This report depicts the importance of developing proper E-commerce website for any business organization to grab more number of consumers and at the same time to gain competitive advantages and commercial revenue. For this particular report the four nominated companies are twitter, Google, Facebook and Apple. These are four well-known online social media platform whose website and overall E-commerce based business approaches are completely secured and protected from the external attack.
After comparing the websites developed by four of these social media platform individually it has been found that, the privacy and privacy protection features adopted by these companies are different from each other. The list of privacy protection details and policies those the companies are to be adopted for gang successful commercial revenue re also elaborated in this report. For proper market followers the companies are needed to focus on relevant marketing strategies and theories as well. The details of marketing theories and strategies are also illustrated in this report. After considering the list of privacy features of two of these websites a justification on relevant theories for these companies are done accordingly. It is the role of the website developers to design the website considering all security privacy and policies.
Introduction to privacy and privacy protection features
After analyzing the details privacy protection features of these social media platform it has been found that, for these companies the privacy and security features are different from each other. It is not mandatory that, for the websites the number of pages will be same thus the for different pages the privacy protection are different. The website home pages generate their own privacy policy to avoid unauthorized information access. However, no accuracy and adequacy of these tools are available in every situation of the website access and development. There are different legal questions those widely arise with these websites that are also resolved with the privacy policy details. From the recent privacy approaches and protection mechanism it has been found that, there are many modern prcatices those are followed by the website developers for processing the card and not the transactions.
The detail description of both product and services will increase the numbers simultaneously. The transformational developments are swirling around the banking industry (Acquisti, Brandimarte and Loewenstein 2015). It is very much important for the website developers to keep their private information secured from the external users. Privacy policy is referred to as simple documents that disclose certain or even all the ways that should be adopted for using the gathered information respectively in the accurate locations. The privacy policy is not everyone but for all the users.
The possible security issues will be resolved completely with the successful implementation of the privacy policy.
The privacy policies for similar different types of organizations differ a lot from each other. In order to gain business success from the competitive market it is necessary for the developers to adopt the most suitable privacy policy (Hajli and Lin 2016). The comparisons between four websites from similar industry are illustrated as follows:
Privacy policy of Amazon
The information received and stored from the users on the Amazon website are customized (Reidenberg et al. 2015). The details of the products and the services will be accessed by the users only when the users will register them to the website. Only when the users will install the Amazon app, they will be able to add products to their cart for successful secured online shopping. The other privacy details for this company are as follows:
Privacy policy of Flipkart
Privacy policy of eBay
The aim of eBay online shopping platform is to connect people from different and make the world much open in nature. The privacy policy of Facebook does not differ much from Apple. Apple can point out the way through which they can minimally store the information of the consumers (Wang et al. 2014). Privacy is referred to as an important part of the online shopping portal to keep the private information of the users secured from the unauthenticated users. The corporate entities and the internal service providers of eBay follow the basics of legal security approaches.
Privacy policy of Make My Trip
Name of the websites |
Features |
Ratings |
Flipkart |
· Flipkart is structured and committed to their privacy · The Information stored and required to be accessed by the users are all encrypted with high level of security. · Due to encryption the bill payment and messages can be kept in a much secured way. · Biometrics and face detection are the two different approaches those can be used for securing the information. · The health and fitness privacy are others (Cai, et al. 2014). |
1 |
Ebay |
· Information customization is available for the (Perera et al. 2015) · The banking and financial details of the consumers are also stored in the server with high level security. |
3 |
Amazon |
· Multiple numbers of accounts can be created and managed by a single user · The basic accounts information of the account holders are always secured from the externals (Dong, Cheng and Wu 2014). · The application programming interface can secure the technology used by the account holders · Direct messages and non-public communication are the other security policies available in case of account holders. |
4 |
Make My Trip |
· High level security to the personal information of the users · The concerns can be submitted regarding the privacy policy through email · Gives permission and access to only the authorized information |
2 |
Conclusion – privacy and organization’s privacy policies
Privacy policy is referred to as important part for any Ecommerce business. It is the responsibility of the website developer to design the website in such a way so that it can posses all mandatory security mechanisms. With the privacy protection policy the confidence of the consumers will automatically enhanced and the chances of occurrence of the legal risks will also minimized (Sicari et al. 2014). Even the chance for the information disclosure also gets minimizes largely. In order to design the privacy policy for any business organization the main components on which the companies are to focus are as follows. Initially a privacy audit should have to be conducted and accordingly and the elements of the privacy policy notice should comprise of notice, access and accuracy, data security and integrity, redress and enforcement, policy revision and posting the privacy policies etc. Even after the final publish of the privacy policy the revision of the policy is another important thing that should have to be considered by the organizational owners (Riquelme and Román 2014). As the privacy law or these companies are designed for the website or electronic communication platform thus the organizations should consider the privacy action on liability of online profiling. The pending legislations are also should be generalized accordingly.
After analyzing the question arises for the competitive advantages it has been found that, generating high rating sales is an important thing that has to be considered for the market level success and commercial revenue as well (Urueña, Muñoz and Larrabeiti 2014). There are different ways through which the commercial revenue and the competitive advantages can be gained from the market place.
When it comes to have a competitive advantage, the firms are always looking for generating high sales of market share over its competitors (Sicari et al. 2015). Competitive benefit can be gained by many ways in terms of low cost by providing functional products or services as well. The other type of competitive advantage is the first mover. The first mover is termed as a firm being the first one to move into a particular market with the services or product. There are major advantages and risks involved being the first mover (Riquelme and Román 2014). Market followers are very much crucial firms which enter into a known market which has been well established. The organizations would start off with a smaller market share but are able to gain market level revenue.
The market followers are able to carefully study the market and customer trends before entering into the market. The most important aspect is that the market followers are able to learn from the experiences of the first movers and may not need to incur high research and development cost if they are able to create similar products on their own (Urueña Muñoz and Larrabeiti 2014). The market followers have an advantage to bring the first mover’s product from the position market to the loads.
Without any doubt it can be said that, the profit for the first mover are very much aggressive in nature for the market followers. The concept presents different kinds of opinions regarding the ways to achieve success in the market. There are no such concrete strategies used for the successful development of the business objectives in terms of business prosperity and entrepreneurship (Karkin and Janssen 2014). There are certain methods and techniques available those are appeared to be very much beneficial for some of the business organization. With the help of this technique the most suitable approach for the business success can be identified by the project managers and the business analysts as well. The business level issues and the problems can be completely resolved with the help of the proper adoption and application of the business strategies. Within the business environment the first mover profit is referred to as an important key approach that exists from the very beginning. Before entering to the business market first different market level strategies are to be adopted by the business analyst.
The successful business strategy is always considered as a precondition of success for a number of reasons. In order to begin with, the company which is capable to increase the sales fast is talented to significantly reduce cost of the products (Riquelme and Román 2014).
It enables this organization to furnish clients with to a great degree focused costs, consequently, expanding own deals and making an intense hindrance to passage for potential market participants (Martínez-Pérez et al. 2015). Plus, low item cost enables organizations to keep up higher overall revenue and get more benefits. Surplus assets can be utilized for encourage advancement and compelling improvement that would additionally build deals and drive the organization’s development.
For instance, Amazon entered the market with an advancement model of online book exchanging that had all the earmarks of being effective, pulled in a considerable measure of customers and made Amazon one of the most grounded organizations forming the cutting edge universe of business. Besides, first-mover advantage is firmly associated with a “Spead-Leader Strategy” presented by (Sicari et al. 2015). As indicated by this methodology, it is critical to have a period lead contrasted with contenders and productively acknowledge it executing imperative designs throughout everyday life and accomplishing important objectives. Additionally, first-movers can profit by the expectation to absorb information impact. It is frequently said that a first-mover can keep up its prosperity if a secure of its introduced base is accomplished. Secure makes it to a great degree troublesome for potential and existing contenders to take away a piece of the overall industry.
After analyzing the details ecommerce services offered by Lazada and RedMart it has been found that, Lazada has set to acquire the well known Singaporean grocery startup named as RedMart with the US $40 Million. Lazada has fresh off their US $1 billion injections from Alibaba. Lazada offers all electronics; beauty apparel and home as well as living except those are perishable goods. After details of analysis it has been found that, RedMart quietly puts on the market after its reports to US $21 Million of operating loss in the year of 2015 and 2016. In addition to this it has been suffering for a $126 Million of loss liabilities in this year. Thus, Lazada has been planned to adopt the ideas and privacy and policies of RedMart.
After comparing the theories of market followers and first movers, Lazada has make the acquisition too much confidently with the knowledge that the company can use for the overall cost optimization. Compare to Lazada the business model ad relevant theories applied by HppyFresh, Redmart and honestbee are much fare business models.
The two different Singapore based companies adopted for the analysis are Lazada and RedMart. The privacy policy of two of these websites are completely different from other, However after analyzing two of the websites and their details display details it has been found that, the dashboard security and privacy policy developed for the RedMart are much secured than Lazada. Thus, the overall revenue and the commercial profit for the RedMart are also higher than other Singapore based companies. With this successful joining Lazada will be able to join already fierce online grocery feud.
Conclusion
From the overall discussion it can be concluded that, with the successful implementation of proper privacy and protection policies the issues that different business organizations may face will be completely resolved. The increased and high level security of the websites will help to grab more number of consumers from different geographical boundaries. Due to high security guidelines and policies the companies will be able grab more number of consumers from different locations. The security policies for different websites are different. The design difference in the website also varies a lot. A comparison on both of the websites for Lazada and RedMart are also illustrated in this report.
References
Acquisti, A., Brandimarte, L. and Loewenstein, G., 2015. Privacy and human behavior in the age of information. Science, 347(6221), pp.509-514.
Cai, X., Nithyanand, R., Wang, T., Johnson, R. and Goldberg, I., 2014, November. A systematic approach to developing and evaluating website fingerprinting defenses. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 227-238). ACM.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Metayer, D.L., Tirtea, R. and Schiffner, S., 2015. Privacy and Data Protection by Design-from policy to engineering. arXiv preprint arXiv:1501.03726.
Datta, A., Tschantz, M.C. and Datta, A., 2015. Automated experiments on ad privacy settings. Proceedings on Privacy Enhancing Technologies, 2015(1), pp.92-112.
Dong, T.P., Cheng, N.C. and Wu, Y.C.J., 2014. A study of the social networking website service in digital content industries: The Facebook case in Taiwan. Computers in Human Behavior, 30, pp.708-714.
Feng, Y. and Xie, W., 2014. Teens’ concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior, 33, pp.153-162.
Hajli, N. and Lin, X., 2016. Exploring the security of information sharing on social networking sites: The role of perceived control of information. Journal of Business Ethics, 133(1), pp.111-123.
Karkin, N. and Janssen, M., 2014. Evaluating websites from a public value perspective: A review of Turkish local government websites. International Journal of Information Management, 34(3), pp.351-363.
Martínez-Pérez, B., De La Torre-Díez, I. and López-Coronado, M., 2015. Privacy and security in mobile health apps: a review and recommendations. Journal of medical systems, 39(1), p.181.
Perera, C., Ranjan, R., Wang, L., Khan, S.U. and Zomaya, A.Y., 2015. Big data privacy in the internet of things era. IT Professional, 17(3), pp.32-39.
Reidenberg, J.R., Breaux, T., Cranor, L.F., French, B., Grannis, A., Graves, J.T., Liu, F., McDonald, A., Norton, T.B. and Ramanath, R., 2015. Disagreeable privacy policies: Mismatches between meaning and users’ understanding. Berkeley Tech. LJ, 30, p.39.
Riquelme, I.P. and Román, S., 2014. Is the influence of privacy and security on online trust the same for all type of consumers?. Electronic Markets, 24(2), pp.135-149.
Schaub, F., Balebako, R., Durity, A.L. and Cranor, L.F., 2015, July. A design space for effective privacy notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)(pp. 1-17).
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, pp.146-164.
Turow, J., Hennessy, M. and Draper, N.A., 2015. The tradeoff fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation.
Urueña, M., Muñoz, A. and Larrabeiti, D., 2014. Analysis of privacy vulnerabilities in single sign-on mechanisms for multimedia websites. Multimedia Tools and Applications, 68(1), pp.159-176.
Wang, T., Cai, X., Nithyanand, R., Johnson, R. and Goldberg, I., 2014, August. Effective Attacks and Provable Defenses for Website Fingerprinting. In USENIX Security Symposium (pp. 143-157).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download