M-Commerce
M-Commerce is as well denoted as Mobile Commerce. It is the wireless electronic commerce used in conducting business through the mobile devices that are as well-known as Personal Digital Assistant (PDAs); as a result, they are the generation of wireless electronic commerce that requires no wire and plug-in devices. From the elucidation, one would deduce that there are various ways that the M-Commerce can inflate or increase the reach of E-Commerce considering the fact that a majority of people have their PDAs all the time. However, the M-Commerce can expand the reach of E-Commerce since it allows businesses and organization to engage in transactions that are conducted in a wireless manner (Huang, Wang & Day, 2008). That takes place through the internet, private communication channels, as well as smart cards among others. Bearing in mind that they present opportunities for business and organizations to deliver new services to their clients, they as well attract new customers, and most of all, retain them.
The M-Commerce concepts as well as the elements of E-Commerce might help a manager who works in a fashion retailer, and is in charge a mobile advertising campaign that are geared to generate increased sales for a new clothing line (Huang, Wang & Day, 2008). As a result, the manger ought to take advantage of M-Commerce concepts allows devices to interoperate without complexity. In addition, the M-Commerce have inbuilt storage capabilities in addition to sophisticated applications for digital applications and telemetry services. As a result, the increased proficiencies allow clients to browse, select, and purchase from a retailer. The fact that the technology allows for digital cash through the integration of cash cards into the mobile devices is an E-commerce element that the retailer manager might benefit from (Huang, Wang & Day, 2008). Since it allows for clients to pay for the purchased goods and services, it becomes efficient in attaining the increased sales objectives that the manager had in target.
Security
In the process that a business wishes to share its customer account database with their trading partners and customers, there are various security components that would be put in place to ensure no unauthorized access happens. For instance, a Firewall would ensure that the database is protected from external attack, and it encompasses the setting of passwords, having remote administration, logging, as well as strict policies discouraging unwanted accesses. Such a security measure is imperative bearing in mind that information contained in the database represents the lifeline of any organization (Basta & Zgola, 2011). Likewise, the Virtual Private Network would be vital in securing the database from unwanted access. Since it applies a virtual connection rather than a leased public line, it becomes easy for the company to ensure their database is safe from external access. Worth mentioning also is the fact that the database would be made in such a way that they do not allow duplication of information, hence, information would be safe (Basta & Zgola, 2011).
Comparatively, there are numerous types of network configurations that would be appropriate for security of the database. For instance, having networks that allows traffic monitoring would help in protecting the database from external access. The monitoring enables the technicians to get alerts in case abnormal activities are noticed within the network. Moreover, having a bandwidth necessary for the database would enable the end users to be known. As a result, any deviation would be realized allowing a timely action to avoid loose of data to unwanted end-users (Basta & Zgola, 2011). Having secure networks is important not only for the company, but also for the customer’s whose personal details would be in the database. Hence, time and money would be at stack without a secure network.
Reference
Basta, A., & Zgola, M. (2011). Database security. Boston, Mass: Course Technology.
Huang, W., Wang, Y., & Day, J. (2008). Global mobile commerce: Strategies, implementation and case studies. Hershey, PA: Information Science Reference.