StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Electronic Submission Process and the Security Measures - Assignment Example

Comments (0) Cite this document
Summary
This assignment focuses on the Electronic submission process and its advantages over classic paper solicitations, the security measures associated with it. The assignment determines the value of your most favored customer or class of customers to GSA…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
The Electronic Submission Process and the Security Measures
Read Text Preview

Extract of sample "The Electronic Submission Process and the Security Measures"

Download file to see previous pages  The platforms which are used by the companies for the purpose of taking necessary documents differ according to the requirements. The differences may be in the form of security measure or it may appear in the form of interface display. The technology usually used to carry out electronic submission is Electronic data interchange (EDI). It acts as a platform between several computer applications related to the understanding of the transmitted document. One of the biggest advantages of having electronic submission is that it not only increases the transfer speed but also reduces the cost to a great extent. Moreover, in the physical submission process, there is concern over the management of queue, but such issues have been completely evaded with the implementation of the electronic submission process (Nih, 2005). Although there are several advantages of electronic submission, there are few concerns as well. One of the major problems emerges in the form of security threat. Since the entire process is carried out over the digital networks; there is always a possibility of data theft. Phishing and hacking are the common terms that have been associated with the digital transaction process. However, in order to get rid of these issues, companies or the authorities have taken several measures. One such measure is the implementation of firewall and anti-hacking application, which helps in preventing data loss thereby increasing the safety and security to a large extent. It has a number of advantages over the paper systems. It reduces the cost of a company by providing an alternative to replace information flow that required a number of resources such as paper materials, human resources, faxes, etc. In this context, only having internet connection will serve the purpose and that too in an eco-friendly way. The data storage is comparatively easier as it is stored electronically. Furthermore, EDI also allows searching, sorting, and retrieval of information. The number of errors can be reduced to a significant level and data can be organized properly. Analyze whether or not your company has as much of a chance of having its bid accepted as a much larger corporation (e.g., Boeing) does. Support your analysis. The study will now undertake an investigation of the chance of the company to win the bid. The acceptance of the bid is directly dependent upon the offerings which will be made. However, there is always a chance to get an upper hand over the competitors for being a small company. A number of studies have shown that companies which are small, often getting a number of benefits. On the contrary, a large organization does not get any special type of advantages. The benefits come in the form of government subsidies. In addition, the government has initiated several programs that support the development of small businesses. The government of the US is also enthusiastic in uplifting small business ventures. This gives a great opportunity for the company to have its bid accepted by the government. However, the company also needs to ensure that the offer made suits the requirement and the price offered is also acceptable.  A solicitation response can be deemed as a persuasive argument which is used for responding to the foundation, agency, company or any other concerned authority.  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Electronic Submission Process and the Security Measures Assignment, n.d.)
The Electronic Submission Process and the Security Measures Assignment. Retrieved from https://studentshare.org/macro-microeconomics/1483629-gsa-wants-you
(The Electronic Submission Process and the Security Measures Assignment)
The Electronic Submission Process and the Security Measures Assignment. https://studentshare.org/macro-microeconomics/1483629-gsa-wants-you.
“The Electronic Submission Process and the Security Measures Assignment”, n.d. https://studentshare.org/macro-microeconomics/1483629-gsa-wants-you.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The Electronic Submission Process and the Security Measures

Homeland Security Measures

...? Homeland Security Homeland Security For the past few years, the United s national infrastructure has been threatened by various internet attacks, also known as computer hackers. These hackers generate a virus into the system, which deletes, corrupts or steals private data, creating security concerns for the related company. The U.S. infrastructure is vulnerable to such man made cyber-crime from both domestic and international enemies. This has been made possible by the huge growth of the internet all around America, and the ever-growing dependence of the national setup on the internet. This has remarkably revolutionized the basic framework, but has created numerous security threats at the same time. Unfortunately, both the state and out...
3 Pages (750 words) Essay

Security in Electronic Voting Systems

... Task Security in Electronic Voting Systems Introduction Voting is all about data collection and accuracy, with time and cost being an important factor in the terms of efficiency. Electronic voting uses computerized equipment in the process of vote casting. Electronic voting systems seek to reduce time consumption during any type of voting and increase participation (Liaw, p 108). It also improves the accuracy of results and lowers the cost of conducting elections. There is an advanced online voting system used in universities for teaching and voting, whereby the students vote anytime and anywhere using both fixed and mobile devices such as personal computers, PDAs and smartphones. Though electronic voting systems are highly efficient...
7 Pages (1750 words) Essay

Firewall Security Measures

...1a Layers 3 and 4 of OSI models uses packet filtering as a firewall security measures, with IP address in the packets, and also the ports, used to filter session that are admitted or otherwise drop. On the other hand, OSI layer 7, which is the application layer uses the packet itself as a data to filter session, and uses a application specific filtering like FTP. 1b It is a good practice that whenever we install a new system, we have to test such system in order to know if the system works seamlessly as we expect. Firewall is not exempted to this rule. We have to test firewalls in order for us to know if it really functions to protect our system from intruders. One good decision for testing a firewall is by hiring a third party...
13 Pages (3250 words) Essay

Electronic Office Security Corporation

Question The conversation was natural. This is shown by the first ment made by Ann to attract the attention of JoeBell. Moreover, as the buyer who is at work, Joe is quick to tell Ann to go straight to the purpose of the visit.
Question 2
No she did not ask too many questions. This is shown by the willingness of the buyer to answer the questions asked. The questions were also relevant since they made Ann to convince Joe in seeing the need to purchase the equipment to enhance security in the office.
Question 3
To clearly answer this question an understanding on the meaning of implication, problem, and situation and need pay off question is necessary.
A situation question is used to collect facts. In this context t...
2 Pages (500 words) Assignment

Security Measures Paper

Thesis: With network breaches being inevitable, small, medium, and large organizations must have security plans and standard operation procedures in place to prevent, detect, and respond efficiently to intrusions.
A security plan is a blueprint of the realization of safety objectives. This is a requirement for small and medium companies by also for large companies. In this case, security plan comprises of numerous elements including evaluation, situation assessment, testing, security policy, and implementation all of which work towards preventing and minimizing the possibility of harm resulting from electronic and other resources through malicious actions, accident, error, or natural disaster.
For this organization, situa...
4 Pages (1000 words) Assignment

Cyber Security as the Process of Different Security Measures

...Cyber Security as the Process of Different Security Measures Introduction Cyber Security refers to the process of applying different security measures to foster integrity, confidentiality, and accessibility of data. Cyber Security primarily ensures protection of assets of an organization, including servers, data, buildings, humans, and desktops. Protection of information/data at rest and in transit is the primary goal of cyber security (Singer & Friedman, 2014, pp43). Typically, organizations employ copious countermeasures to ensure safety or security of data, which includes access control, risk assessment, accountability and audit, security authorization, and awareness training. National security, economic vitality, and daily life...
6 Pages (1500 words) Essay

Security Plan- Human, Electronic Information

... the NAA to preserve actual accounts of Australian history by keeping original de-classified documents. As part of the Security Plan for the organization, it is imperative that these legal safeguards for personnel security are properly enforced within the confines of the organization. Further, these new legislations and procedures for citizen identification will be adopted in employee identification processes, in order to make the Personnel security more robust. Physical security measures: The infrastructure of the organization can be subject to attacks. Although not very frequent, they can occur in a variety of business contexts, usually precipitated by the pursuit of huge financial stakes by competitors. The proposed Security Plan...
17 Pages (4250 words) Essay

Future Digital Design Process

As we shape up the interface between the designer and the virtual environment we are naturally going to produce a greater and far better outcome.
It will enable the end-user to be more creative and experimental and explore possibilities that were previously tedious or impossible. The design possibilities of virtuality will enhance the outlook of environments.
Now we can also term it according to the duration it can last. For any new thing, the duration is 10-30 years. If it lasts for 10 it would be popular as a tool another 10 and it would very well be a theory and if it survives all 30 years it will soon be defined as a revolution.
It was the end of the 20th century and the beginning of the 21st century that saw th...
21 Pages (5250 words) Assignment

A Six Stage Model of the Innovation Process

This paper will focus on the relationship and impact and innovation will have on politics. The backbone of the paper will be the strong opinion of Professor Langdon Winner who teaches at the Department of Science and Technology Studies. He has said that “technical things have political qualities” and this paper will base its study on this. “Langdon Winner is a political theorist who focuses on social and political issues that surround modern technological change.” (Brief Biography). When undertaking a serious study of the topic, so many theories and assumptions also begin to emerge that are related to the topic. They include concepts like SCOT, Actor-Network Theory, determinism, closure, and other related f...
9 Pages (2250 words) Case Study

The Relationship Between Security, Risk and Health in a Large Organisation

... environment. The measures required and the role of the security managers are also critically examined taken into consideration the fact that firms tend to perform differently in periods of financial crisis or political instability. Specific strategic options are necessary in order to minimize the risks related with a firm’s security or the health of its employees/ customers. Managers involved in the relevant initiatives need to be appropriately skilled and willing to communicate with employees in order to keep the competitiveness of their firm at high levels. Of course, all managerial plans are likely to face the risk of failure especially under the influence of strong financial turbulences in the local or the international market...
9 Pages (2250 words) Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages (1500 words) Report

Marks and Spencer Organizational Development Process

...Table of Contents Page No INTRODUCTION 2 BODY 2 Anticipating the Need to Change, Problem and Area for Improvement 3 Impact of Organization’s Culture 3 Client and Practitioner Considerations 5 Diagnostic Process and Data Collection 5 Overcoming Resistance to Change 5 Institutionalization Action Plan and Timeline 6 Action Plans, Strategies, and Techniques 7 Specific Intervention Analysis 7 CONCLUSION 8 REFERENCES 9 Introduction: Marks and Spencer is major retail business group having over 125 years of retail business experience. Its operations are widely expanded in domestic and international markets...
7 Pages (1750 words) Case Study

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages (2500 words) Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages (1500 words) Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages (1750 words) Assignment

The Use of Rhetoric in the Electronic Age

The rubric of the rhetorical theory is an extremely contested discipline with classical rhetoric theory focusing on the concept of rhetoric as a form of persuasion or an ideological perspective that asserts “rhetoric’s role in upholding power and domination” over the “general public” as the underlying basis of societal communication (Stacks & Salwen, 2008, p.240). However, the boundaries of the classical rhetorical theory have been challenged by cultural change, context and the permeation of alternative perspectives. 

In particular, the impact of the digital revolution and the growth of numerous multimedia streams on cultural norms has challenged classical theory propounding the fu...
14 Pages (3500 words) Article

Role of the Police and Private Security

...Report to the Legislator - Committee on Crime and Criminal Justice Congratulations on being appointed to the Committee on Crime and Criminal Justice. As a public servant you are holding a very responsible post that covers many areas of administration including the important role of providing security to the citizens of your constituency and to those individuals who visit it. This report will provide you with a clear picture on the role of security agencies with regard to homeland security. Many of the points mentioned here may be new or already known to you, but they are provided here in any case. It is common knowledge that apart from local and organized crime within the United States, the country is now facing new forms of threats like...
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic The Electronic Submission Process and the Security Measures for FREE!

Contact Us