StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Expanding Electronic Commerce into the Persian Gulf - Research Proposal Example

Cite this document
Summary
This research proposal "Expanding Electronic Commerce into the Persian Gulf" is looking into which specific information security options can best be assimilated by professionals in the Persian Gulf region. The most common kind of information security resource used today is the firewall…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.8% of users find it useful
Expanding Electronic Commerce into the Persian Gulf
Read Text Preview

Extract of sample "Expanding Electronic Commerce into the Persian Gulf"

For example, a long book of essays might represent information, just sitting on a table. But once someone picks up the book, reads it, and integrates and uses its information, it becomes knowledge.

Most firewalls operate within this paradigm in a relatively simple way, but generally, the more expensive a firewall system is, the more sophisticated its applications are. Most common firewalls are rather generalized in their port applications, but an intelligent application-level firewall “can monitor what's happening on port 139 (where password protection occurs) and step in to completely block an offending remote computer… It can automatically ‘black list’ the originating IP address to completely prevent any and all future access from that outsider” (Gibson, 2003). E-commerce professionals will show various security preferences, so the main point of the current investigation is to survey IT professionals in the Persian Gulf so that a consensus on the best security platform can be sought.

Aims
The proposed research will examine some of the most important technology drivers referred to, including e-commerce and e-business, the global economy, knowledge asset management, collaboration, total quality management, and business process redesign, within the Persian Gulf area, with a focus on e-commerce. These technology drivers are important for today’s information systems because they determine levels of innovation and change in the business environment, and represent the establishment of industry standards that represent a new future and new challenges for companies. “When we don't like it, we call it unintended consequences… the outcomes are unplanned and thus unexpected. Such unanticipated outcomes are endemic to all planning, and Information Technology, or I.T., is no exception” (Connolly, 2002). It is important to remember that dedicated professionals are willing to change and adapt to dynamic new technology which can improve network security; therefore, a survey consensus becomes valuable.

Methodology
The proposed methodology is that of a quantitative survey of a set sample including IT professionals in the Persian Gulf area. My main rationale for this choice is that surveys can give a fairly easy-to-get sample of relevant information from a fairly large sample size, while still being very cost-effective to the researcher and giving quality results regarding questions of network security and e-commerce. Although surveys have their drawbacks, in terms of false reports, self-report bias, and other issues, such as participants putting down wrong answers on purpose, surveys can shed a lot of light on issues, particularly in a quantitative study that seeks to measure attitudes and beliefs in a given population or populations. “Surveys can be classified by their method of data collection. Mail, telephone interview, and in-person interview surveys are the most common. Extracting data from samples of medical and other records is also frequently done. In newer methods of data collection, information is entered directly into computers” (Research, 2007). A survey of IT professionals could show various network security preferences, as well as answer important questions of network security and e-commerce in the Persian Gulf.

Resources
• Survey materials
• SPSS statistical software for data analysis
• Survey kiosk
• Disposable storage for the collection of results

Expected outcomes
In terms of the opinion of outcomes, including which of the technology drivers is most important, the proposed research would expect to find that the development of e-commerce and e-business are the most important around the interstices of network security because they represent the most opportunities for business revenue generation using technology in the Persian Gulf today. “They want to feel that they are making a meaningful contribution to their employers and to society. These better-educated employees want their individual and group needs met” (Hellriegel et al., 2006). Generally, the advantages of a self-administered survey are “economy, speed, lack of interviewer bias, and the possibility of anonymity and privacy to encourage more candid responses on sensitive issues” (Babbie, 1995). Surveys can also collect a relatively large amount of information for a relatively low price: Throughout the survey/interview process, the respondents should be able to ask questions about the survey items and also interject information or clarify responses as they see fit, regarding which network security measures they view as most important. Statistics can imply consensus once data is analyzed.

Timeline
• Survey administration and data collection—2 weeks
• Correlation of results—1 week
• Presentation of the final experiment (finalization)—5 days

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(E-Commerce - Firewall and Other Specific Information Security Options Research Proposal, n.d.)
E-Commerce - Firewall and Other Specific Information Security Options Research Proposal. https://studentshare.org/e-commerce/1728003-electronic-commerce-in-the-gulf-countries-and-its-impacts-on-information-security
(E-Commerce - Firewall and Other Specific Information Security Options Research Proposal)
E-Commerce - Firewall and Other Specific Information Security Options Research Proposal. https://studentshare.org/e-commerce/1728003-electronic-commerce-in-the-gulf-countries-and-its-impacts-on-information-security.
“E-Commerce - Firewall and Other Specific Information Security Options Research Proposal”. https://studentshare.org/e-commerce/1728003-electronic-commerce-in-the-gulf-countries-and-its-impacts-on-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Expanding Electronic Commerce into the Persian Gulf

Asian Economic Development

Settlements grew and soon, free trade and strategic location transformed Singapore into a major centre for commerce in the region.... he early 19th century saw the British expanding their dominions in India.... Originally established as a trading post under the British in 19819, Singapore eventually joined the Federation of Malaya after World War II, and emerged as among the Tiger economies of Asia....
11 Pages (2750 words) Essay

The making of the modern Oman since 1970

Oman is one of the few countries with a unique and diverse culture that was able to rapidly transform from its primitive economic status into one of the most modernized country all over the world within a short span of two decades.... (The Washington Times Advertising Department,.... ... ... Back in the 1960s, Oman does not show any slight potential capabilities that could enable the country to reach its current economic success....
15 Pages (3750 words) Essay

The Capabilities and Global Implications of Blockage of Iran

The Strait of Hormuz is a water passage, which allows navigation of commercial ships to move to and from the persian gulf for the transportation of oil.... the persian gulf and Gulf of Oman are linked with the help of this strait.... For safe transportation of oil supply, US has implanted its military forces, so it is well equipped in the gulf region....
59 Pages (14750 words) Research Paper

The Major Differences Between E-Business and Internet Marketing

Internet marketing, (online marketing) refers to marketing and advertising techniques using the email and web to drive continuous sales through electronic commerce.... E-commerce only involves the buying and selling of goods using electronic means.... It attracts technologies like electronic data interchange and internet advertising.... igital marketing is marketing that uses digital electronic gadgets such as tablets, cell phones, personal computers, and smartphones to promote or market goods and services for smooth engagement with shareholders (SIEGEL, 2004 pp....
12 Pages (3000 words) Assignment

The Impact of the growing attention between GCC and China

This project intends to carry out an investigation on the relationship that has emerged and continually existed between the GCC member states, and China for the past decade.... The necessity for this investigation is to understand the importance of the relationship between the two entities.... .... ...
70 Pages (17500 words) Thesis

Contemporary History of Middle East

When British and Russian Empires were in a great tussle to have their control in the Central Asia, which is known as Great Game in history, Alfred Thayer Mahan realized the strategic importance of this region and of the persian gulf as well and called the area the Middle East.... Mahan used this term in his article; 'the persian gulf and International Relations, published in the issue of September 1902 in National Review.... It owed its nourishing to Greek antiquity, synthesizing it with persian and Syrian influences and added valuable contributions in mathematics and music....
13 Pages (3250 words) Assignment

Climate Change in Saudi Arabia

This discussion, Climate Change in Saudi Arabia, outlines that climate Change transpired in the world, due to Global warming.... Greenhouse gases do not allow the heat in the atmosphere to escape.... This results in global warming.... The quantity of greenhouse gases in the atmosphere has increased....
20 Pages (5000 words) Research Paper

Effect of Weather on Operation Desert Storm Event

Waged by Iraq, the military campaign was aimed at gaining political and economic hegemony over the persian gulf region.... The gulf war or the persian war which was between Iraq and the Kuwait allies which were the United States of America and Kuwait led to the liberation of Kuwait from Iraq invaders (Gordon and Bernard, 1995).... The military event popularly known as the first gulf War was a successful U.... he operation desert storm which is also referred to as the first gulf war is said to have been successful according to the United States of America allies in the retaliation response to save Kuwait (Allen, Clinton Berry & Norman, 1991)....
23 Pages (5750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us