The small brick-and-mortar business

  Imagine that you work for the small brick-and-mortar business described in the Final Project Case Scenario. The owner of your business wants to focus on generating new revenue through e-commerce, but she knows that this change in operations requires the company to integrate new technology. To gain an understanding of what the business might need for technology, she has asked you to create a business systems analysis. In this analysis, you will clearly introduce the problem that your business is facing. Then, you will determine the business requirements for solving that problem, including the requirements that any new technology needs to meet. Next, you will explain how your competitors are using the two technologies in which you are investing, to determine whether those technologies are appropriate for your business. Finally, you will propose your recommendations for the technology solution that best meets the needs of your business, including what your business owner must consider in regard to security and privacy of company data. Select two of the following technologies to focus on in your business systems analysis paper: • Wireless, mobile computing, and mobile commerce • Cloud computing I. Introduction: In this section, you will briefly introduce the small business from the case scenario and the problem that it is trying to solve. A. Clearly state the problem that the business owner is seeking to solve. Be sure to address the question of what your business ultimately wants to do. B. Identify and briefly describe the two technologies from the list provided that you will research in your business systems analysis. I. Basic Security Considerations: In this section, you will briefly explain what the owner of your business must consider in regard to security and privacy if they choose to adopt your recommendations. A. Explain the security features your recommended technology solution should have. B. Briefly explain what your business should consider in regard to security and privacy as you seek out third-party vendors for the proposed technology. C. Briefly describe the internal safeguards that should be put in place in your business to guard against loss or misuse of company data. Provide examples.  

IS IT YOUR FIRST TIME HERE? WELCOME

USE COUPON "11OFF" AND GET 11% OFF YOUR ORDERS