What are security policies or


Electronic Commerce and Information Security and Ethics

Assignment Overview

The case for this module is in two parts: online presence for business and information policies.

Everyday sales items purchased online like soaps, juices, shampoos etc. have almost doubled between the year 2006 and 2010 and it is expected that these figures will keep doubling by 2014. Few years back, e-commerce was not expected to be what is now. It is clear that all businesses need to provide online services sooner or later to remain in the market. The same is true for mobile commerce.

In order to identify what businesses need to do to start their online presence, go over the background readings and any other elective readings you find useful.

When you have read the articles listed in the background material and any other relevant reading you could find, imagine that you want take advantage of the Internet and communication technologies for your business.

"Tools and strategies needed to follow in order to implement electronic and mobile commerce in businesses"

Case Part I

For part I, write a 4-5 page description of the steps businesses need to follow to create an online presence, the required skills and tools and the opportunities and challenges of electronic and mobile commerce.

Taking care of information falls to those who own the information to develop ethical guidelines about how to manage it. Treating sensitive corporate information as a valuable resource is good management. Building a corporate culture based on ethical principles that employees can understand and implement is responsible management. Organizations should develop written policies establishing employee guidelines, procedures, and organizational rules for information.

E-policies typically include: Ethical computer use policy, Information privacy policy, Acceptable use policy, email privacy policy, Internet use policy, and Anti-spam policy.

Case Part II

In this section, you are expected to read the required readings listed in the background material and at least one other elective reading.

When you complete the readings, write a 4-5 pages paper addressing the topic:

"Policies and procedures that organizations should implement to protect themselves"

In your paper, be sure to include:

•What are security policies or e-policies?

•Explain three security policies that you would primarily recommend to an organization to have and why?

•How security policies should be implemented in organizations?

 


Attachment:- New WinRAR archive.rar

Solution Preview :

Prepared by a verified Expert
HR Management: What are security policies or
Reference No:- TGS01117409

Now Priced at $60 (50% Discount)

Recommended (97%)

Rated (4.9/5)