Answered You can hire a professional tutor to get the answer.

QUESTION

PLEASE NOTE THE CASES FOR PART B ARE PROVIDED IN ATTACHMENTS Part A: Short-answer Questions (35 marks total) What are the key technologies that

PLEASE NOTE THE CASES FOR PART B ARE PROVIDED IN ATTACHMENTS 

Part A: Short-answer Questions (35 marks total)

What are the key technologies that enable the security of communication systems?  Explain the role of each one and support your answers with examples

Explain the role and importance of Near Field Communications (NFC) in supporting mobile applications and payments.

Explain the difference between symmetric key encryption and public key encryption. Which dimensions of e-commerce security does encryption address?

What is PKI? Why is it important in e-commerce?

What is intellectual property? Why is the copyright of materials on the Internet an important issue?

Identify the major technical challenges companies face when choosing to pursue an m-commerce strategy.

What are the key steps and guidelines that support the ethical dilemmas analysis process? 

Part B: Case Analyses (65 marks total)

For each case, your analysis should be two to three paragraphs in length and should not exceed one page.

Case 1 (20 marks)

Read the case Insight on Technology: Theft and Innovation: The Patent Trial of the Century in your Lesson 10 reading from Laudon & Traver (pp. 664–666 in your e-text) then answer the following questions.

  • Do you agree with the jury finding that Samsung violated Apple’s patents in the Samsung Galaxy design? Justify your answer. (10 marks)

Should “trade dress” patents cover basic shape elements, such as round-cornered squares used for icons? (10 marks)

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question