Term Paper on "Online Businesses"

Term Paper 11 pages (2846 words) Sources: 15 Style: Turabian

[EXCERPT] . . . .

Threats to Online Businesses

The internet has forever changed the manner in which people operate in our society. The internet has also had a profound effect upon the ability of business owners to have instant access to consumers on an international level. As a result, the presence of online businesses has increased dramatically in the past five years. The new influx of online businesses has also resulted in an increase in threats associated with these businesses. The purpose of this discussion is to examine the front-end and back-end threats associated with the online business industry. In addition the research will compare and contrast the strategies of EBay and Amazon in eliminating their losses and gaining market share in the U.S. Let us begin our discussion with a brief overview of online businesses.

Overview of Online businesses

There are now thousands of businesses that are involved in ecommerce. Some of these businesses also have traditional stores, while others such as EBay and Amazon operate solely on the internet. According to an article found in the Journal of International Business Studies, even though the dotcom bust meant the end of many online businesses it did not mean that ecommerce could or would not become a lucrative form of business.

Indeed, companies such as EBay and Amazon have proven that the internet can be a very lucrative place. To this end the article contends that many entrepreneurs choose to conduct business online because of the inherent benefits associated with the internet. For instance, the article posits

The e-commerce corporations (EGGs) are unique in four ways. First, fro
Continue scrolling to

download full paper
m their inception, ECCs have multinational accessibility. Second, EGGs compete not just with domestic firms but also with firms all over the world. Third, these new breed of Internet-based multinationals (ECCs) are largely small or medium sized firms that strategically use complementary assets through networks of partnerships and alliances. Finally, unlike traditional multinationals, EGGs on the Internet have a unique set of advantages based on network resources, open accessibility, innovative entrepreneurship, and information sharing."

Indeed the internet offers businesses a unique set of opportunities to reach customers in an unprecedented manner. Although these opportunities create a platform upon which businesses can become extremely successful, it has also created a plethora of threats. The next section of this discussion will focus on specific threats related to the front-end and back-end systems of online businesses.

Front-end and Back-End System Threats

Every online business has to deal with threats related to how their business is run. One of the primary threats that internet businesses face has to do with front-end and back-end systems. Front-end systems refer to a workstation or group of workstations that supply operators with the ability to network with a large-scale computer system. The back end system refers to business and legacy systems that support inventory, order processing, and receivables for both buyers and suppliers in Business-to-Business ecommerce.

Threats to Front End Systems

According to an article entitled "What is E-commerce," the threats to front end systems include the following Web Server or Internet Connection overload due to unforeseen demand for access causing a loss in performance or problems with the system. This threat to the front end system can lead to a loss if revenues for an online business. This loss of revenue occurs because consumers may choose to do business with another internet company.

Web sites that have the wrong price or product information. This is a threat to online businesses because profits can be eroded if products are sold at a price that is not correct.

Disclosure of private information that is often held within a website. This information could include personal data such as phone numbers, addresses and credit card information. This threat usually exists when security features are not installed properly.

This is perhaps the single most prevalent threat to online businesses, because identity theft is a serious problem that can ruin the credit of the victim. Identity theft is defined as "the practice of using the identity of another to obtain credit. After the identity thief defaults, lenders and credit bureaus attribute the default to the impersonated consumer."

Web pages that have been changed to display obscene or pornographic materials. This can occur when a system is vulnerable and is infiltrated by hackers. These individuals often have the capacity to alter the contents of a web page. When this occurs online businesses can loose customers because they may be offended by the content and never return to the site.

Failure of the web server because of software or hardware is unreliable or because there are operational mistakes. This could cause an online business to loose their reputation because such problems tend to draw a great deal of attention in media outlets.

All of these threats are present for online businesses as it relates to front end systems. There are many tactics that can be used to minimize these threats, but in most cases these threats cannot completely be eliminated. In addition to front end threats, online businesses also have to content with back end threats. According to the article "What is E-commerce" these threats are as follows

Failure to connect front end and back end systems. This can have the effect of causing incorrect or out of date information to be displayed on websites. For an online business this threat means that commitments made to customers cannot be realized.

An unexpected number of transactions from ecommerce web servers degrading the performance of essential internal systems. This threat means that critical business functions will be disturbed and the functions that these systems depend on will also be disrupted.

Internal systems vulnerable to unauthorized access through the internet. This threat means that there will be serious disruption of business through hackers corrupting critical information.

Front-end applications can also be subverted to pass incorrect information to back end systems that makes them functions in ways that are not desirable.

This is a threat because it has the potential to cause important business systems to fail because they can not handle the onslaught of unexpected data.

Vulnerability analysis and assessment tools

To analyze how vulnerable a company is to certain threats, companies perform vulnerability analysis and rely upon certain assessment tools.

As far as vulnerability analysis or risk assessment is concerned, online businesses must use risk management to find out what threats are present and how to reduce the presence of such threats. Vulnerability analysis can be used to measure the risks associated with many different types of threats that an organization may face.

According to the book "Surviving Security: How to Integrate People, Process, and Technology" such an analysis can be utilized to check an organization's system for vulnerabilities and also the likelihood that a vulnerability will be effectively exploited. The analysis of these vulnerabilities should not only include electronic risks, but also physical risks, that might involve an individual using a floppy disk and steal data or modifying the system. The book also explains that Vulnerabilities are the main method a threat event can use to cause harm or loss. According to Charles LeGrand, a vulnerability is the absence of or ineffective implementation of safeguards or controls. For example, the failure to adequately safeguard a known hole in a Web server might allow an attacker or business competitor to shut down your organization's Web server, your main means of revenue."

Also, the author asserts that in addition to analyzing the host- and network-level threats, online businesses should view the applications running on the company's systems, including both Web and e-mail servers. The author also asserts that most successful attacks usually come as a result of mis-configured or un-patched Web servers. This aspect of an analysis guarantees that an organization covers the main points of attack for networks and systems.

Techniques used in Vulnerability Analysis

There are three primary techniques that are used to analyze vulnerability. These techniques include the following Informal Approach- the advantage of this approach is that it requires no additional skills for carrying out the analysis. In addition, this type of analysis can be performed quickly. There are also some disadvantages associated with this approach. For instance, the analysis may be incorrect or skewed because the analysis is ore subjective than objective.

In addition, because the analysis is not detailed some vulnerability may be overlooked.

Baseline Approach -- the primary advantage of this approach is the minimal amount of time and resources that are required. Additionally, this approach features pre-assessed safeguards that are recommended in manuals. Another advantage of this approach is that it provides security across the entire organization. The disadvantage of this approach is that the security levels may be too low or too high.

Detailed risk analysis -- the primary advantage of this approach is that the safeguards are usually justifiable. In addition, there security level prescribed to each level of the system. The primary disadvantage of this type of assessment is the time, effort and expense associated with carrying out such an analysis.

As it relates… READ MORE

Quoted Instructions for "Online Businesses" Assignment:

Research paper should be based on the various issues of corporate threats and vulnerability analysis. An overview of vulnerability analysis and assessment tools should be included. Consult resources outside of a specific companies website and/or self-promotional books that individuals within the company have written. Some key points to include are: 1) select a specific issue or threat within the online business industry 2) research regarding the issue or threat 3) compare and contrast strategies that will allow the business to stop their loss and gain market share in the US. Use Amazon.com, Ebay and other web-based businesses for comparison. Please use Ariel 12 pt. with 1" margins and double spaced.

How to Reference "Online Businesses" Term Paper in a Bibliography

Online Businesses.” A1-TermPaper.com, 2006, https://www.a1-termpaper.com/topics/essay/threats-online-businesses/128375. Accessed 5 Oct 2024.

Online Businesses (2006). Retrieved from https://www.a1-termpaper.com/topics/essay/threats-online-businesses/128375
A1-TermPaper.com. (2006). Online Businesses. [online] Available at: https://www.a1-termpaper.com/topics/essay/threats-online-businesses/128375 [Accessed 5 Oct, 2024].
”Online Businesses” 2006. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/threats-online-businesses/128375.
”Online Businesses” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/threats-online-businesses/128375.
[1] ”Online Businesses”, A1-TermPaper.com, 2006. [Online]. Available: https://www.a1-termpaper.com/topics/essay/threats-online-businesses/128375. [Accessed: 5-Oct-2024].
1. Online Businesses [Internet]. A1-TermPaper.com. 2006 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/threats-online-businesses/128375
1. Online Businesses. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/threats-online-businesses/128375. Published 2006. Accessed October 5, 2024.

Related Term Papers:

Business Plan Dontdatecreeps.com Business Plan

Paper Icon

business plan DontDateCreeps.com

The following pages will focus on detailing certain aspects regarding the future activity of DontDateCReeps.com, an Internet dating website. DontDateCreeps.com intends to enter the Internet dating services… read more

Business Plan 4 pages (1100 words) Sources: 3 Style: MLA Topic: Business / Corporations / E-commerce


Ecommerce the Online Business Idea Term Paper

Paper Icon

ECommerce

The online business idea that I would like to pursue is a resume writing and career consulting business. With the increase importance in resume writing, the decrease ability of… read more

Term Paper 2 pages (413 words) Sources: 0 Topic: Business / Corporations / E-commerce


Business Plan for a Company Business Plan

Paper Icon

Business Plan

IDC Interiors aims to open a small business venture with the aim to attract clients as much as this venture can of both types of customers (residential or… read more

Business Plan 12 pages (3240 words) Sources: 5 Topic: Business / Corporations / E-commerce


Business Research Analysis Case Study

Paper Icon

Business Research Case Study Analysis

No business is an island unto itself and any business that remains isolated will soon be no more. Consumers are becoming more and more fickle… read more

Case Study 6 pages (1572 words) Sources: 6 Style: APA Topic: Business / Corporations / E-commerce


Business Plan for the Farmery Business Plan

Paper Icon

Business Plan

Product Description

Market Analysis

Demographics

Regulatory Environment

Competition

Marketing Plan

Market Penetration Strategy

Advertising Media

Management Plan

Company Organization

Company Philosophy

Personnel Policies

Training

Record Keeping

Manufacturing Plan… read more

Business Plan 15 pages (4066 words) Sources: 15 Topic: Business / Corporations / E-commerce


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!