E-Business Infrastructure and Applications

Verified

Added on  2023/06/11

|16
|3647
|435
AI Summary
This report depicts the importance of developing proper E-commerce website for any business organization to grab more number of consumers and at the same time to gain competitive advantages and commercial revenue. For this particular report the four nominated companies are twitter, Google, Facebook and Apple. These are four well-known online social media platform whose website and overall E-commerce based business approaches are completely secured and protected from the external attack.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: E-Business Infrastructure and Applications
E-Business Infrastructure and Applications
Name of the student:
Name of the university:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
Introduction
This report depicts the importance of developing proper E-commerce website for any
business organization to grab more number of consumers and at the same time to gain
competitive advantages and commercial revenue. For this particular report the four nominated
companies are twitter, Google, Facebook and Apple. These are four well-known online social
media platform whose website and overall E-commerce based business approaches are
completely secured and protected from the external attack.
After comparing the websites developed by four of these social media platform
individually it has been found that, the privacy and privacy protection features adopted by these
companies are different from each other. The list of privacy protection details and policies those
the companies are to be adopted for gang successful commercial revenue re also elaborated in
this report. For proper market followers the companies are needed to focus on relevant marketing
strategies and theories as well. The details of marketing theories and strategies are also illustrated
in this report. After considering the list of privacy features of two of these websites a justification
on relevant theories for these companies are done accordingly. It is the role of the website
developers to design the website considering all security privacy and policies.
Question A
1.1 Introduction to privacy and privacy protection features
After analyzing the details privacy protection features of these social media platform it
has been found that, for these companies the privacy and security features are different from each
other. It is not mandatory that, for the websites the number of pages will be same thus the for
Document Page
2E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
different pages the privacy protection are different. The website home pages generate their own
privacy policy to avoid unauthorized information access. However, no accuracy and adequacy of
these tools are available in every situation of the website access and development. There are
different legal questions those widely arise with these websites that are also resolved with the
privacy policy details. From the recent privacy approaches and protection mechanism it has been
found that, there are many modern prcatices those are followed by the website developers for
processing the card and not the transactions.
The detail description of both product and services will increase the numbers
simultaneously. The transformational developments are swirling around the banking industry
(Acquisti, Brandimarte and Loewenstein 2015). It is very much important for the website
developers to keep their private information secured from the external users. Privacy policy is
referred to as simple documents that disclose certain or even all the ways that should be adopted
for using the gathered information respectively in the accurate locations. The privacy policy is
not everyone but for all the users.
1.2 Developing a list of privacy protection features
The possible security issues will be resolved completely with the successful
implementation of the privacy policy.
In the dashboard display the website email address and the phones numbers
should be shown prominently.
Availability of auto responsive email and phone numbers are required
Consumer friendly return, refund and cancellation
Sending pre billing notification for the recurring transaction
Document Page
3E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
Clear shipping policy development and from each of the page access of the policy
The billing prcatices should have to be completely disclosed
The transaction currency should have to be stated
The export restrictions are to be listed accordingly
Development and display of the privacy statement
SSL certification
Vendor scanning and McAfee security scan
1.3 Comparisons of similar websites for privacy policies
The privacy policies for similar different types of organizations differ a lot from each
other. In order to gain business success from the competitive market it is necessary for the
developers to adopt the most suitable privacy policy (Hajli and Lin 2016). The comparisons
between four websites from similar industry are illustrated as follows:
Privacy policy of Amazon
The information received and stored from the users on the Amazon website are
customized (Reidenberg et al. 2015). The details of the products and the services will be
accessed by the users only when the users will register them to the website. Only when the users
will install the Amazon app, they will be able to add products to their cart for successful secured
online shopping. The other privacy details for this company are as follows:
The business of Amazon is affiliated and third party service providers are
available
Gives promotional offers to the users and without reason none of the private
information will be accessed and released by the company
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
Input available for Amazon in terms of secure socket layers, software, and
information encryption
Privacy policy of Flipkart
The user of Flipkart will be able to access information only when they will
register themselves (Feng and Xie 2014). As a result, information will be
collected, used, maintain and disclose as well. However, personal data access and
non-personal identification information are avoided.
In order to run and operate the website the personal data are collected and used
simultaneously.
Data collection, storage, access, processing and protection practices are the
generic aggregations those are used by Flipkart
The advertisements appeared in the websites are generally delivered to the users
with the help of advertising partners.
Privacy policy of eBay
The aim of eBay online shopping platform is to connect people from different and make
the world much open in nature. The privacy policy of Facebook does not differ much from
Apple. Apple can point out the way through which they can minimally store the information of
the consumers (Wang et al. 2014). Privacy is referred to as an important part of the online
shopping portal to keep the private information of the users secured from the unauthenticated
users. The corporate entities and the internal service providers of eBay follow the basics of legal
security approaches.
Privacy policy of Make My Trip
Document Page
5E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
All the information collected and stored in the server of the company are
personally identifiable and the primary goal of the company is to maintain the
security of the system (Danezis et al. 2015).
Based on the service behavior the information are collected and utilized
accordingly
The additional information those have been collected are secured from the
external and unauthorized users
1.4 Provide ratings to websites based on the list of privacy features
Name of the
websites
Features Ratings
Document Page
6E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
Flipkart Flipkart is structured and
committed to their privacy
The Information stored and
required to be accessed by the
users are all encrypted with high
level of security.
Due to encryption the bill payment
and messages can be kept in a
much secured way.
Biometrics and face detection are
the two different approaches those
can be used for securing the
information.
The health and fitness privacy are
others (Cai, et al. 2014).
1
Ebay Information customization is
available for the (Perera et al.
2015)
The banking and financial details
of the consumers are also stored in
the server with high level security.
3
Amazon Multiple numbers of accounts can 4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
be created and managed by a single
user
The basic accounts information of
the account holders are always
secured from the externals (Dong,
Cheng and Wu 2014).
The application programming
interface can secure the technology
used by the account holders
Direct messages and non-public
communication are the other
security policies available in case of
account holders.
Make My Trip High level security to the personal
information of the users
The concerns can be submitted
regarding the privacy policy
through email
Gives permission and access to
only the authorized information
2
Document Page
8E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
1.5 Conclusion - privacy and organization’s privacy policies
Privacy policy is referred to as important part for any Ecommerce business. It is the
responsibility of the website developer to design the website in such a way so that it can posses
all mandatory security mechanisms. With the privacy protection policy the confidence of the
consumers will automatically enhanced and the chances of occurrence of the legal risks will also
minimized (Sicari et al. 2014). Even the chance for the information disclosure also gets
minimizes largely. In order to design the privacy policy for any business organization the main
components on which the companies are to focus are as follows. Initially a privacy audit should
have to be conducted and accordingly and the elements of the privacy policy notice should
comprise of notice, access and accuracy, data security and integrity, redress and enforcement,
policy revision and posting the privacy policies etc. Even after the final publish of the privacy
policy the revision of the policy is another important thing that should have to be considered by
the organizational owners (Riquelme and Román 2014). As the privacy law or these companies
are designed for the website or electronic communication platform thus the organizations should
consider the privacy action on liability of online profiling. The pending legislations are also
should be generalized accordingly.
Question B
2.1Introduction to first mover and market follower
After analyzing the question arises for the competitive advantages it has been found that,
generating high rating sales is an important thing that has to be considered for the market level
Document Page
9E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
success and commercial revenue as well (Urueña, Muñoz and Larrabeiti 2014). There are
different ways through which the commercial revenue and the competitive advantages can be
gained from the market place.
When it comes to have a competitive advantage, the firms are always looking for
generating high sales of market share over its competitors (Sicari et al. 2015). Competitive
benefit can be gained by many ways in terms of low cost by providing functional products or
services as well. The other type of competitive advantage is the first mover. The first mover is
termed as a firm being the first one to move into a particular market with the services or product.
There are major advantages and risks involved being the first mover (Riquelme and Román
2014). Market followers are very much crucial firms which enter into a known market which has
been well established. The organizations would start off with a smaller market share but are able
to gain market level revenue.
The market followers are able to carefully study the market and customer trends before
entering into the market. The most important aspect is that the market followers are able to learn
from the experiences of the first movers and may not need to incur high research and
development cost if they are able to create similar products on their own (Urueña Muñoz and
Larrabeiti 2014). The market followers have an advantage to bring the first mover’s product
from the position market to the loads.
2.2 Explain about first mover and market follower with relevant examples
Without any doubt it can be said that, the profit for the first mover are very much
aggressive in nature for the market followers. The concept presents different kinds of opinions
regarding the ways to achieve success in the market. There are no such concrete strategies used
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
for the successful development of the business objectives in terms of business prosperity and
entrepreneurship (Karkin and Janssen 2014). There are certain methods and techniques available
those are appeared to be very much beneficial for some of the business organization. With the
help of this technique the most suitable approach for the business success can be identified by the
project managers and the business analysts as well. The business level issues and the problems
can be completely resolved with the help of the proper adoption and application of the business
strategies. Within the business environment the first mover profit is referred to as an important
key approach that exists from the very beginning. Before entering to the business market first
different market level strategies are to be adopted by the business analyst.
The successful business strategy is always considered as a precondition of success for a
number of reasons. In order to begin with, the company which is capable to increase the sales
fast is talented to significantly reduce cost of the products (Riquelme and Román 2014).
It enables this organization to furnish clients with to a great degree focused costs,
consequently, expanding own deals and making an intense hindrance to passage for potential
market participants (Martínez-Pérez et al. 2015). Plus, low item cost enables organizations to
keep up higher overall revenue and get more benefits. Surplus assets can be utilized for
encourage advancement and compelling improvement that would additionally build deals and
drive the organization's development.
For instance, Amazon entered the market with an advancement model of online book
exchanging that had all the earmarks of being effective, pulled in a considerable measure of
customers and made Amazon one of the most grounded organizations forming the cutting edge
universe of business. Besides, first-mover advantage is firmly associated with a "Spead-Leader
Document Page
11E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
Strategy" presented by (Sicari et al. 2015). As indicated by this methodology, it is critical to have
a period lead contrasted with contenders and productively acknowledge it executing imperative
designs throughout everyday life and accomplishing important objectives. Additionally, first-
movers can profit by the expectation to absorb information impact. It is frequently said that a
first-mover can keep up its prosperity if a secure of its introduced base is accomplished. Secure
makes it to a great degree troublesome for potential and existing contenders to take away a piece
of the overall industry.
2.3 Justifications with relevant theories for market follower/ first mover
After analyzing the details ecommerce services offered by Lazada and RedMart it has
been found that, Lazada has set to acquire the well known Singaporean grocery startup named as
RedMart with the US $40 Million. Lazada has fresh off their US $1 billion injections from
Alibaba. Lazada offers all electronics; beauty apparel and home as well as living except those are
perishable goods. After details of analysis it has been found that, RedMart quietly puts on the
market after its reports to US $21 Million of operating loss in the year of 2015 and 2016. In
addition to this it has been suffering for a $126 Million of loss liabilities in this year. Thus,
Lazada has been planned to adopt the ideas and privacy and policies of RedMart.
After comparing the theories of market followers and first movers, Lazada has make the
acquisition too much confidently with the knowledge that the company can use for the overall
cost optimization. Compare to Lazada the business model ad relevant theories applied by
HppyFresh, Redmart and honestbee are much fare business models.
Document Page
12E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
2.4 Analysis for two e-commerce companies
The two different Singapore based companies adopted for the analysis are Lazada and
RedMart. The privacy policy of two of these websites are completely different from other,
However after analyzing two of the websites and their details display details it has been found
that, the dashboard security and privacy policy developed for the RedMart are much secured
than Lazada. Thus, the overall revenue and the commercial profit for the RedMart are also higher
than other Singapore based companies. With this successful joining Lazada will be able to join
already fierce online grocery feud.
2.5 Conclusion
From the overall discussion it can be concluded that, with the successful implementation
of proper privacy and protection policies the issues that different business organizations may
face will be completely resolved. The increased and high level security of the websites will help
to grab more number of consumers from different geographical boundaries. Due to high security
guidelines and policies the companies will be able grab more number of consumers from
different locations. The security policies for different websites are different. The design
difference in the website also varies a lot. A comparison on both of the websites for Lazada and
RedMart are also illustrated in this report.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
References
Acquisti, A., Brandimarte, L. and Loewenstein, G., 2015. Privacy and human behavior in the age
of information. Science, 347(6221), pp.509-514.
Cai, X., Nithyanand, R., Wang, T., Johnson, R. and Goldberg, I., 2014, November. A systematic
approach to developing and evaluating website fingerprinting defenses. In Proceedings of the
2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 227-238).
ACM.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Metayer, D.L., Tirtea, R. and
Schiffner, S., 2015. Privacy and Data Protection by Design-from policy to engineering. arXiv
preprint arXiv:1501.03726.
Datta, A., Tschantz, M.C. and Datta, A., 2015. Automated experiments on ad privacy
settings. Proceedings on Privacy Enhancing Technologies, 2015(1), pp.92-112.
Dong, T.P., Cheng, N.C. and Wu, Y.C.J., 2014. A study of the social networking website service
in digital content industries: The Facebook case in Taiwan. Computers in Human Behavior, 30,
pp.708-714.
Feng, Y. and Xie, W., 2014. Teens’ concern for privacy when using social networking sites: An
analysis of socialization agents and relationships with privacy-protecting behaviors. Computers
in Human Behavior, 33, pp.153-162.
Document Page
14E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
Hajli, N. and Lin, X., 2016. Exploring the security of information sharing on social networking
sites: The role of perceived control of information. Journal of Business Ethics, 133(1), pp.111-
123.
Karkin, N. and Janssen, M., 2014. Evaluating websites from a public value perspective: A review
of Turkish local government websites. International Journal of Information Management, 34(3),
pp.351-363.
Martínez-Pérez, B., De La Torre-Díez, I. and López-Coronado, M., 2015. Privacy and security in
mobile health apps: a review and recommendations. Journal of medical systems, 39(1), p.181.
Perera, C., Ranjan, R., Wang, L., Khan, S.U. and Zomaya, A.Y., 2015. Big data privacy in the
internet of things era. IT Professional, 17(3), pp.32-39.
Reidenberg, J.R., Breaux, T., Cranor, L.F., French, B., Grannis, A., Graves, J.T., Liu, F.,
McDonald, A., Norton, T.B. and Ramanath, R., 2015. Disagreeable privacy policies: Mismatches
between meaning and users' understanding. Berkeley Tech. LJ, 30, p.39.
Riquelme, I.P. and Román, S., 2014. Is the influence of privacy and security on online trust the
same for all type of consumers?. Electronic Markets, 24(2), pp.135-149.
Schaub, F., Balebako, R., Durity, A.L. and Cranor, L.F., 2015, July. A design space for effective
privacy notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)(pp. 1-
17).
Sicari, S., Rizzardi, A., Grieco, L.A. and Coen-Porisini, A., 2015. Security, privacy and trust in
Internet of Things: The road ahead. Computer networks, 76, pp.146-164.
Document Page
15E-BUSINESS INFRASTRUCTURE AND APPLICATIONS
Turow, J., Hennessy, M. and Draper, N.A., 2015. The tradeoff fallacy: How marketers are
misrepresenting American consumers and opening them up to exploitation.
Urueña, M., Muñoz, A. and Larrabeiti, D., 2014. Analysis of privacy vulnerabilities in single
sign-on mechanisms for multimedia websites. Multimedia Tools and Applications, 68(1), pp.159-
176.
Wang, T., Cai, X., Nithyanand, R., Johnson, R. and Goldberg, I., 2014, August. Effective
Attacks and Provable Defenses for Website Fingerprinting. In USENIX Security Symposium (pp.
143-157).
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]