E Commence Assignment
E Commence Assignment
E Commence Assignment
E-COMMERCE AND
INFORMATION SYSTEM
LGB20703
INDIVIDUAL ASSIGNMENT
INTRODUCTION……………………………………………………………………………..1
QUESTION 4……………………………………………………………………………….…2-6
INTRODUCTION……………………………………………………………………………..7
QUESTION 5…………………………………………………………………………..…….8-12
CONCLUSION……………………………………………………………………………….13
REFERENCES……………………………………………………………………...……….14
INTRODUCTION
In a company, a complete database are usually important to the organization. So, people in the
organization are not used to it because of the conventional way. In this IT era, database
becomes more important and sophisticated. So, to drive this paradigm, it must been
appropriately motivate the employees to use it wisely. Motivation is must for each of the
employees. Education alone is not enough either. Many "educated" individuals achieve very
little on or off the job. They know what to do, and they know how to do it. The problem is they're
not motivated enough to do much about it. So, motivation is the key towards the success of the
modern organization.
Q.4 List the five problems which may motivate an organization to move toward the database
approach. Explain the significance of each one to a manager to an organization.
For the manager, he or she must start the database so the employee started to use this
database.
For the manager, he or she must make a goal for the company, the key performance for the
company and must set up a standard compared to the current performance.
For the manager, he or she must evaluate staff performance performance and update the
performance data monthly.
For the manager, he or she set up performance management system and also individual
development system.
For the manager, he or she must set up the performance review system/
policies/procedures ,performance recognition system, and the performance rewards system.
Current issue
The Gallup organization once analyzed its massive database and determined that about half (55
percent) of today’s employees have no enthusiasm for their work. Gallup labeled these people
as “not engaged.” In other words, they didn’t have much loyalty to their organization or much
desire to improve their job performance. It found that one in five (19 percent) were so negative
about their jobs that they actually poisoned the workplace. In fact, when those employees called
in sick, their organizations were more productive and efficient.
You may think, “Big deal. So what if some of our employees are not fully motivated?” But it is a
big deal. Their lack of motivation is costing your organization big bucks.
Gallup estimated that if companies could get 3.7 percent more work out of each employee, the
equivalent of 18 more minutes of work each eight-hour shift, the gross domestic product in the
United States would swell by $355 billion, twice the GDP of Greece.
In today’s competitive world, the really successful person is not only educated, but also
motivated.
If you’re educating or training your employees, but you’re not motivating them to use what they
learn, you’re wasting your time and your money.
The famous author, William Butler Yeats, said it quite well: “Education is not filling a bucket but
lighting a fire.” A more contemporary figure, Kevin Roberts, the CEO of Saatchi & Saatchi, says,
“In the 21st century, organizations have to achieve peak performance through inspiration by
unleashing the power of their people—not by teaching them, not by managing them, but by
inspiring them.”
If you educate and motivate your staff, you’ll see an increase in productivity, efficiency,
effectiveness and ultimately an increase in profits.
The Mercedes Benz plant in South Africa learned that. For a long time, the managers said their
quality problems were due to an unmotivated, lazy workforce. That’s why it took them two
weeks to make a car that had 70 defects. By contrast, the Mercedes Benz plant in Europe could
turn out a car in one week that had only 14 defects.
Then, a fortunate accident occurred. After a year of suffering with productivity and quality
problems, it just so happened that a car was being made for liberator and president Nelson
Mandela. No particular mention or fanfare was made. The vehicle simply went through the
assembly line with a tag on it that read, “For Mr. Mandela.”
To the managers’ amazement, the car was completed in one week and had only 10 minor
problems. A light bulb went off in the managers’ heads. Their workers were capable. They were
educated enough to do the job and do it well. They had simply not been motivated enough to
give their very best. It was at that point that the Mercedes leadership learned that they had to
engage their workers’ hearts, not just their hands.
Are you doing that in your organization? You’re buying your employees’ time. Are you also
getting their hearts and minds?
Education plus motivation will not only help your organization make more money, but it will also
save you a lot of money.
When I was speaking at a construction company, the CEO asked his employees a question. He
asked, “What does it cost to put a piece of plywood on the floor? How much does it cost in
terms of time and money?” The employees answered, “About ten minutes and twenty dollars.”
The CEO replied, “Yes and no.” He said that’s what it would have cost if the job had been done
right. Unfortunately, an employee slapped down the plywood poorly and didn’t cover a hole
properly. The ensuing lawsuit cost the company $450,000. The employee was educated. He
knew what to do, but he wasn’t motivated enough to do it right.
Solution
1. Take a look at the training you’re offering employees. Is it really motivating them? As a
speaker, I find that many people in my audiences are quite well educated. They’re filled with
knowledge. However, sometimes they don’t have enough motivation to use all the knowledge
they possess.
2. Listen to what your colleagues are saying when they hear about an upcoming seminar. Do
you hear groans and complaints about having to go? Or do you hear comments of excitement,
as people can’t wait for it to begin? What you hear will tell you how successful your past classes
have been in motivating people.
3. If you’re not hearing almost unanimous excitement, re-examine the education you’re offering
and re-examine those who are leading it. One bad class or one poor instructor can leave a
negative legacy for a long time to come.
INTRODUCTION
The main goals of information security are Confidentiality, Integrity and Availability.
Confidentiality means the information available on a system should be safe from unauthorized
people; better examples would be customer credit card information, patient medical information
in hospitals or personal information of employees in an organization. If that information is not
secured, the company or the organization involved in that will eventually loose its reputation and
business. Integrity means the information available in an organization should be complete and
whole. It shouldn't be altered by any unauthorized person. Intentional or unintentional attacks on
the information will cause severe damage and finally the information becomes unreliable.
One of the best examples would be account holders≠ information in a Bank. If something
happens to the banking information, it is devastating and the Bank will be in danger of losing its
customers and business. In fact, in such cases, it may face a lawsuit too.
Q.5 Different among Trojans, Worsens and Viruses. Justify that “Computer Virus is a major
treat to computer security.”
Intrusion or Hacking
It is nothing but gaining access to a computer system without the knowledge of its owner. The
people who do this kind of unlawful things are called as hackers. Once they get access to
targeted systems, they can alter data available on those systems or steal private information
such as SSN, personal information and sometimes some sensitive information related to bank
and credit card accounts. Most of the targeted systems for hackers are eCommerce websites,
individual machines and sometimes bank websites that provide facility for online banking. The
targeted systems for hacking are depending on the hackers and their personal types. Some
people will do hacking just for fun and curiosity.
Worsens
IS the damaging the process of recording video, as well as at its transmitting and transfer to
various carriers, different kinds of noise worsening the quality of video image can appear on the
tape.
A computer virus is a computer program that can copy itself and infect a computer. A true
virus can only spread from one computer to another when its host is taken to the target
computer; for instance because a user sent it over a network or the Internet, or carried it on a
removable medium such as a disk or cd etc.Viruses can increase their chances of spreading
to other computers by infecting files on a network file system or a file system that is accessed
by another computer.
Viruses and Worms are computer programs that make computer systems not to work properly.
There is a subtle difference between Virus and Worm; both can replicate itself, but when
traveling on the network, Virus needs a carrier file. It can't travel on its own on the network;
where as Worms can travel on its own without anything. It doesn't actually need any infected file
to stick in.
Viruses can be classified into different categories as given below depending on the way it
affects the systems.
· Polymorphic Virus : It changes its signature with every infection
· Stealth Virus: This virus has to change something to infect the system. After changing
something, it has to gain control over some system functions to hide itself and the infected files.
In order to do this, it has to reside in memory.
· Tunneling Virus: These types of viruses will tunnel under anti-virus softwares and try to escape
from the eyes of anti-virus softwares.
· Virus Droppers: This type is actually a program that creates virus and affect the computer
systems using its virus. It itself is not a virus. It is a creator of virus.
Because it is not a virus, it is difficult to detect it through anti-virus softwares.
· Cavity Virus: This virus will actually maintain the size of the infected files not to be identified by
the antivirus softwares.
The better way to avoid viruses is installing anti-virus softwares on all systems. Some new
viruses may even try to bypass antivirus softwares; so, it is very important to keep virus-
signature-database up to date. In addition to anti-virus software, users should be very careful
while downloading files from internet or mails, because that may contain some malicious virus. If
the files or mails are not from trusted source, it is better to delete it right away
without opening it.
Trojan Horse
Trojan Horse programs are initially used for system administration purposes. System
administrators used these programs to control their work-stations remotely. These programs are
having two components; one runs as a server and another one runs as a client. The server part
is installed on the work stations and the client is installed on the administrators≠ machines.
Though it has a good purpose, its power can be used for bad purposes too. Hackers can use
these programs to get control on their target machines and watch all the activities. This is very
dangerous than Virus and DoS for the eCommerce businesses. The threatening issues with
Trojan Horses are as follows:
Worms
- A worm is a small piece of software that uses computer networks and security holes to
replicate itself. A copy of the worm scans the network for another machine that has a specific
security hole. It copies itself to the new machine using the security hole, and then starts
replicating from there, as well.
Current issue
McAfee Response To Current False Positive Issue Wednesday, April 21st, 2010 at 4:29 pm
by Barry McPherson
In the past 24 hours, McAfee identified a new threat that impacts Windows PCs. Our researchers
worked to address this threat that attacks critical Windows system executables and buries itself
deep into a computer’s memory.
The research team created detection and removal to address this threat. The remediation passed
our quality testing and was released with the 5958 virus definition file at 2.00 PM GMT+1 (6am
Pacific Time) on Wednesday, April 21.
McAfee is aware that a number of customers have incurred a false positive error due to this
release. We believe that this incident has impacted a small percentage of our enterprise accounts
globally and a fraction of our consumer base–home users of products such as McAfee VirusScan
Plus, McAfee Internet Security Suite and McAfee Total Protection. That said, if you’re one of
those impacted, this is a significant event for you, we understand that and we’re very sorry.
Our initial investigation indicates that the error can result in moderate to significant issues on
systems running Windows XP Service Pack 3.The immediate impact on corporate users was
lessened for corporations who kept a feature called “Scan Processes on Enable” in McAfee
VirusScan Enterprise disabled, as it is by default, though those customers could also be impacted
when running a scan.
The faulty update was removed from all McAfee download servers within hours, preventing any
further impact on customers.
McAfee teams are working with the highest priority to support impacted customers. We have
also worked swiftly and released an updated virus definition file (5959) within a few hours and
are providing customers detailed guidance on how to repair any impacted systems.
For question 4, exactly a lack of motivation definitely impacts the business so motivation is
must for every person. If you have determination so u can do everything. I think so everything is
possible but you have to need for little bit motivation. One thing more always think positive
because positive attitude always boost up and increase our motivation. So i think so in every
field every person have required the motivation For question 5, nowadays, information is one of
the very important assets in almost all organizations. Once the internal networks of those
organizations are connected to the Internet, it becomes a potential target for cyber attacks. In
order to secure the systems and information, each company or organization should conduct a
self-hacking-audit, analyze the threats and eliminate it before getting any problem. This paper
explains about the main goals of information security, its major threats and some suggestions to
prevent the systems from major threats.
REFERENCE
http://en.allexperts.com/q/Marketing-1090/2010/3/management-information.htm
McClure, S., & Shah, Saumil & Shah, Shreeraj (2003). Web Hacking Attacks and
Defense. Boston: Pearson Education, Inc
Jacobs, J., & Clemmer, L., & Dalton, M., & Rogers, R., & Posluns,
J (2003). SSCP: Systems Security Certification Practitioner:
Rockland: Syngress Publishing, Inc.
Virus Primer. Retrieved on Sep 29, 2004 from
http://www.trendmicro.com/en/security/general/virus/overview.htm
http://siblog.mcafee.com/support/mcafee-response-on-current-false-positive-issue/
http://socomsales.com/word/no-motivation-its-costing-your-company/