Tuesday, May 5, 2020
Moderating Role Of Perceived Effectiveness -Myassignmenthelp.Com
Question: Discuss About The Moderating Role Of Perceived Effectiveness? Answer: Introducation Many business processes in the 21st Century happen through the internet. The latest web technologies allow for users to look for products online and purchase them with just a click of the button (Fang, Sun, McCole, Ramsey Lim, 2014). Retailers, on the other hand, are allowed to upload and make their products available to users worldwide. BuyIt is a system that has been conceptualized to make these business processes as simple and efficient as possible. BuyIt adheres to all cybersecurity regulations with the goal of keeping user data secure all the time. This management system implements access control strategies together with business continuity plans such as data backups to ensure the system is never compromised. The main objective of BuyIt is to provide a reliable marketplace for sellers and buyers to list, sell and purchase products. BuyIt also aims at augmenting business revenue from an online platform Z Schema Operations The BuyIt schema developed in this paper defines the inputs and output variables which are required by the robust system to complete day to day procedures such as user registration, login, recording user reputation, uploading new products to the portal, searching products, purchasing products and punishing users who have lower reputation levels. The parameters listed below will be utilized in determining the completion of behavior and actions. Email: this is the users email address which will be used for signing in. Password: this is the users private identification text used for authentication during sign in. State: this is the state of the users sign in (Whether Online or Offline) Reputation: Utilized in determining the status of a user. Status: This is the usability of the user, i.e. whether Active or Blocked Six alert point: This represents a serious alert that the user account has been declined or blocked The precondition in this schema is that the username and email are not already in the BuyIt database that is name? known email? known. If the same email or username is found existing in the BuyIt database, the user will be asked to provide different credentials. After registering to the system using a unique email and a strong password, the user will have to log in so as to gain access to the various modules. Every online business in this technological times must management perfect security strategies in order to ensure that the CIA triad is achieved. The CIA triad stands for is Confidentiality, Integrity, and Availability. Large business enterprises are always a target for cybercriminals. In order to help prevent a data breach and user impersonation, BuyIt has deployed a perfect access control technology that ensures that every user must be authenticated before using the BuyIt services. The user password and email are encrypted in the database in order to keep the confidentiality of data even when the database is accessed by cybercriminals. The login schema below illustrates the sign in process Before a product is seen by a potential buyer, it must be uploaded by the seller with its subsequent specifications. In the schema below, the seller must indicate the price, location, and specification of the product in order to successfully upload it. This is clearly noted by the predicate conditions in the schema, e.g. price? = not null, condition? = not null (Bowen, 2016). Upload Product Details The upload product schema below allows for input from the user on elements like PRODUCTNAME, PRODUCTSPECIFICATION, PRODUCTCONDITION, PRICE, and POSTAGE location. The preconditions on this schema are that the user must provide the PRODUCTPRICE, PRODUCTSPECIFICATION, and PRODUCTCONDITION in order for their new product to be uploaded successfully. Search for a product The BuyIt web application software is a large information system that will keep records of several user products from all domains. Therefore, when a buyer wants to purchase, they will not have to spend their lifetime scrolling through all the available products on the portal. We have implemented a function that will assist users to search for the product they want by using three keywords: PRODUCTNAME, PRODUCTPRICERANGE, and the PRODUCTLOCATION. In the schema, there are a few pre-conditions. The PRODUCTNAME must be known, the PRICERANGE must be known, and the LOCATION must be known as well. These items must be found in their respective arrays in order to guarantee a successful search. Alert Schema This is where the status of a user is changed whenever they undertake unlawful actions, or their reputation is lower than 1. Purchasing products Users are able to make purchases using their credit card numbers. The system will calculate the amount needed for payment. The pre-conditions here are that the credit card balance is not less than the total cost of the product and the user must be active to purchase an item (Bowen, 2016)). Further, the item quantity status must be available. Update Reputation Every time a purchase is made, the seller and buyer will be prompted to give the reputation score of their correspondent. The score should be 0 and 5. When the score of a user is less than 1, they are blocked from using the system. Punishing a user Reput_buyer! And reput_seller! In the schema below is the output of the users reputations. If the reputation falls below 1, the status of the user changes to blocked (user_stat = blocked) References Bowen, J. P. (2016). The Z Notation: Whence the Cause and Whither the Course?. In management Trustworthy Software Systems(pp. 103-151). Springer, Cham. Fang, Y., Qureshi, I., Sun, H., McCole, P., Ramsey, E., Lim, K. H. (2014). Trust, Satisfaction, and Online Repurchase Intention: The Moderating Role of Perceived Effectiveness of E-Commerce Institutional Mechanisms.Mis Quarterly,38(2).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.