Research Paper on "Internet Technology Marketing and Security"
Research Paper 5 pages (1563 words) Sources: 5
[EXCERPT] . . . .
Zappo's Security BreachZappos' Security Breach
Assessing the Zappos' Security Breach:
Lessons Learned for Making eCommerce More Secure
In the first month of this year, 2012, online shoe retailer Zappos' now a business unit of Amazon, experienced a security breach that was initiated from a distribution center located in Kentucky. The nature of the breach shows how vulnerable the retailer's systems are to employees who choose to break in and attempt successfully to gain access to customer records. It also showed how vulnerable the entire Amazon.com e-commerce system is attacks originating from internal servers. The hacker, an employee, gained access to over 24 million Amazon.com and Zappos' customer records. Despite having sophisticated 128-bit encryption on these systems, the hacker was able to bypass internal systems with knowledge of how the distribution center staff had constructed firewalls and password conventions. The last four digits of the customers' credit cards were taken, their names, addresses, complete customer histories and approval credit limits of they had obtained Amazon.com credit cards (Letzing, 2012). The security systems had not been upgraded since 2010 when Zappos had been purchased for $800 million by Amazon.com and made a core part of the overall company network (Hsieh, 2010). As Zappos' had superior technologies for logistics planning and execution, supply chain planning and execution, and the ability to orchestrate fulfillment with 3rd party logistics providers, Jeff Bezos made the decision to standardize on Zappos' technologies and websites (McDonald, 2011). Zappos' had also created a unique series of te
download full paper ⤓
Evaluating Zappos' eCommerce and Web Presence
Zappo's strives to create a highly unique customer experience via its website and the many subsections, informational areas, catalog and online ordering applications. The founder and CEO of Zappos' believes that every aspect of their e-commerce systems, platforms and technologies all need to unify and strengthen the customer experience and create interest and enthusiasm for products (Hsieh, 2010). This unifying of technologies to create a common and convincing experience for customers dominates the founder's thinking and approach to constructing new promotions and introducing new product lines into the Zappos' product line (Hsieh, 2010).
The four areas of corporate contact information, customization of products for customers both online and through post-sales processes, support for customer information at purchase and product information are designed on the Zappos' website to enable the customer to selectively define their own approach to learning and buying. Zappos' realizes that each of their customer segments have a different approach to navigating across these four areas, often using them in varying ways depending on the products of interest (Hsieh, 2010). Men also have significantly different approaches to navigating these four areas and often compress the time spent on support and product information, moving more rapidly through transactions. Women and families when shopping together however rely on the more integrated nature of these four sections of the website, often evaluating specific products and their look using the advanced catalog features that Zappos' invented and has a patent on (McDonald, 2011).
The security model for these four locations on the website are all unified in a common security architecture that ensure single sign-on and the use of authentication to the user account level in real-time (Shine, 2012). This enterprise-wide content management system tracks history by item, by application and also stores all previous purchases, often providing recommendations for future products based on what had been bought previously (Tsuruoka, 2012). While many websites have these four sections or subsegments, only Zappos' has created a unified experience using security to unify personalization across each, down to the ability to track shipments in real-time (McDonald, 2011). Zappos has experimented with customizing products within the limits of their supplier's manufacturing capabilities and has run test campaigns that allow customers to choose a broader range of options. This strategy is often referred to as build-to-order (BTO) as the product is created to the specific needs and preferences of the customer (McDonald, 2011). Zappos' also can personalize the pages of each of these four areas, further delivering a highly unique, differentiated shopping experience to their customers as well. All of these factors taken together create a unified customer experience that stays aligned with how customers are also changing how they choose to learn about and buy products. The focus on how to create an effective overall strategy is predicated heavily on the use of analytics across contact information, customization of products, specific locational information and streamlining the purchasing process itself (McDonald, 2011).
Analysis of Zappos' Competitive Advantages and Marketing Strategies
With Memorial Day this weekend (May 23rd) the front page of the Zappos' site is dedicated to a holiday sale, with small catalysts also promoting Clearance Swimwear and Clearance Sandals. Zappos' has also created a series of sliders on their site that take the visitor and customer to specific sale areas as well. All are brightly decorated and clearly designed to evoke activity immediately. There are also multiple areas to opt into the site for specials and for providing additional information to the company to get newsletters and coupons. As Zappos' is the world's leading investor in social Customer Relationship Management (CRM) systems and uses analytics heavily to gain greater insights into customer behavior, it is apparent the site is designed for quickly launching and managing promotional campaigns (Hsieh, 2010). What makes Zappos' unique is that all of the various sales and program items lead to a common series of purchasing screens that vary by interest area and previous purchasing (McDonald, 2011).. The actual check-out process is defined and guided by the personalization history and logic created by the e-commerce platform itself.
Analysis of Zappos' Security and Privacy Strategies
Up until the breach, Zappos' security strategies were based on relatively simple 128-bit encryption that ensured their databases could not be hacked from within a browser session. Based on the analysis completed by AWS when running periodic audits of customer records access, it was determined that the hackers, who were Amazon employees working in the distribution center, had gained access using key logger software (Letzing, 2012). To defeat this potential threat in the future, the logins and password for all systems in the warehouse were changed and authentication to… READ MORE
Quoted Instructions for "Internet Technology Marketing and Security" Assignment:
Kurtz, D. (2010 Update). Contemporary business: 2011 custom edition (13th ed.). Hoboken, NJ: John
Wiley & Sons.
Internet Technology, Marketing, and Security
Select a major corporation that markets and sells through its Web site and which has experienced a
security breach in the past three years.
A 5 PAGE PAPER in which you:
1. Describe and evaluate a major corporation*****s Website in these four areas: (1) product information,
(2) corporation*****s contact information, (3) customization of products for customers, and (4)
customer information at purchase.
2. Describe and evaluate three (3) of the corporation*****s Internet marketing strategies and the
competitive advantages its Website provides.
3. Analyze and evaluate the corporation*****s privacy / security policy and the corporation*****s response to
the security breach.
4. Recommend and provide rationale for two (2) methods and/or tools to ensure greater security for
customers.
Use a minimum of three (3) quality external resources from the last three (3) years to support the
content of the paper. (Note: Do not use Wiki sites.)
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; references must follow APA STLYE.
Apply the core marketing concepts and marketing orientation to develop viable marketing
strategies that fit a variety of market environments, domestic and international.
Analyze information technology applications and the application of decision support systems to
gain a competitive advantage and more effectively control operations.
Use technology and information resources to research issues in contemporary business.
How to Reference "Internet Technology Marketing and Security" Research Paper in a Bibliography
“Internet Technology Marketing and Security.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/zappo-security-breach-zappos/356997. Accessed 6 Jul 2024.
Related Research Papers:
Internet Technology, Marketing, and Security Aer Lingus Essay
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Internet Technology, Marketing, And Security
Aer Lingus is Spanish for 'air' (aer) and lingus (equal). Aer Lingus is a government-owned airline which was founded in the month of April 1936.… read more
Essay 5 pages (1677 words) Sources: 5 Topic: Business / Corporations / E-commerce
Internet Technology Marketing and Security Research Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
INTERNET TECHNOLOGY, MARKETING & SECURITY
Internet Technology, Marketing, and Security
Internet technology, marketing and security
In the modern society, technological advancements have made access to all type of information very… read more
Research Paper 5 pages (1705 words) Sources: 4 Topic: Business / Corporations / E-commerce
Technology Marketing and Security Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Technology, Marketing, And Security
E-activity
Steps to handle bad publicity in Starbucks
No business should welcome bad publicity. How an organization handles bad publicity determines its breaking or making. Appropriate… read more
Term Paper 2 pages (823 words) Sources: 2 Topic: Business / Corporations / E-commerce
Marketing Strategies the Marketing Plan Delivers Marketing Plan
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Marketing Strategies
The marketing plan delivers the various strategies that All Technology Computer will use to enhance competitive market advantages. The paper discusses the company mission statement and the strategies… read more
Marketing Plan 18 pages (5577 words) Sources: 10 Topic: Advertising / Marketing / Sales
Marketing Plan the Potential Audiences Marketing Plan
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Marketing Plan
The potential audiences for the Firenze include all smartphone and tablet users in North America and Brazil, specifically those who need to have a tablet device capable of… read more
Marketing Plan 18 pages (5054 words) Sources: 15 Topic: Computers / IT / Internet
Sat, Jul 6, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!