Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Amount sold by each salesperson
The table presented below shows the sales for each sales person.
The pivot table presented above shows a summary of the total amount that is sold by each salesperson. The total sales were: $2,650 for Albertson, Kathy, $3,700 for Brennan, Michael, $1,935 for Davis William, and $400 for Dumlao Richard. The total sales amounted to $8,685. The table presented below shows the total monthly sales.
The results show that the total sales for the month January amounted to $5,175, $2,160 for February, and $1,350 for March.
Security measures
The first security measure that is available for protecting the customer is the encryption of the online store. For an electronic commerce website to be secure, it should provide safe transactions using various tools such as secure electronic transaction protocol (SET), secure sockets layer (SSL), or other types of encryptions (Rich 135). These encryption forms should accept and process the personal data of the clients without the data being breached or unintentionally made available to the public and other forms of security threats. Therefore, the technology of encryption helps in protecting the personal information of the consumers, especially during the checkout process (Becker 161).
One significant advantage of this measure is that it helps the customers to protect sensitive information. Also, the customers have a better idea of the persons or companies they are trusting with their personal data. A significant drawback of this measure is that communication with SSL encryption is relatively slow. This is based on the fact that there is a two-way communication that slows down the network and reduces the speed of response of the runtime server (Sadeghi 157).
The second security measure is two-step authentication. In this case, two bits of information are needed for every attempt of login. In most cases, websites require the use of an account password and a single-use verification code that is received through SMS or other recommended applications. Another example of the extra layer of security is the use of fingerprints in addition to passwords.
An advantage of this measure is that it provides a higher level of security. A disadvantage is that it does not work with a number of applications. Besides, the process of two-step authentication is quite long and cumbersome because customers are compelled to fill in security information twice. From the company’s point of view, this measure is expensive to implement.
The third measure is the use of a password manager. In most cases, customers often reuse passwords, or they use simple passwords because they are easy to remember (Parsons 71). However, when the security of the customer and the entire business is at stake, the use of simple or reused passwords may not help. Therefore, password managers work by creating strong passwords. Besides, they store the created passwords in an encrypted vault that has a single master password. This enables the customers to easily access their details (Rezaul 429).
An advantage of this security measure is that it ensures that customers have passwords that cannot be cracked easily. Besides, they will have a unique password for every website that they visit. Also, all their passwords will be managed easily. This eliminates the risks that are associated with the use of simple passwords. One drawback of the password manager is that they do not work on all websites. Therefore, customers may be compelled to create simple passwords for such websites (Mjolsnes 135).
Works Cited
Becker, Ann. Electronic Commerce: Concepts, Methodologies, Tools, and Application, New York: IGA Global, 2007. Print.
Mjolsnes, Stig. Technology and Practice of Passwords: International Conference on Passwords, PASSWORDS’14 Trondheim, Norway, December 8-10, 2014, Revised Selected Papers, Germany: Springer, 2015. Print.
Parsons, June. New Perspective Computer Concepts 2016 Enhanced, Comprehensive, Boston: Cengage Learning, 2016. Print.
Rezaul, Karim. Strategic and Pragmatic E-Business: Implications for Future Business Practices, New York: IGI Global, 2012. Print.
Rich, Jason. Design and Launch an E-Commerce Business in a Week, US: Entrepreneur Press, 2008. Print.
Sadeghi, Ahmad-Reza. Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, 2013, Revised Selected Papers, Germany: Springer, 2013. Print.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.