In: Economics
1.Cyberlaw
2. information technology management
Cyber law
Introduction
The online fraud and the data breaches are the major concern that require adequate legal and regulatory responses that help in boosting of the trade through e-commerce.
Thesis statement
The instances through which the government has taken the same actions, a result that is being influenced through commerce.
Major points
Conclusion
The supportive and adequate legal concern is essential for e-commerce environment for creation of online and securing the interactions that are between the consumers, enterprises and the authorities within the public. The development of e-consumer government initiative enhances the confidence and protection of consumers.
Information Technology Management
Introduction
Business Intelligence deals with the set processes, architectures, methodologies and the technologies which are used to transform the raw data into the useful and meaningful information.
Thesis statement
The brief description and identification of the real world application for the Business Intelligence.
Major Points
Conclusion
The analytics enabling the decision making optimally and also knowledge for business discovery that includes the mining of data, analysis of statistics and the analytic predictions and modelling. Visualization of data; by presenting the data for the university in a range which is fully of the staff in the manner that is very effective and clear.
Cyber law
The transactions through electronic devices have become very important for the government, the consumers and enterprises in various parts in the world. The fraud through online and the breaches of data are the concerns growing that requires the adequate regulatory and legal responses for boosting the cross border and domestic trade. The actions of policy addresses the requirement of the laws that are compatible and also building of the key capacity stakeholders, authorities with notably enforcement.
The platforms of new e-commerce and the solutions for payment are in light especially of the technologies that are new, the barriers in e-commerce have proved to be easier to manage. The supportive and adequate legal concern is essential for e-commerce environment for creation of the online and securing the interactions that are between the consumers, enterprises and the authorities within the public (Doppelt, 2017). The legislation extent by the countries and regions and the effective implementation and enforcement of these laws are considerably very important. The research done by UNCTAD indicates that, occurrence of laws that are relevant within four areas legally have become very essential to the increased confidence by the users in the e-commerce, protection of the consumers, e-transaction laws, protection of data and privacy and the cybercrime are generally high within the countries that have been developed.
The prerequisite that is used in conducting the transactions commercially through online includes the payments through electronic, indicates that legally equivalence that occur between the electronic forms and paper based for exchange, has become to be the goals for e-transaction laws (Percival et al, 2017). These laws have been adopted by approximately 143 countries, out of these countries, 102 are the developed countries by UNCTAD 2015. The jurisdictions which have already adopted a model of laws and the convention towards the use of the electronic communication by the international contracts usually share certain elements that are common within their contracting electronic laws, that assist in the facilitation of the e-commerce existing along the cross border.
Certain countries enact the legislation for technology that are specific for using the e-signatures for instance, the infrastructures that are key within the public. It therefore, applies to certain states that belong to Commonwealth to the Independent States and also Economic Community of West African States (ECOWAS). According to (Prakash and Reddy, 2018), it is indicated that these countries set up the bodies that certify and create the signatures digitally basing them according the cryptography. Some of the laws usually envisage especially that the digital signatures are the ones being recognized for the mandatory force. Also, there have been a trend and more laws for the neutral technology. For instance, the 2011 Federation by Russia which amended the law so that it recognizes almost all the forms for e-signatures and also adopted a convention for use of the electronic communications by the international contracts enabling the recognition of cross border for e-signatures of technology basis through neutrality.
The protection of the consumers seek to be addressing the imbalances within forms of consumers and businesses in commerce. According to the Internet nature in which the information’s that are important for sellers for example, the location, identity and credibility can be concealed very easily, the imbalance has been accentuated for the case in ecommerce (Pehlivan, 2018). The consumers are usually vulnerable through online towards the fraud and deceptive activities. The laws protecting the consumers can assist the businesses to be engaged in clarifying requirements for doing the businesses through online in any jurisdiction. Therefore, the consumer policies, regulations and laws may outline the consumers’ practices in business and rights which are expected through online, fraud limits and also commercial misleading conducts which help the businesses to develop their regimes of self-regulatory by the Organization for Economic Cooperation and Development OECD (Woods, 2018). There has been the development of e-consumer government initiative which enhances the confidence and protection of consumers for the e-commerce by International Consumer Protection and Enforcement Network. The website usually invite the individuals so that they can file their complaints through online.
Information Technology Management
Definition of the term Business Intelligence
Business Intelligence is the set of processes, architectures, methodologies and the technologies which are used to transform the raw data into the useful and meaningful information that may be used for enabling of more strategies effectively, operational and tactical insights and making of the decisions. The result at end should always be for transformation of the paths through which information’s are being used in assisting of the University for the Forward Movements. For example, the technologies that involves the use of master data and data quality management (Gandomi and Haider, 2015). The reasons for which the Business Intelligence can be applied: measurement; by creation of the hierarchy for KPIs, through benchmarking that occur both out with and within the University. The analytics enabling the decision making optimally and also knowledge for business discovery that includes the mining of data, analysis of statistics and the analytic predictions and the modelling. Visualization of data; by presenting the data for the university in a range which is fully of the staff in the manner that is very effective and clear and enhance the quality of data, knowledge and making of the decisions.
The real world application for the Business Intelligence
The real world applications for use of data for the improvement of data processes and conversion. For instance, treating of the customers who are valuable like the MVPs. This is experienced by people who usually visit the airport either by making the frequent flight with the specific airline and also those that are not making such flights frequently (Hazen et al, 2018). The flyers who are loyal are usually rewarded by the privilege within the front-of-line and the lounges that are very exclusive and the parks that can be seen by the rest of the flyers for instance, the free upgrades and flights. The airlines usually performs what other businesses are doing, for instance, identifying their best customers and also measuring what actually happens especially when such treatments are offered differently. The various companies are offering data for the location of the customers segments and are valuable and promotion of certain offers to these individuals, though perhaps with no ease to which the Monetate offers. The platform of Monetate usually empowers the enterprises that are having the bigger insights of data, merchandising, personalization, analytics and testing for the anticipate action and reaction of the customer’s behavior (Ibarra-Esquer et al, 2017). For example, the retailer can use the email so that he/she drives the customers who already exist with the VIP messages and also promotion and then carrying that particular message over to site for both promotional banner and landing page that reminds the visitor for promotion of VIP in each and every page the person is visiting.
The brands should be doing the personalization for a scale. It is very simple the merchants so that they find around eight customers then have them with good treatment. The larger enterprises usually have the groups that are different in their needs and target each of them with the personal emails, pages and the banners which may be the burden for creativity. According to (Stair and Reynolds, 2017), the content by the Monetate of builder is working similar with how an individual can lay the photos differently, other Photoshop for the Adobe elements and the texts. During the time for building the creative, the users of Monetate are able to remove, add and also edit the layers for creation of campaigns differently for the different groups. For instance, sending the promotion for the customers who are very valuable in places that it is raining currently and the other to the mostly valued customers in places having the snow.
The analytics and BI providers of software Tableau has named the intelligence within the social to be the trend that is second within the intelligence of business and writing. The tracking of conversations within a scale through social let the companies in finding out especially when the topic begins trending and also what the customer’s talks about (Hull and Nezhad, 2016). The Brands monitors the conversations socially via the Sprout Social, Hootsuite and the Brandwatch which tells the creation of content decisions through understanding of what already has occurred especially what the customers talks about and can happen, for instance if the content information based for the existing conversations socially. In the scene of new Business Intelligence, the Uprise .io makes the content marketers so that they can analyze and discover top content performing for them vertically, observe the social network that responds best for the content and also view the sharers and influencers across the verticals, specific articles and publishers.
References
Doppelt, B. (2017). Leading change toward sustainability: A change-management guide for business, government and civil society. Routledge.
Gandomi, A., & Haider, M. (2015). Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2), 137-144.
Hazen, B. T., Skipper, J. B., Boone, C. A., & Hill, R. R. (2018). Back in business: Operations research in support of big data analytics for operations and supply chain management. Annals of Operations Research, 270(1-2), 201-211.
Hull, R., & Nezhad, H. R. M. (2016, September). Rethinking BPM in a cognitive world: transforming how we learn and perform business processes. In International Conference on Business Process Management (pp. 3-19). Springer, Cham.
Ibarra-Esquer, J., González-Navarro, F., Flores-Rios, B., Burtseva, L., & Astorga-Vargas, M. (2017). Tracking the evolution of the internet of things concept across different application domains. Sensors, 17(6), 1379.
Pehlivan, O. K. (2018). Confronting Cyberespionage Under International Law: Legal Responses to Cyber Attacks Targeting Economic and Industrial Assets. Routledge.