Electronic Commerce and the Social Enterprise Essay

Exclusively available on IvyPanda Available only on IvyPanda
Updated: Feb 17th, 2024

Amount sold by each salesperson

The table presented below shows the sales for each sales person.

We will write a custom essay on your topic a custom Essay on Electronic Commerce and the Social Enterprise
808 writers online

The sales for each sales person

The pivot table presented above shows a summary of the total amount that is sold by each salesperson. The total sales were: $2,650 for Albertson, Kathy, $3,700 for Brennan, Michael, $1,935 for Davis William, and $400 for Dumlao Richard. The total sales amounted to $8,685. The table presented below shows the total monthly sales.

The total monthly sales

The results show that the total sales for the month January amounted to $5,175, $2,160 for February, and $1,350 for March.

Security measures

The first security measure that is available for protecting the customer is the encryption of the online store. For an electronic commerce website to be secure, it should provide safe transactions using various tools such as secure electronic transaction protocol (SET), secure sockets layer (SSL), or other types of encryptions (Rich 135). These encryption forms should accept and process the personal data of the clients without the data being breached or unintentionally made available to the public and other forms of security threats. Therefore, the technology of encryption helps in protecting the personal information of the consumers, especially during the checkout process (Becker 161).

One significant advantage of this measure is that it helps the customers to protect sensitive information. Also, the customers have a better idea of the persons or companies they are trusting with their personal data. A significant drawback of this measure is that communication with SSL encryption is relatively slow. This is based on the fact that there is a two-way communication that slows down the network and reduces the speed of response of the runtime server (Sadeghi 157).

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

The second security measure is two-step authentication. In this case, two bits of information are needed for every attempt of login. In most cases, websites require the use of an account password and a single-use verification code that is received through SMS or other recommended applications. Another example of the extra layer of security is the use of fingerprints in addition to passwords.

An advantage of this measure is that it provides a higher level of security. A disadvantage is that it does not work with a number of applications. Besides, the process of two-step authentication is quite long and cumbersome because customers are compelled to fill in security information twice. From the company’s point of view, this measure is expensive to implement.

The third measure is the use of a password manager. In most cases, customers often reuse passwords, or they use simple passwords because they are easy to remember (Parsons 71). However, when the security of the customer and the entire business is at stake, the use of simple or reused passwords may not help. Therefore, password managers work by creating strong passwords. Besides, they store the created passwords in an encrypted vault that has a single master password. This enables the customers to easily access their details (Rezaul 429).

An advantage of this security measure is that it ensures that customers have passwords that cannot be cracked easily. Besides, they will have a unique password for every website that they visit. Also, all their passwords will be managed easily. This eliminates the risks that are associated with the use of simple passwords. One drawback of the password manager is that they do not work on all websites. Therefore, customers may be compelled to create simple passwords for such websites (Mjolsnes 135).

Works Cited

Becker, Ann. Electronic Commerce: Concepts, Methodologies, Tools, and Application, New York: IGA Global, 2007. Print.

Mjolsnes, Stig. Technology and Practice of Passwords: International Conference on Passwords, PASSWORDS’14 Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, Germany: Springer, 2015. Print.

Parsons, June. New Perspective Computer Concepts 2016 Enhanced, Comprehensive, Boston: Cengage Learning, 2016. Print.

Remember! This is just a sample
You can get your custom paper by one of our expert writers

Rezaul, Karim. Strategic and Pragmatic E-Business: Implications for Future Business Practices, New York: IGI Global, 2012. Print.

Rich, Jason. Design and Launch an E-Commerce Business in a Week, US: Entrepreneur Press, 2008. Print.

Sadeghi, Ahmad-Reza. Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, 2013, Revised Selected Papers, Germany: Springer, 2013. Print.

Print
Need an custom research paper on Electronic Commerce and the Social Enterprise written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2024, February 17). Electronic Commerce and the Social Enterprise. https://ivypanda.com/essays/electronic-commerce-and-the-social-enterprise/

Work Cited

"Electronic Commerce and the Social Enterprise." IvyPanda, 17 Feb. 2024, ivypanda.com/essays/electronic-commerce-and-the-social-enterprise/.

References

IvyPanda. (2024) 'Electronic Commerce and the Social Enterprise'. 17 February.

References

IvyPanda. 2024. "Electronic Commerce and the Social Enterprise." February 17, 2024. https://ivypanda.com/essays/electronic-commerce-and-the-social-enterprise/.

1. IvyPanda. "Electronic Commerce and the Social Enterprise." February 17, 2024. https://ivypanda.com/essays/electronic-commerce-and-the-social-enterprise/.


Bibliography


IvyPanda. "Electronic Commerce and the Social Enterprise." February 17, 2024. https://ivypanda.com/essays/electronic-commerce-and-the-social-enterprise/.

Powered by CiteTotal, easy reference maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1