Business Requirements

Project Deliverable 2: Business Requirements

CIS 498

Section 1: Business Requirements Document

Introduction

E-commerce is considered as the booming market in the business development consideration. In this business plan, innovative technological consideration will play a significant role in the infrastructural communication and networking. The main purpose of this study is to implement a proper analysis by considering the current market situation and the latest technological consideration. In this regard, scopes of the e-commerce are examined and are explored by inclusion of the controlling procedure. Apart from that, projected risk, assumption and constraints are also explored in this discussion. Interactive technological consideration has the capability to enhance the overall business performance in the mentioned sector. Several infrastructural system integration processes such as security, networking, database, interface design and others are included in this study.

1. Scope analysis

The scopes and opportunities of an e-commerce company, which is engaged in providing services on the online platform through deploying information technology in its operations, are immense. Moreover, as the operations are based on the segment of innovative e-commerce, it can have scope from the investment sector due to its high productive situations. The e-commerce platform has recently become one of the most popular preferences of the customers as per the current market demand. With the increase of such requirements, there has been increased in the innovations in the employed information technology sector through giving more focus on the transactions process (Kerthika & Suresh, 2019). Moreover, with the bloom of e-commerce in the current years, the concerned e-commerce company can have many opportunities among the fast-growing domains in the world of online commerce. In spite of having some time for the customer in accepting the process, this has been accepted by the majority, as they prefer to make transactions on the online process rather than the offline one due to presence of high-end security and hassle-free transactions. Moreover, customers also prefer to have their services at home rather than going to the stores and getting their requirements met, which is creating enormous scopes for the concerned company.

The key activities undertaken by the concerned company can also provide it with various scopes in this sector. This is due to the presence of protected databases of the customers, which has been prioritised by the said company. With the use of effective and innovative features of information technology, the company is focusing on protecting its customer database on the cloud solutions. This is protected through high-end security plans including incorporation of anti-malware software, firewalls, and others, which are effective in keeping the data of the customers secured. Such a process is also a creator of huge scope for the concerned company in the e-commerce sector. It is because customers would always prefer to transact with the company that is keeping their information safe with cloud protection systems (Fu et al. 2019). Hence, the scope of the business is quite bright for the presence of such features in its activities. Apart from these, the scope of the concerned company is based on the increased users of the internet in recent years with the increasing easy and safe access of the internet by the users of different ages. Such factors are favourable for the company in establishing its business based on e-commerce for its future success in the industry.

The concerned company is seen engaging about 30 employees during its present start-up operations, who will be employed in its two-storied business. The presence of effective communications among them through advanced networking system is also favourable for creating ample scope for establishing its business and increasing its business further. Such a fact is true for the concerned company due to its use of networking systems with an effective computer infrastructure along with effective communication systems through device locations, server information, links, and so on. These are helpful in creating effective interactions among the employees and employees along with the employees and the customers of the company (Johri & Tiwari, 2019). With the development of appropriate communications systems, the concerned company will have scope of creating customer satisfaction, thus increasing its reputation among its customers, which is finally required for expanding its business. Such scope can be managed by the concerned organisation through the effective use of the opportunities in different aspects for the progress of its business. Moreover, with the help of such opportunities, the company can also increase its revenue in its long-term operations, this increasing its overall profitability from its operations.

2. Identification of constraints, risks, and assumptions

An e-commerce business operates based on effective implementation of Information System and Technology. IT systems generally monitor and manage database, security, system analysis, computer infrastructure, accounting and networking within the organisation. In addition, an efficient IT system also overviews web-designs, human-computer interaction and employee-customer relationships; in this concerned case, different risks, constraints and assumptions need to be identified in order to start up a new e-commerce business (Laudon & Traver, 2016).

Newly implemented IT infrastructure may contain various constraints, which can create complications for the business. Such constraints can be related to security, privacy disclosure, tax issues, product sustainability, legal issues, technical limitations and other similar complications. However, identification and adapting proposed solutions can overcome the mentioned limitations. Primarily, customers or buyers try to avoid online transaction, as there can be a chance of credential theft and disclosures. Hence, organisations try to secure their business websites and online transaction processes. Data encryption can be put into effect that ensures information privacy (Maedche, et al. 2016). In the recent market, e-commerce businesses are booming with success and security of the transaction websites revising their security with software. The concerned organisation intends to adopt Anti-malware software, firewalls and security plugins in order to manage the whole business process.

The e-commerce business can be slowed down if the IT system does not manage the privacy of customers. The organisation gathers customers’ personal information such as addresses, contact numbers while doing business. Leakage of sensitive information can take place if the organisation is unable to protect its database. On the other hand, e-commerce businesses have to follow certain rules and regulations under the governmental legislation while starting a new business. Legal compliances such as cyber laws and data management laws have to be taken into account while making an agreement. Moreover, technical limitations can halt the business as e-commerce businesses solely depend on advanced technologies and its performance. The organisation can face challenges if it is unable to attain proper domain, software and network. As a result, technological aspects should be planned beforehand to start an effective e-commerce market place.

Along with constraints, any e-commerce business is liable to consider a number of risks while planning the business venture. E-commerce business risks such as regulatory issues, the return of product or goods warranties, taxation policies, system reliability, intellectual properties and its acquisition should be considered and studied as per business plan (Hansen, Saridakis & Benson, 2018). One of the situations can be assumed that is the Internet Service Provider (ISP) can crash while customers are making payment. As a result, the entire service process can be at risk and the organisation should create a mitigation plan to handle the situation efficiently. Credit card fraud is a risk that the organisation should be concerned. The organisation’s logo, product, website design can be stolen by third parties that should be protected by Intellectual Properties Law. Taxation system and regulatory laws need to be followed by the company; it can face higher service, sales, and shipping taxes, which is unprofitable for the business. Product damage and infringements can take place while shipping the products (Hair, et al. 2017). In addition, logistics, warehousing problems may occur and the company can face shipment delay.

Various assumptions can be planned by the organisation in order to tackle the risks and constraints. The company can acquire an advanced IT system that can ensure proper management of firewall, anti-malware software and security plugins. Further, the IT system can secure and encrypt the organisation database, which would ensure the security of customer information (Trantopoulos, et al. 2017). The company should acquire trademarks and patents of the products, web design, IPs which can protect the company’s assets. Secondary ISP should be attained in case the current ISP fails while transaction. The company logistic department needs to revise the taxation system where the e-commerce business is willing to situate. This would allow the company to strategies and plan product pricing to gain profit.

3.  Integration regarding other system and infrastructure

In order to expand the efficiency of the business the management can explore the system infrastructure by considering the latest technological considerations. This study has discussed several aspects of the information system for developing the e-commerce business.

Databases

Protection of sensible data regarding the digital application is a core section of the business. The business official can include cloud base management to reduce the data burden and security (Ran & Nedovic-Budic, 2016). There is several databases software or SaaS services provider in the digital market. In addition to that, direct marketing effort can be categorized with the database system analysis. There are several supportive aspects regarding the relevant and effective database assessment in the mentioned industry such as:

Data tracking

Customer Information

Transactional Information

Stable internal core business structure

There are several types of databases in the current market system such as Value Databases, Cloud Databases, API Databases and others (Brombach et al. 2017). As per the analysis, the proposed e-commerce business will implement cloud database management, as there are several scopes such as huge data space, security, user friendliness, advanced features and others.

Systems analysis

The E-commerce industry involves a combination platform of business within single infrastructure such as consumer response, financial transaction, delivery of product and others. Transparent projection of the business will improve the market reputation of the business along with financial consideration (Bailo et al. 2019). Inclusion of GSI can implement the positive communication between the management and the clients. Relevant system analysis can includes different positive aspect reading e-commerce business such as:

Cost effective analysis

Efficiency and flexibility

Better Management

Inclusion of proper technological consideration

Security 

The infrastructure of the business has to be dedicated to technological security such as extension of firewall, malware protection and others. Online confidentiality can be improved by considering the encryption and synchronization with password and protection measurement. Apart from that, the higher authority will include business ethics regarding the work culture, infrastructure management and others (Svegrup et al. 2019). This study has included several security threats regarding the development of eth business such as:

E-commerce Security Threats

Phishing

Periodic backup

DDoS Attacks

Payment Gateway Security

However, all of the mentioned aspects regarding the security assessment will be maintained by the business authority in order to enrich the internal core process. They can hire technological experts to manage all of the requirements (Ran & Nedovic-Budic, 2016). Apart from that, involvement of computer infrastructure, human computer interaction can improve the overall specification of the security system.

Networking 

The e-commerce business plans to acquire networking efficiency and better network infrastructure in order to increase the flow of the business. As the business would be entirely dependent on networking systems, the organisation should perform factors such as physical communication, device location, server information, links and the number of customers using the website (Müller, et al 2016). These factors ensure the quality of the network and the organisation needs to improve these implications to increase the quality of the network (Turner & Weickgenannt, 2020). In addition, the organisation already intends to acquire and implement network infrastructure assets such as firewalls, load balancers, DNS, switches and routers that are essential components for setting up the network chain of the e-business. However, a number of challenges that the company has identified are

Malware threats

Network security and data protection

Trojan horses

Financial frauds through networks

Bad bots that targets networks

However, the e-commerce business organisation is willing to implement specific security changes to avoid the mentioned challenges. The company should secure the server and admin panels that can protect the network effectively. Switch and routers need to be protected from any third party as the components involve networking. The staffs within the company should be trained in a way that they can handle the advanced IT system used in the e-commerce business.

Interface Design

The interface design is an essential aspect that can appeal or attract customers to buy products. The organisation will try to ensure the interface design to provide a description of the products. The user interface will allow the customers to connect with the business and various features can be put into the website, which will be available for the business (Malik, Rafiq & Kahloon, 2020). The website will include payment gateway, customer support and shopping cart gateways for customers to order products. On the other hand, the user interface of the website will allow customers to perform interaction through e-portals and computers. The human-computer interaction will include

Supply chain management system

Data mining

Improving business outcomes

The mentioned factors would help the organisation to acquire a distinctive market place in e-commerce business. Further, the interface design can be connected with wireless platforms and can be accessed from mobile, laptops with a secure gateway.

Conclusion

As per the above discussion, it can be concluded that technology will play a vital role in the e-commerce business development in terms of positive communication and networking in the integrated system. This discussion has explored several relevant sections of e-commerce in terms of security and safety management. Inclusion of the cloud-based management will enhance the overall business performance in terms of mobility and attracting consumers. Implication of integrative technological solutions within project management will upgrade the informational resource application in business. Therefore, it can be stated that this discussion has clearly implemented the aim of the study regarding business projection in e-commerce specifications.

Reference list

Bailo, D., Jeffery, K., Paciell, R., Rabissoni, R., Vinciarelli, V., Michalek, J., & Atakan, K. (2019, January). EPOS: a FAIR Research Infrastructure for data, data products, software and service integration in the solid Earth domain. In Geophysical Research Abstracts (Vol. 21).

Brombach, J., Winkler, J., Mayer, F., Beekmann, A., & Strafiel, C. (2017, October). Grid-Integration of High Power Charging Infrastructure. In 1st E-Mobility Power System Integration Symposium.

Fu, M., Chen, Q., Lin, W., Wang, P., & Zhang, W. (2019). Constructing a Scene-Based Knowledge System for E-Commerce Industries: Business Analysis and Challenges. Data Intelligence1(3), 224-237.

Hair, J., Hollingsworth, C. L., Randolph, A. B., & Chong, A. Y. L. (2017). An updated and expanded assessment of PLS-SEM in information systems research. Industrial Management & Data Systems.

Hansen, J. M., Saridakis, G., & Benson, V. (2018). Risk, trust, and the interaction of perceived ease of use and behavioral control in predicting consumers’ use of social media for transactions. Computers in Human Behavior, 80, 197-206.

Johri, S., & Tiwari, S. (2019). Role of lifestyle in buying decision process in online retail industry. Pranjana: The Journal of Management Awareness22(1), 11-24.

Kerthika, R., & Suresh, A. (2019). Scope of E-Commerce over Petroleum Products with Portable Refuellers in Succeeding Decades. Ushus-Journal of Business Management18(1), 35-48.

Laudon, K. C., & Traver, C. G. (2016). E-commerce: business, technology, society.

Maedche, A., Morana, S., Schacht, S., Werth, D., & Krumeich, J. (2016). Advanced user assistance systems. Business & Information Systems Engineering, 58(5), 367-370.

Malik, S. R., Rafiq, M., & Kahloon, M. A. (2020). Cloud Security in E-Commerce Applications. In Cloud Computing Applications and Techniques for E-Commerce (pp. 50-67). IGI Global.

Müller, O., Junglas, I., Brocke, J. V., & Debortoli, S. (2016). Utilizing big data analytics for information systems research: challenges, promises and guidelines. European Journal of Information Systems, 25(4), 289-302.

Ran, J., & Nedovic-Budic, Z. (2016). Integrating spatial planning and flood risk management: A new conceptual framework for the spatially integrated policy infrastructure. Computers, Environment and Urban Systems57, 68-79.

Svegrup, L., Johansson, J. & Hassel, H., (2019). Integration of Critical Infrastructure and Societal Consequence Models: Impact on Swedish Power System Mitigation Decisions. Risk Analysis39(9), pp.1970-1996.

Trantopoulos, K., von Krogh, G., Wallin, M. W., & Woerter, M. (2017). External knowledge and information technology: Implications for process innovation performance. MIS quarterly, 41(1), 287-300.

Turner, L., & Weickgenannt, A. (2020). Accounting information systems: controls and processes. Hoboken: Wiley.

Place an Order

Plagiarism Free!

Scroll to Top