preview

Social Media in E-Commerce

Best Essays

Social Media Tools in E-Commerce Last week the team created a presentation to describe how new communication technology could help the team-oriented projects of an e-commerce company succeed in a more effective and efficient manner. Now that the presentation is complete and was a success, the executives would like us to launch an e-commerce unit.
The team will discuss how the new social media tools may be used to distribute messages to consumers and clients and explain which tools are the best to use in specific situations. Some of these tools that will be discussed include video conferencing, Skype, online schedules, online calendars, Smartphone, and internal shared hard drives. Several ethical issues are involved when using …show more content…

These security concerns include fraudulent acts committed by employees or third parties against the computer systems, computer virus attacks, alteration or destruction to electronic information, trade secrets copied or recorded, and extortion (Tennant Risk Services, 2004). Any time software or programs are downloaded to a computer or other device the operator runs the risk of a virus being attached. Having a secure, anti-virus software installed on each computer or device involved in downloads, is imperative to prevent damage caused by virus attacks. Security systems that monitor computer activity can also be installed on computers within the organization or company to deter employees from committing fraudulent or malicious acts against the computer system. Computer Securities Products, Inc. offers a variety of items to secure computer hardware and software such as cable kits, coverlocks (blocks viruses from being downloaded or information from being copied by locking across the disk drives, CD drives, and USB ports), and steel enclosures for CPU cases (Computer Securities Products, Inc., 2009). The Computer Fraud and Abuse Act (CFAA) was passed in 1984 and updated in 1986, 1994, 1996, and 2001. It prohibits unauthorized access to computers belonging to a financial institution, government agency, or protected computers involving interstate or foreign communication

Get Access