schneier, B., 2013. Carry on: Sound advice from Schneier on security. John Wiley & Sons.
Soofi, A.A., Khan, M.I., Talib, R. and Sarwar, U., 2014. Security Issues in SaaS Delivery Model of Cloud Computing. International journal of computer science and mobile computing, 3(3), pp.15-21.
Trombetta, M.J., 2014. Linking climate-induced migration and security within the EU: insights from the securitization debate. Critical Studies on Security, 2(2), pp.131-147.
Want, R., Schilit, B. N., and Jenson, S., 2015. Enabling the internet of things. Computer, 48(1), 28-35.
Wohlfeld, M., 2014. Is Migration a Security Issue?. Migration in the Mediterranean: Human rights, security and development perspectives, pp.61-77.
No matter how close the deadline is, you will find quick solutions for your urgent assignments.
All assessments are written by experts based on research and credible sources. It also quality-approved by editors and proofreaders.
Our team consists of writers and PhD scholars with profound knowledge in their subject of study and deliver A+ quality solution.
We offer academic help services for a wide array of subjects.
We care about our students and guarantee the best price in the market to help them avail top academic services that fit any budget.
15,000+ happy customers and counting!