Term Paper on "Online Businesses"
Term Paper 11 pages (2846 words) Sources: 15 Style: Turabian
[EXCERPT] . . . .
Threats to Online BusinessesThe internet has forever changed the manner in which people operate in our society. The internet has also had a profound effect upon the ability of business owners to have instant access to consumers on an international level. As a result, the presence of online businesses has increased dramatically in the past five years. The new influx of online businesses has also resulted in an increase in threats associated with these businesses. The purpose of this discussion is to examine the front-end and back-end threats associated with the online business industry. In addition the research will compare and contrast the strategies of EBay and Amazon in eliminating their losses and gaining market share in the U.S. Let us begin our discussion with a brief overview of online businesses.
Overview of Online businesses
There are now thousands of businesses that are involved in ecommerce. Some of these businesses also have traditional stores, while others such as EBay and Amazon operate solely on the internet. According to an article found in the Journal of International Business Studies, even though the dotcom bust meant the end of many online businesses it did not mean that ecommerce could or would not become a lucrative form of business.
Indeed, companies such as EBay and Amazon have proven that the internet can be a very lucrative place. To this end the article contends that many entrepreneurs choose to conduct business online because of the inherent benefits associated with the internet. For instance, the article posits
The e-commerce corporations (EGGs) are unique in four ways. First, fro
download full paper ⤓
Indeed the internet offers businesses a unique set of opportunities to reach customers in an unprecedented manner. Although these opportunities create a platform upon which businesses can become extremely successful, it has also created a plethora of threats. The next section of this discussion will focus on specific threats related to the front-end and back-end systems of online businesses.
Front-end and Back-End System Threats
Every online business has to deal with threats related to how their business is run. One of the primary threats that internet businesses face has to do with front-end and back-end systems. Front-end systems refer to a workstation or group of workstations that supply operators with the ability to network with a large-scale computer system. The back end system refers to business and legacy systems that support inventory, order processing, and receivables for both buyers and suppliers in Business-to-Business ecommerce.
Threats to Front End Systems
According to an article entitled "What is E-commerce," the threats to front end systems include the following Web Server or Internet Connection overload due to unforeseen demand for access causing a loss in performance or problems with the system. This threat to the front end system can lead to a loss if revenues for an online business. This loss of revenue occurs because consumers may choose to do business with another internet company.
Web sites that have the wrong price or product information. This is a threat to online businesses because profits can be eroded if products are sold at a price that is not correct.
Disclosure of private information that is often held within a website. This information could include personal data such as phone numbers, addresses and credit card information. This threat usually exists when security features are not installed properly.
This is perhaps the single most prevalent threat to online businesses, because identity theft is a serious problem that can ruin the credit of the victim. Identity theft is defined as "the practice of using the identity of another to obtain credit. After the identity thief defaults, lenders and credit bureaus attribute the default to the impersonated consumer."
Web pages that have been changed to display obscene or pornographic materials. This can occur when a system is vulnerable and is infiltrated by hackers. These individuals often have the capacity to alter the contents of a web page. When this occurs online businesses can loose customers because they may be offended by the content and never return to the site.
Failure of the web server because of software or hardware is unreliable or because there are operational mistakes. This could cause an online business to loose their reputation because such problems tend to draw a great deal of attention in media outlets.
All of these threats are present for online businesses as it relates to front end systems. There are many tactics that can be used to minimize these threats, but in most cases these threats cannot completely be eliminated. In addition to front end threats, online businesses also have to content with back end threats. According to the article "What is E-commerce" these threats are as follows
Failure to connect front end and back end systems. This can have the effect of causing incorrect or out of date information to be displayed on websites. For an online business this threat means that commitments made to customers cannot be realized.
An unexpected number of transactions from ecommerce web servers degrading the performance of essential internal systems. This threat means that critical business functions will be disturbed and the functions that these systems depend on will also be disrupted.
Internal systems vulnerable to unauthorized access through the internet. This threat means that there will be serious disruption of business through hackers corrupting critical information.
Front-end applications can also be subverted to pass incorrect information to back end systems that makes them functions in ways that are not desirable.
This is a threat because it has the potential to cause important business systems to fail because they can not handle the onslaught of unexpected data.
Vulnerability analysis and assessment tools
To analyze how vulnerable a company is to certain threats, companies perform vulnerability analysis and rely upon certain assessment tools.
As far as vulnerability analysis or risk assessment is concerned, online businesses must use risk management to find out what threats are present and how to reduce the presence of such threats. Vulnerability analysis can be used to measure the risks associated with many different types of threats that an organization may face.
According to the book "Surviving Security: How to Integrate People, Process, and Technology" such an analysis can be utilized to check an organization's system for vulnerabilities and also the likelihood that a vulnerability will be effectively exploited. The analysis of these vulnerabilities should not only include electronic risks, but also physical risks, that might involve an individual using a floppy disk and steal data or modifying the system. The book also explains that Vulnerabilities are the main method a threat event can use to cause harm or loss. According to Charles LeGrand, a vulnerability is the absence of or ineffective implementation of safeguards or controls. For example, the failure to adequately safeguard a known hole in a Web server might allow an attacker or business competitor to shut down your organization's Web server, your main means of revenue."
Also, the author asserts that in addition to analyzing the host- and network-level threats, online businesses should view the applications running on the company's systems, including both Web and e-mail servers. The author also asserts that most successful attacks usually come as a result of mis-configured or un-patched Web servers. This aspect of an analysis guarantees that an organization covers the main points of attack for networks and systems.
Techniques used in Vulnerability Analysis
There are three primary techniques that are used to analyze vulnerability. These techniques include the following Informal Approach- the advantage of this approach is that it requires no additional skills for carrying out the analysis. In addition, this type of analysis can be performed quickly. There are also some disadvantages associated with this approach. For instance, the analysis may be incorrect or skewed because the analysis is ore subjective than objective.
In addition, because the analysis is not detailed some vulnerability may be overlooked.
Baseline Approach -- the primary advantage of this approach is the minimal amount of time and resources that are required. Additionally, this approach features pre-assessed safeguards that are recommended in manuals. Another advantage of this approach is that it provides security across the entire organization. The disadvantage of this approach is that the security levels may be too low or too high.
Detailed risk analysis -- the primary advantage of this approach is that the safeguards are usually justifiable. In addition, there security level prescribed to each level of the system. The primary disadvantage of this type of assessment is the time, effort and expense associated with carrying out such an analysis.
As it relates… READ MORE
Quoted Instructions for "Online Businesses" Assignment:
Research paper should be based on the various issues of corporate threats and vulnerability analysis. An overview of vulnerability analysis and assessment tools should be included. Consult resources outside of a specific companies website and/or self-promotional books that individuals within the company have written. Some key points to include are: 1) select a specific issue or threat within the online business industry 2) research regarding the issue or threat 3) compare and contrast strategies that will allow the business to stop their loss and gain market share in the US. Use Amazon.com, Ebay and other web-based businesses for comparison. Please use Ariel 12 pt. with 1" margins and double spaced.
How to Reference "Online Businesses" Term Paper in a Bibliography
“Online Businesses.” A1-TermPaper.com, 2006, https://www.a1-termpaper.com/topics/essay/threats-online-businesses/128375. Accessed 5 Oct 2024.
Related Term Papers:
Business Plan Dontdatecreeps.com Business Plan
business plan DontDateCreeps.com
The following pages will focus on detailing certain aspects regarding the future activity of DontDateCReeps.com, an Internet dating website. DontDateCreeps.com intends to enter the Internet dating services… read more
Business Plan 4 pages (1100 words) Sources: 3 Style: MLA Topic: Business / Corporations / E-commerce
Ecommerce the Online Business Idea Term Paper
ECommerce
The online business idea that I would like to pursue is a resume writing and career consulting business. With the increase importance in resume writing, the decrease ability of… read more
Term Paper 2 pages (413 words) Sources: 0 Topic: Business / Corporations / E-commerce
Business Plan for a Company Business Plan
Business Plan
IDC Interiors aims to open a small business venture with the aim to attract clients as much as this venture can of both types of customers (residential or… read more
Business Plan 12 pages (3240 words) Sources: 5 Topic: Business / Corporations / E-commerce
Business Research Analysis Case Study
Business Research Case Study Analysis
No business is an island unto itself and any business that remains isolated will soon be no more. Consumers are becoming more and more fickle… read more
Case Study 6 pages (1572 words) Sources: 6 Style: APA Topic: Business / Corporations / E-commerce
Business Plan for the Farmery Business Plan
Business Plan
Product Description
Market Analysis
Demographics
Regulatory Environment
Competition
Marketing Plan
Market Penetration Strategy
Advertising Media
Management Plan
Company Organization
Company Philosophy
Personnel Policies
Training
Record Keeping
Manufacturing Plan… read more
Business Plan 15 pages (4066 words) Sources: 15 Topic: Business / Corporations / E-commerce
Sat, Oct 5, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!