Fashion land online business initiative

Assignment Help Basic Computer Science
Reference no: EM133047647

As manager of networks and computing operations for Fashion Land, a retailer of women's clothing and accessories, you have seen the business grow from seven stores in Kansas City to over 100 stores located throughout the Midwest. Fashion Land's marketing research team realizes that the majority of its target customer group-females between the ages of 13 and 35-are regular users of the Web. The researchers have asked you for help in developing an electronic commerce initiative for Fashion Land. Alone, or in a team assigned by your instructor, do the following:

1. Outline a business strategy for Fashion Land's online business initiative. The outline should include a list of specific objectives and the costs and benefits of accomplishing each objective. The outline should also include recommendations regarding what to outsource and what staff should be hired.

2. Prepare a memo that lists and briefly describes the major hardware, software, security, payment processing, advertising, international, legal, and ethical issues that might arise in the development of this electronic commerce site.

Reference no: EM133047647

Questions Cloud

Important for information technology project : Which skills do you think are more important for information technology project managers to possess at various points in their careers
Discuss how innovative technology : Discuss how innovative technology will influence the success of this new business.
Database and occupied lot of marketing : Why is NoSQL become another important approaching for database and occupied a lot of marketing?
Analysis of threats to the organization it system : A hacker obtained the credentials of a Benefit Recovery Specialists' employee to gain access to the insurer's systems
Fashion land online business initiative : Outline business strategy for Fashion Land's online business initiative. describes the major hardware, software, security, payment processing, advertising,
E-commerce retail business selling : You have been appointed to start an e-Commerce retail business selling various merchandise online and accepting credit card payments for them.
Signature themes as identified : What are your top five Signature Themes as identified by the Clifton STRENGTHSFINDER? Which theme resonates with you the most and why?
Performance changes leadership behaviors : Evaluate how organizational performance changes leadership behaviors.
Introduction to computer technology : Define employee privacy/security issue and explain why it could be a risk for organization. Provide specific workplace scenario to illustrate employee privacy

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describing the tool used in linux to schedule tasks

Many system maintenance tasks should be performed at regularly scheduled times. In Linux, it is possible to automate these tasks. For this assignment, write a 2-4 page essay describing the tool used in Linux to schedule these tasks. As part of your d..

  How each control will support the associated policy

Clearly indicate how each policy you suggest will help mitigate similar attacks and how each control will support the associated policy

  Intrusion detection system (ids), and authentication server.

Using the network diagram below, your task is to incorporate the devices on the lower right into the diagram to create a secure corporate network. The devices you need to incorporate into the network diagram include: Web server, ftp server, vulnerabi..

  File Inclusion Vulnerability

Why is is dangerous? What is the difference of low and remote inclusion? What methods can me employed to prevent a security breach?

  A company called fastcabs provides a taxi service to clients

Identify the functional dependencies that exist between the columns of the table in Figure 14.21 and identify the primary key and any alternate key(s) (if present) for the table.

  Efficiency on the link assuming lossless transmission

(a) What is the efficiency on the link assuming lossless transmission?

  Extent of creative destruction likely to differ across

Can the risk of creative destruction be incorporated into a five- forces analysis of an industry?

  Neo-classical model of the typical industrial firm

In a post-Keynesian model and neo-classical model of the typical industrial firm, what determines the price at which output is sold

  What are the time and space efficiencies of your algorithm

Find the maximum total sale price that can be obtained by cutting a rod of n units long into integer-length pieces if the sale price of a piece i units long is pi for i = 1, 2, . . . , n. What are the time and space efficiencies of your algorithm?

  Acme films produces advertisements for cable television

Acme Films produces advertisements for cable television stations. They have two locations in a large metropolitan area. Building 1 contains the administrative, sales, marketing, human resources, development, and graphics departments

  What does an assessor need to understand

What does an assessor need to understand before she or he can perform an assessment? How active is each threat agent?

  Undermine effective risk management in organization

Is effective risk management possible without constructive dialogue? What are the forces that tend to undermine effective risk management in an organization?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd