Friday, November 16, 2012

TECHNOLOGY ASSESSMENT - Combining Sales & Websites

The electronic sales of inquiry over the World Wide Web has many applications for FYI. For example, they leave behind be fitting to advertise to a much wider consultation with less represent and outside assistance (i.e., advertising executives, ad placement professionals, etc.). It back end also be applied in the exaltation department. The work laughingstock now be electronically faxed or e-mailed as an attachment for a minimal cost as opposed to the conventional method of making a hard-copy of the document and past mailing it to the client. The hiring and payroll processing can also occur electronically. Technical research writers can be sought over the Web and then sent their commercial enterprise orders via e-mail or fax electronically. Once they are through with(p) processing the work, they can return it via the same methods. If materials are required that are not able to be sent electronically, then these may be shipped via one of the more traditional shipping routes such as UPS or FedEx. However, these services are able to be utilized electronically, to the point of tracking shipments up to the final examination moment. Many other applications exist for this technology, the least of which is not the occurrence that customers can order directly from the company via e-mail and electronic payment.

The cost benefits far outweigh the cost commitments of utilize this fresh technology. For


Garceau, L. "Computers & Technology: The Threat of sociable Engineering." The Ohio CPA Journal. Feb. 01, 1997: 1-4.

Defreitas, M. "E-Commerce Relatively Safe." Computerworld. Jan. 13, 1997: 34.

Editor. "Making Purchases on the Internet is comme il faut Safer." National Public Radio. Nov. 19, 1995: 1-4.

Credit card fraud is oftentimes thought to be a problem, but the literature proves utilise a credit card on a good Web page is more safe than most traditional methods of using them. There are various programs and strategies companies use to embarrass credit card theft. As reported by Defreitas (1997: 34), " force out up! Secure Internet transactions are already working.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
Credit-card entries are encrypted and immediately verified by secure connections to merchant banks. It all happens faster than you can swipe plastic at the checkout. Some vendors on the Wed continue to offer pay digital money. They are equivalent to gift certificates and offer consumers no protection. They are also obsolete."

There are many strengths and advantages from using this technology as already discussed. However, at that place are ternion areas where potential weaknesses exist: hackers; credit-card fraud; e-mail processing. Where hackers are concerned, they humble to use social engineering to be able to single out into your computer system, at least to cause havoc with your system, at worst to steal information or more if they can access it, "social engineering is using social interactions to observe information that will enable a system have on in. Most of this information is from public sources, such as your avocation card, or can be obtained by conning unwitting employees," (Garceau, 1997: 1). However, there are many common sense, low-costs steps to avoid hackers. A security awareness program may be instituted to commit employees aware of hacker's methods.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.

No comments:

Post a Comment