For a brick and mortar model, a sure way of keeping the customer’s data safe is achieved by paying fixed costs such as rent and monthly charged for security alarm services. As evident in the name, fixed costs stay the same no matter what operation business is undergoing. Sensitive personal data in this setting can be locked up in a safe either at home or at work which only authorized personnel access (Rust & Kannan, 2016).
This measure is taken to ensure the information is secure from roommates and workers. If the company has to share information about a client, it will inquire about its need, safeguarding, and the consequences of not giving out the information. The company can also shred receipts, forms, statements, checks, cards, statement and other documents that bare clients’ information that is no longer needed. New checks are not to be mailed at home unless secure mailboxes with locks exist there.
For a secure environment in e-commerce, outgoing mail must be taken to the post office or the post office collection boxes. The company is also to train employees to be suspicious of emails containing attachments, reporting unusual ones to IT (Laudon & Traver, 2016). If another company that has an account with the company asks for personal information, one calls their customer service number to confirm their request. Before the disposal of a computer, wipe utility software is used to overwrite the hard drive. When changing mobile devices, transfer of information to the new device is only right. Utilizing encryption software to scramble what is sent over the internet is recommendable. Ultimately, the company needs strong passwords by using both numbers and letters (Laudon & Traver, 2016).
For an e-business, encryption is sufficient for access by a sender and intended recipients. Digital signatures confirm the sender’s identity. Digital certificates authenticate these signatures that a certificate authority has digitally signed (Wirtz et al., 2016). Certification depends on the certifying authority and level of certification. Installation of firewall, anti-spyware, and antivirus is good practice. The employees are always to log off when they finish working while the feature that saves username and password is deactivated so that it becomes hard to get personal information in case a company’s laptop is stolen.
The medium-sized grocery is to undergo global expansion, bearing in mind that security increases and the IT assets protected. A model that enforces the CIA triad is paramount for the success of this objective (Wirtz et al., 2016). The model should be capable of controlling access whether in transit or storage. For this to happen, a system configuration is put in place. This arrangement dictates the devices and settings that run the computer. The brick and mortar model is simple and not capable of that function, so it gets less consideration compared to the other two models. An upgrade of the same is necessary. As the store expands globally, millions of shoppers will start flooding the website more often to avoid queues associated with a brick and mortar model.
Expenditure on developing web hosting is a must to cater for busy shoppers who do not have time to visit the physical store (Wirtz et al., 2016). Besides, the products in the physical location of the shop tend to be expensive due to the constant fixed costs. Prospects at all times care for the price. E-commerce and e-business do not have to care for do not pay for salespeople and high-end retail stores, putting them in a better position. The two models only spend a lot on Web2.0 purposes on their sites. Furthermore, online stores order goods from many warehouses dispersed around besides having a wider stock availability.
The model is to ensure that the right people can change the content. E-commerce deals with commercial transactions while e-business conducts the business process (Wirtz et al., 2016). When Dell and Amazon maintain business processes such as email marketing and customer support, it is an e-business affair while buying a flash disk from Amazon falls under e-commerce. It is clear that with e-business, the company has more duties and arguably better security models. This event gives e-business an upper hand.
Finally, as much as the model is to ensure that the company’s data is free from hackers, the owners should be able to access the information when they want. Having standby facilities, bandwidth and data back up, and stand-by facilities is just as necessary (Rust & Kannan, 2016). E-commerce uses ICT to enable activities to enable business, while e-business is business using internet’s help. E-business, therefore, appeals as an interactive environment where managers easily access their data, making it the best candidate towards the global expansion of the store with topnotch security.