Discuss the issues of online security breaches that take place while e-commerce marketing and the strategies to resolve it?
This assignment throws a light in the online security breaches that take place while e-commerce marketing and the strategies to resolve it. There are many issues which are faced by the business entities as well as the customers during online transactions and so data protection in very much necessary (Dong, Li and Guo, 2011). A customer relies on the online business portals and provide many informations which should not been done without knowledge. They should always get a firsthand knowledge about the sites and the authenticity of the same. There are many threats which affect a business and hamper its image thus ruining it among the consumers. Thus a business entity should know the strategies well enough to protect their network systems as well as protect the customer information (FASLI, 2007).
Before getting into the detailed study of E-commerce and the security system in the online business, we will first see the meaning of e-commerce means (Javaid, n.d.). It refers to the trading of goods and services via internet (Javaid, n.d.). Major retail stores and many other brands do not have big presence in the market. This also applies to the B2B transactions which means between two distributors, suppliers or manufacturers. Usually the presence of web has kept separate from the presence of bricks and mortar, so the transactions are restricted to buying online and supply goods and services (Kannan, Rees and Sridhar, 2007). Online presence is very vital for searching a product which a customer may purchase later in stores. The system of e-commerce is also pertinent to the services industry. But the main issue with e-commerce marketing is security (Kshetri, 2013). Weakest link in the sequence describes the system’s security. The assignment throws a light on the probable security attacks in the e-commerce marketing and the preventive methods to resolve it including the features that one may implement. There are three main components of security such as confidentiality, availability and integrity. Confidentiality is the main factor in the online business which allows only the parties authorized to read the information (Kwangmyung Woo and HYUN SOOK CHO, 2011).
In this technology oriented world, input and output both are very critical and so the management of information security is of prominent priority. On the contrary, internet which has now become the hub of carrying out e-business is by nature an open and non-secure forum. In view of the fact that internet was not meant for commercial reasons, it is by way not designed to tackle transactions. There are innumerable ways that can attack an e-business setup. The common attacks include cracking, hacking, spoofing, eavesdropping, masquerading, Trojan horses, viruses, bombs, etc (Mayayise and Olusegun Osunmakinde, 2014). Thus a business entity and as well as the customers should identify positively and confirm the parties identity with whom they are dealing with. Internet is the medium which is affordable and an effective zone to conduct business, to promote and sell the goods and services. But with this it also provides fraudulent opportunities and unauthorized access to the client data as well as the business. Both privacy and security are the major issues that both e-commerce consumers and shopping sites want (Röhrig and Knorr, 2004). Consumers will not visit or purchase from the sites if these two factors are not present. Similarly the shopping sites will not effectively function without these. The common problem of the recent e-business security execution is that the components of the infrastructure of e-business are likely looked at separately and individually for the security reasons (Palmer, 2010). Currently, the common one is “security policy” which is executed by most of the e-business entity.
Threats to the e-business which is explained in the following:
This ruins the image and has a significant impact on the business. There are financial losses due to litigation or fraud, consequent losses due to undesirable publicity, criminal charges are also faced by the business if it is found that breach of data has been made and finally market share is lost with reduced level of customer base because the confidence of the customers is changed by the attack of DoS.
Strategies to solve the problem:
Along with the retail chain in e-commerce the consumers are the first to get attacked by the online security threats because they are required to provide great amount of information to the shopping websites, thus putting themselves in greater risks. The business organizations should understand the consumer’s privacy so that it can develop in the e-commerce business. The online transactions are easy, convenient and fast so it is important to ensure the privacy of the parties involved in the transactions.
Below mentioned are some of the guiding principle on the security threats that a consumer should keep in mind:
eBay is recently been the victim of the cyber attack which has led to many inactive accounts which was the affected by this breach. The company has told its users to update their passwords so that they can make it safe. This happened around the month of February where it was seen that the hackers have used the internal corporate account of the company so as to spy on the mail addresses, usernames, phone numbers, physical addresses and active passwords but all these were in an encrypted form and so it was able to compromise. It was investigated that the core issue was the users use the same passwords in many other portals which makes the passwords inactive. The bug has revealed much sensitive information of the accounts such as credit card number which was undetected. The company suggested good password management so that these kinds of losses are not repeated.
More recently it was seen that computer hackers have targeted the systems which was made by General Electric for the energy and water companies. The disclosure of information has inherited risks of the public utilities to Internet so as to ensure it is moiré efficient. The hackers want to target control systems of the industry because they can steal more money from the data stolen. This security breach has hit the software system of GE which gives a user interface and controls the systems of the industry in the power and manufacturing plants. This lapse in security which protected the Software of GE has prevented some of its customers from using the products of the company and manages their transactions.
Conclusion
Online shopping sites are being accessed on a daily basis by multiple people. As technology has advanced people have become lethargic to go to the shop and purchase. E-commerce marketing has come as a boon to the masses but with it came the security issues and threats to the customers. Anybody can fall prey of these security issues. A consumer must be aware of the sites and the extent of information they are providing on this sites. Same goes for the business entity, they should protect the information of the customer and keep it private because the consumers rely on these sites while shopping and put their utmost faith on these online traders. The above mentioned threats are to be looked into and the given solutions should be kept in mind (Warkentin and Vaughn, 2006).
References
Dong, Y., Li, W. and Guo, X. (2011). A Study on the Security Issues and Solution of Electronic Commerce. AMR, 219-220, pp.1301-1304.
FASLI, M. (2007). On agent technology for e-commerce: trust, security and legal issues. Knowl. Eng. Rev., 22(01), p.3.
Javaid, M. (n.d.). Cyber Security: Issues and Solutions. SSRN Journal.
Kannan, K., Rees, J. and Sridhar, S. (2007). Market Reactions to Information Security Breach Announcements: An Empirical Analysis. International Journal of Electronic Commerce, 12(1), pp.69-91.
Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electron Commer Res, 13(1), pp.41-69.
Kwangmyung Woo, and HYUN SOOK CHO, (2011). Legal Issues and Proposed Solutions of Electronic Agents in Electronic Commerce. International Commerce and Information Review, 13(1), pp.197-216.
Mayayise, T. and Olusegun Osunmakinde, I. (2014). E-commerce assurance models and trustworthiness issues: an empirical study. Information Management & Computer Security, 22(1), pp.76-96.
Palmer, D. (2010). Ethical issues in e-business. Hershey, Pa.: IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA).
Röhrig, S. and Knorr, K. (2004). Security Analysis of Electronic Business Processes. Electronic Commerce Research, 4(1/2), pp.59-81.
Study on LBS Driven Mobile E-commerce: Key Issues and Technological Architecture. (2012). JDCTA, 6(13), pp.460-469.
Warkentin, M. and Vaughn, R. (2006). Enterprise information systems assurance and system security. Hershey: Idea Group Pub.
진ë™수, and Jaewook Lim, (2012). Impacts of Social Commerce in E-commerce : In perspective of Social Commerce Analysis Model. International Commerce and Information Review, 14(1), pp.389-410.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download