E-Commerce Security Threats and Mitigation

Verified

Added on  2020/06/03

|20
|6961
|420
AI Summary
This assignment delves into the critical topic of e-commerce security. It examines the various threats that e-commerce businesses face, such as data breaches, malware attacks, and phishing scams. The assignment also explores mitigation strategies to safeguard customer data and ensure secure transactions. Students will analyze existing security measures and propose best practices for protecting e-commerce platforms from cyberattacks.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
E-commerce Strategies

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
TASK 1 ...........................................................................................................................................1
1.1 Expectations of internet customers...................................................................................1
1.2 Potential impact of common applications on an e-commerce business..........................3
TASK 2............................................................................................................................................4
2.1 E-Commerce implementation strategy............................................................................4
TASK 3............................................................................................................................................6
3.1 Risks of linking the business systems to the internet......................................................6
3.2 Importance of protecting the intellectual properties........................................................8
3.3 Security measures to protect an e-Commerce solution...................................................9
3.4 Current e-Commerce developments and assess their integration...................................11
CONCLUSION .............................................................................................................................12
REFERENCES..............................................................................................................................13
Document Page
Document Page
INTRODUCTION
E-commerce can be simply defined as purchasing and selling products and services or
transferring funds or information oven an electronic network called internet. E-commerce
strategy is not only for internet businesses (Jha, Guillen and Westland, 2012). It is important to
any of the enterprise which conducts its business over the internet. It explains both the short as
well as long term goals of e-business and also involves careful and skilled planning. These
strategies are also a part of the corporate strategy and business planning. It also interlinks with
various other schemes consisting of marketing, organisational and strategical schemes related to
IT. The present report is based on the e-commerce strategy of making Lions Cricket ground
ticket booking system / website. In this project, the expectation of internet users are explained.
The potential impact of common applications on an e-commerce business is also described here.
TASK 1
1.1 Expectations of internet customers
According to Ledbury (2015),Internet customers expects something more in comparison
to normal consumers of organisation. Some of the main expectation of internet customers are
listed below:
Preferred payment methods : Adam (2011) states that consumers as purchasing tickets from
the official websites of Lion cricket ground are expecting various payment methods in order to
pay the money for that effectively without facing any types of problem. Corporation can take use
of different online payment applications like PayPal. On the other hand, Azad and et. al. (2012)
says that users expects such a easy methods of payment where they do not want to move here and
there. For this, they choose online. Here they do not have to waste their costly time in standing in
a queue for purchasing a single ticket of cricket.
Special offers : As per the view point of Spieth and et. al. (2013),people also thinks for better
offers like discount in the price, additional gifts along with services or products, etc. from an
online shopping. So, organisation should provide them special offers by minimising the price for
purchasing of more than two tickets. They should also includes additional passes or gifts for the
lucky winners by arranging a contest. On the contrary, Leão (2012) says that organisation may
suffer from loss if they offer extra things along with the product at minimum cost. A person
always wants some special discount if they are purchasing products online. If company is
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
offering some discount to people then, they will attract towards to it. As a result, sales of an
organisation will get enhance. Amazon is the biggest online retailer in the world which is
working most of the countries so it is providing various discount schemes according to upcoming
festive season.
Timely response to communication : Mulpuru (2011) thought that people demand for the
timely response while communicating. For instance, in some cases when the user is not satisfied
by the products or services of enterprise, then want to contact them for conveying their issues to
the employees of corporation so that they can receive expected services. For this purpose, they
want instant communication without wasting so much time. If any company do not give respond
to their clients at timely manner then there may be risk of loosing them. An individual will have
lots of options, if they purchasing goods online. Quality of item needs to be good and
appropriate; thus, it will get trust of people. So by a proper communication with the company and
customers online retailer company can provide a product according to customer demands.
Speed of delivery : According to Narayana and Newton (2011),customers also expects fast
delivery of their products or services. For instance, if some one purchasing tickets for tomorrow
then they desires it to delivered before that day. So that they do not face any inconvenience. So,
enterprise should focus on fast delivery of products. If they do not do so then their user may
migrate to other companies. On the contrary, Phillips (2016) sates that products gets
interchanged in hurry.
Pricing : Siddiqi and et. al. (2013)says that people demands less amount of price over internet
shopping. They get attracted by the minimum cost tickets. Some customers have habits of
barging so they used to compare the quality of products as well as their costing with goods or
services of other companies. So, corporation should provide unique services or products at
minimum prices in order to increase their selling rates. On the Wickramsainghe and et. al.
(2017). Phillips, J., 2016 states that if company provides their goods at very low price then they
will suffer from great loss. So, they should provide services at such a price where there is no loss
of them. It has to be moderate; thus, persons will attract towards it in an effective way. If it is
less then people will attract towards products and services.
Shipping information : As per the view point of ,in e-commerce, users expects for the
information about the delivery time or shipping time of the products and services. They desires to
2
Document Page
check the location of their goods which they ordered that is at which address it is at present and
by how much time it gets deliver to them.
Privacy : Choudhary and et. al. (2011) says that they also expect privacy of their stuffs such that
they are secured. They also want privacy in terms of their personal information such as bank
details. It should not leak over the network.
Security : According to Siddiqi and et. al.(2013 ), people demands for security while they are
doing online shopping so that they feel comfortable. They desire a system that would provide
safety from fraudsters and conmen as well as various internet scams. People wants protection
from firm, if they are buying online items. If they pay through card or net banking, they will have
fear regarding stolen of their private information. Hence, an enterprise needs to assure them
regarding security. It can help to the company and as well as to customers to motivate more to
deal by e-commerce methods which can help to them to make a better change in their purchasing
process.
Credibility : Phillips (2016) thought that consumers as buying tickets from their homes without
going to the ticket counter, so they expect for reliability that is company should not cheat them in
any terms like pricing, services, quality, etc.
Ease of use : Narayana and Newton (2013) says that customers wants a simple online system for
shopping so that they do not face any difficulty while shopping. They do not want to follow
complex steps for purchasing anything. If they face so then they would decide to buy that goods
from other website. This creates losses for the corporation.
1.2 Potential impact of common applications on an e-commerce business
There are various applications that are used in e-commerce businesses now a days due to
increase in the demanding and utilisation of e-commerce. Some of the main applications of e-
commerce that can be used by Lions cricket ground ticket booking system and their impacts are
described below:
Online shopping : E-commerce has been generally utilised for online shopping. It can be used as
a mediator to link the organisation to their possible consumers in all over the globe. It has been
used in selling various products or services over the network, thereby it is affirm-able for
accessing the global market without any restrictions.
Online banking : As per the view point of Mulpuru (2011), for most of the people who usually
do online shopping includes or have online bank accounts and this make possible via e-
3
Document Page
commerce . This make capable of an individual to do online commercial transaction. With e-
commerce, users can also be able to approach to their bank accounts and receive all the relevant
information that they required to know about their bank accounts without being physically
present at bank to get that information. They can also be capable of transferring payments or
receive billing information related to their accounts from wherever they are so long as they
consist of an internet connection.
Enterprise content management : E-commerce also assists in managing files, databases,
documents and various processes of their corporation. This has aided to enhance the efficiency in
businesses and thus assisted in increasing the performance.
Teleconferencing : It also provides with the facilities of teleconferencing and thereby make it
very easy to perform teleconferencing for businesses which aids in making communication
related to business to be possible.
Document automation : Leão (2012) stated that e-commerce assists and make it possible for the
document automation. This is used in logistics and supply chain.
Automated online assistants : E-commerce has made it approachable for the businesses to have
online virtual assistance which aids the user in increasing their satisfaction level. It also made it
possible for businesses to have instantaneous messaging and newsgroups. This assists in
increasing the efficiency of businesses.
As per the view point of Gupta and Sharma (2012), it helped to enhance the consumer
base for a specific product and service and therefore assists in growing the business. E-commerce
aids enterprise in reducing the promotional as well as marketing costing and hence increases the
profit base for businesses. On the other hand, Choudhary and et. al. (2011) says that it also
provide assistance in increasing the visibility of the business via search engine marketing. This as
a result aids in growing of business and increasing the performance.
Lion's cricket ground is using Amazon in their existing website. They are accepting Cash
on delivery, debit cards and net banking as a payment method. They are providing tickets of
match and in addition equipments related to this. For deliver tickets to their clients, they can use
various methods, such as e-mail, by post and so on. There help section contains FAQ (frequently
ask question) and another section is also there, in which people will ask query.
Impact of these applications on Lion's cricket are mentioned as beneath:
4

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
It will decrease the cash payments for ticket sale to the lion Cricket ground which can
help to decrease manual errors in the counting of cash.
It will provide growth as well as success.
This increases their sales and profits; therefore, it will help them to attract more
customers towards them.
It will increase paperless transaction in the ground which can help to the ground staff to
manage cash.
Customer base is continuously increasing which aid them to compete their competitors at
marketplace.
With assistance of online site, they acquire most of the market share.
As there payment system is much flexible so that an individual will opt an option as per
their convenience.
TASK 2
2.1 E-Commerce implementation strategy
While making plan of an e-commerce implementation strategy for Lions cricket ground
ticket booking system, there are different factors that required to be considered for insuring
success of business. The competition is increasing day by day , hence the execution of strategies
is very important as it is one that would identify the performance of the e-commerce business site
(Turban and et. al., 2015). Correct research and proper techniques of planning have to be used
for gaining the competitive advantage of the businesses. Some of the strategies that can be
planned for acquiring that are listed below:
Business strategies:
Designing website : Corporation should design their attractive website by taking help of
various editing tools so that users gets attracted by seeing their websites only. They
should provide services of selling tickets and maintaining it by giving 24/7 access. By
this way, customer do not face any inconvenience and gets attracted towards their
services.
Targeting market segments and interest groups : Organisation should also target a fix
market segment that is which area is good for selling the tickets. They should also target
to their interest groups that is who are people that are taking more interest in watching
5
Document Page
cricket matches. They should sell their tickets to them at the priority basis. Company can
use attractive site designing like use vivacious colours with a flashy design for evoking a
sensation of youth and adventure. By this way they can draw the attention of college
students.
Create Content to Build Stickiness : Company should distribute crowd sourced contented
for making their website sticky for expected customers. For example, Amazon attracts
large number of people by encouraging them for sharing their thought of components
like books and CDs (Banday and Qadri, 2011). In this case, venture should also inspire
their users to share their ideas like their experiences of purchasing online tickets, etc.
These ideas act as positive signs to other people who are not sure about their servicing
quality.
The ground management has to use premium pricing tactics which can help to the
company to provide a better quality services in the ground which can provide to viewers
a better enjoyable environment.
Therefore with aid of best and adequate business strategies an organisation can easily improve
their business. They have to use best and effective options in their website so that people will
attract towards it in an effective way.
Marketing strategies:
Micro – Target an Online Audience : E-commerce is technically about laying out a
territory that is designing a site for reaching audiences who have similar interest and
characteristics (Lokhande, 2013). Lions cricket ground ticket booking system should
define their niche markets in order to penetrating online by giving specialistic offerings.
Personalise : Website visitors demand one- of – a- kind experiences that provide their
requirements and interests. Technology is now present to even smaller players for
capturing individual shoppers' interestingness and prospects and create selection of
product and shopping experiences led by personalized publicity tailored to them. By the
same way corporation should gather the individualized ideas and provide services as per
that.
Ground management has to use Facebook and Instagram to promote their matches in
their targeted audiences. So by this they can communicate and promote their matches
directly to their targeted customers which can help to sale their tickets also.
6
Document Page
Ground management of the Lion cricket ground has to assign a promotional campaign
team which can help to the ground management to promote their matches effectively so
they have to pay a proper fee to them.
Invest in Mobile : Mobile commerce is flourishing at a rate of over 135 % per year. If the
corporation miss or lack a robust mobile commercial platform then they can suffer from
a spectacular drop off in turn over in upcoming several years (Guynes and Windsor,
2011). For staying competitive, organisation should offer mobile accessible services like
status of delivery services, real time appraisal, click to call, information of products and
maps.
Tap into logistics : For accommodating growth, company might required to tap the
abilities of third party logistics providers (3PLs) in order to carry off or manage such a
higher volume of tangled orders. They should also use reverse logistics. It is nothing but
the capability of handling returns and exchanges rapidly and profitably. This makes them
a important discriminator. Corporation can also gain competitive advantages by
providing same day delivery.
Design a good purchase process : A complicated purchase process would admonish or
discourage customers from buying goods since they would think it is takes too much
time. Hence, organisation should create good and simple purchasing process in order to
attract large number of users to do purchasing online. This buying process should consist
of faster links for assuring the speed and efficiency at the time of purchasing.
Hence, company needs to use an appropriate promotional tools to get attention of people. This
will enhance their profits and along with this reputation at marketplace. Additionally, they can
compete their competitors at competitive world.
Supply-chain strategy:
An organisation needs to use best and adequate supply chain management; thus, they can
accomplish needs and wants of their clients appropriately. For this purpose they can take help of
many mediators, such as wholesaler. If there are many mediators in delivery process, then cost
will rise accordingly.
7

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TASK 3
3.1 Risks of linking the business systems to the internet
There are several risks that are associated with linking the business of Lions cricket
ground ticket booking system to the internet. So, customers required to be aware of those risks
that expect them for the utilisation of the internet. Therefore, the corporation needs to set up an
online security system if it get connected to the internet. Some of the risks of associating the
company business to the internet are following : Hackers : They are those people who tries to interrupt the computer system's security
and attempts to access the information of the firm unlawfully. They uses some types of
codes to hack the system when that system is connected with server or internet
(Matbouli, and Gao,2012). After hacking, computer starts working improperly and it is
the symbol that it is hacked and all the relevant information gets theft by the malicious
users illegally. They can present in the similar corporation or may present at distant
places. (Risk level- High) Crackers : These are those people who try to hack the database of the venture having a
bad intention like destructing or thieving all the information of firm. (Risk level-
Moderate) Script kiddies : These are those person who attempts all the time for accessing and
damaging the system of the enterprise in order to impressing others. (Risk level- Low) Technology with weak security : New technologies have been developing regularly. But
they do not consist of security properties. This presents a serious threat as each and every
unsecured connection means vulnerability of being hacked (Becerra and Korgaonkar,
2011). As organisation is linking their business to the internet, they have to use security
software in their systems so that the risk might be minimised. (Risk level- Moderate) Social media attack : Cyber attackers are using social media as a means to disturb the
complex geographical attack. This is called water holing. By this method, intruders
identify and damages a cluster of websites where they thought staff members of targeted
organisation would visit. So, if the company is involve social media as a way of
communication and used to convey relevant data via some social media website, then the
possibility of being hacked goes at extreme level. (Risk level- High)
8
Document Page
Mobile malware : If workers of Lions cricket ground ticket booking system are taking
use of mobile phones for transferring or sending sensitive data then they are also at the
condition of being hacked (Adam, 2011). As employees also use internet services in
doing these tasks. So, there is a threat to the business of people. (Risk level- Moderate) Out-of-date security software : If corporation is using outdated software are at the high
risk of being hacked as these system do not detect the malicious code entering into the
system. So, firm should update their security software as it is a basic technology
management task and is a mandatory step for securing big amount of data. (Risk level-
High) Lack of encryption : Due to the lack of encryption in the channels of communication and
the websites of the company, the private data of the business get leaked or hacked by the
malicious users. This is one of the major threat to the safety of information. (Risk level-
Moderate) Use of unsecured web links : If venture is taking use of unsecured web links or URLs
such as Hyper text transfer protocol (Http). As such web links are not completely secure
so attacks to these web sites are very general (Xie and et. al., 2014). Hackers or intruders
can very easily hack such sites and theft secret data from there. Hence, when venture is
surfing net, they should take care of using secure web links like SHTTP (Secure hyper
text transfer protocol). (Risk level- Moderate) Phishing : It is an email fraud method whereby malicious users commonly send licensed
appearing emails in an attempt to gather secret as well as financial information from the
recipients. Commonly, such message seems to come from popular trustworthy websites.
But these are not so and replying to such emails corrupts the system of the recipients.
Most of the websites that are frequently spoofed by the intruders are eBay, PayPal,
Yahoo, etc. Phishers can also use hacked data for the intention of taking money from
user's account. (Risk level- Low) Spam : It is an ill electronic messaging system which send unasked bulk messages
arbitrarily. Most of the popular kind of spam is e-mail spam. Organisation as linking
their business activities to internet might also receive email spam messages. This is a
kind of threat to the data present on the server. (Risk level- Moderate)
9
Document Page
Virus : It is a part of software which is developed for interrupting and troubling the
ordinary functioning of a computer system. They can also pass from one infected system
to another. This is one of the major threat as only because of this, the complete work
process of the enterprise gets wasted or interrupted. (Risk Level- High)
High Risk Moderate Risk Low Risk
Hackers
Social media
attack
Out-of-date
security
software
Virus
Crackers
Technology with weak
security
Mobile malware
Lack of encryption
Use of unsecured web
links
Spam
Script kiddies
Phishing
3.2 Importance of protecting the intellectual properties
It is very essential for protecting the intellectual properties of the Lions Cricket ground
ticket booking website. This is due to the fact that there are various risks that are included and
the lacking in terms of protection might causes lack of efficiency or losses to the intellectual
property of the venture. Some of the important reason for protecting the intellectual properties of
the firm are listed below: Loss of customers : As when the intellectual things like copy right, patent, etc. of the
venture gets loosed, then this causes unfair competition in the market. This creates loss of
consumers to the contender firms and due to the performance of the venture gets badly
affected and company may faces loss (Mistry and Dhavale, 2011). Loss of value assets : The unfair competition and copying of assets minimises the value
of the assets as there would be large number of resources or products which are similar in
nature in the market. Because of this, for selling the products and services, company have
to sell their goods or tickets at minimum prices. Loss of income: As the prices of the tickets gets reduced, the turn over of corporation gets
lower and due to that firm have to suffer from great loss (Gupta and Sharma, 2012 ). The
10

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
customers also gets divided as this lead to the loss of income due to bad performance by
the business in the market. Theft : Large number of theft cases might rises and therefore, there is a great need to
protect the intellectual properties. There are different ways through which the properties
of the corporation can be stolen and get also copied. So, the requirement of providing
protection to the intellectual properties is increasing day by day. To protect customers : Protection provided to the intellectual property would resist other
firms from making similar or fake goods. This fake products are of very low quality and
might harm the users in many terms like financially. To prevent piracy : Piracy is the copying of some one or owner's work without taking
their permission. This would make the venture for suffering from losses as due to piracy,
the similar products comes in the market in large quantity. Due to this, the price of that
goods would gets lower and it result in generation of less or minimum profitability.
Different laws in different countries : Since different nation will have different
legislation, so it is better to only conserve the intellectual properties of the firm in order to
gain prevention from any type of issues that may rises in future (Leão, 2012).
3.3 Security measures to protect an e-Commerce solution
For protecting e-commerce solution, there are various security measures. These measures
should be used as the risk linked with the e-commerce is increasing day by day. Some of the
main security measures taken for increasing the safety of the Lions Cricket ground ticket booking
system / website are described below: Access control measures : Accessibility to the various databases should be dominated in
order to restrict those people who can access specific site or database. This would assist
in minimising the risks that are probably to be suffered since such person who can have
access are now restricted and it is trusted that risk liking with the system gets minimised. Regular monitoring of programs : Monitoring of system should be done at regular basis
as this will help in knowing which system is efficient and which is inefficient (Yassine,
and et. al., 2012). And when continuous monitoring will be done then those system which
are at high risk can be determined and company can easily remove those systems. This
will minimise the risk of being hacked.
11
Document Page
Protecting card holder data : Different methods are present that can be used in achieving
the information of card holders and therefore, it posses a threat as online bank accounts
can be easily assessed. Corporation have to adopt various strategies for protecting the
card holder data in order to prevent them from credit card theft and accessibility of their
online bank accounts. Launching of firewalls : Firewalls have to be used by the corporation as they are linking
their business activities to the internet, since the internet surfing consist of large number
of risks. Applying or using firewalls acts a protective layer across the whole information
of the company which are present on the server (Jha, Guillen and Westland, 2012). It
also aids in protecting the database accessibility from intruders. Additionally, it provide
protection against various worms, viruses, remote command execution, SQL injections,
path transversal exposures, probes, etc. Information security policy : Information security policy should be enforced by the
venture in order to insure the secureness of the systems. This would assist in preventing
from different issues that might rises since the risk will be greatly minimised. Secure network should be created and maintained : Building of a secure network would
aids in assuring that each and every information and databases are conserved and this will
assist in preventing from attacks or leaking of data (Yu-ping, 2012). Vulnerability management : A management should be developed that manges the
exposures to the threats by the corporation. Those systems which are at high
vulnerabilities should be thrown away by the company so that risk of being attacked or
hacked can be minimised. Use dot defender : Usage of dot defender aids in protecting web applications and webs
servers. This would provide protection against intruders and assist in easily maintenance
of more than one server at the same time. This helps to defend those systems that consist
of lots of issues. Launch ssl vpn : It assist in setting up of a secure connection for remote people who are
using database and would prevent them from insecure connectivity which arises with
many effects (Liang and et. al., 2011). Use of antivirus : Antivirus aids in protecting the databases from being abscessed or
contaminated by the worms and viruses which will affect the database in an adverse way.
12
Document Page
Encrypted backups : Backups should provide encryption as in case of being hacked or
affected by worms, there will remain one copy of the information which will be fully
saved and can be use in the case of need.
Digital signature : This method helps in ensuring security at the time of doing online
shopping. It is a code which is utilised in doing transaction in order to clearly define the
transactions.
3.4 Current e-Commerce developments and assess their integration
As demand for e-commerce is rising, several developments have been made in order to
better experience of using e-commerce sites. It has been done for ensuring that its security, speed
and performance now gets increased (What is e-commerce and what are the major threats to e-
commerce security?, 2017). This will thus, assist the business regarding its performance and
make the corporation capable in gaining competitive advantages. This is due to the fact that it
would aid in attracting new users and gaining their trust. Some of the developments that have
been done in the e-commerce are listed below: Integration with mobile : In this modern era, users of mobile or smart phones are rising
and they are preferring more to use the mobile devices. E-commerce has thus been
packaged in such a way that consumers can access it with their mobile phones. This
would happen by using various apps and things (Mascavage III, Weichert and
Dravenstott, 2011). This assist in achievement of the strategies of e-commerce since it
has helped in increasing the aggregation of the users of e-commerce. Therefore, it aids in
growing the business of corporation who engaged in providing online services to their
users. Re-marketing : These strategies includes following up a consumer who has presented
curiosity in a product. Corporation can advertise their goods and services by pooping up
the similar products to their websites. This has been utilised in the execution of e-
commerce strategies since it creates more traffic as large number of users show their
interest. Affiliation with major retailers : As sale of most commoditized items is an issue and is
challenging, company should make affiliation with specific retailers since users are most
probably purchase from special retailers. Therefore, association with retailers would
assists in assuring success to the organisation.
13

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Links with other e-commerce site providers : For making sure about the attractiveness
and successfulness of site, organisation should make relationship with third party who is
e-commerce site providers (Zhang and et. al., 2011). They take care of the well being of
the e-commercial sites. Social commerce : There has been increment in the promotional activities and sales of the
products via social media sites and this tendency is being widely used now a days. This
aids in increasing the effectiveness and performance of the e-commerce business. Limited time sales or flash sales : This phenomenon is widely used for promoting sales
and attracting consumers towards their products (7 ways to protect your ecommerce site
from security threats, 2015). This has been integrated with strategies of e-commerce since
it assisted in the acquirement of the strategies aims and objectives. Discount codes : Organisation has been providing discount codes to the lucky customers
and this practice has been widely used in the recent past in order to enhance the
performance of e-commercial sites. This also attracts large number of users by giving
discount offers to them.
Growth of 'mom and pop' effect : There has been good growth in mom and pop effect as it
has aids in increasing efficiency and execution of the e-commercial websites.
CONCLUSION
From the above based report, it can be concluded that e-commerce strategies are those
schemes made by venture whereby they provide their services online or via internet. This is done
only because of increasing the effectiveness and performance of the business much better in
comparison to their competitors. Organisation see this strategies as a measure of expanding their
business activities throughout the world. But at the same time when they are achieving benefits
from it, there are some limitations of this strategy. E-commerce strategies brings various types of
risks and dangers of leaking of sensitive or confidential data from the websites and computer
system of organisations.
14
Document Page
REFERENCES
Books & journals
Adam, C., 2011, January. Influence of adoption factors and risks on ecommerce and online
marketing. In The Proceedings of the International Conference" Marketing-from
Information to Decision" (p. 21). Babes Bolyai University.
Adam, C., 2011, January. Influence of adoption factors and risks on ecommerce and online
marketing. In The Proceedings of the International Conference" Marketing-from
Information to Decision" (p. 21). Babes Bolyai University.
Azad, N. and et. al., 2012. Critical success factors in industrial marketing supply chain
management. Management Science Letters. 2(7). pp.2667-2672.
Banday, M. T. and Qadri, J. A., 2011. Phishing-A growing threat to e-commerce. arXiv preprint
arXiv:1112.5732.
Becerra, E. P. and Korgaonkar, P. K., 2011. Effects of trust beliefs on consumers' online
intentions. European Journal of Marketing. 45(6).pp.936-962.
Choudhary, K. and et. al., 2011, July. Electronic data interchange: A review. In Computational
Intelligence, Communication Systems and Networks (CICSyN), 2011 Third International
Conference on (pp. 323-327). IEEE.
Gupta, P. and Sharma, M., 2012. Ecommerce applications and flavors: Customers and business
companion. Asian Journal of Research in Business Economics and Management, 2(3),
pp.81-101.
Gupta, P. and Sharma, M., 2012. Ecommerce applications and flavors: Customers and business
companion. Asian Journal of Research in Business Economics and Management. 2(3).
pp.81-101.
Guynes, C. S. and Windsor, J., 2011. E-Commerce/Network Security Considerations.
International Journal of Management and Information Systems. 15(2).p.1.
Jha, S., Guillen, M. and Westland, J. C., 2012. Employing transaction aggregation strategy to
detect credit card fraud. Expert systems with applications. 39(16). pp.12650-12657.
Jha, S., Guillen, M. and Westland, J. C., 2012. Employing transaction aggregation strategy to
detect credit card fraud. Expert systems with applications. 39(16). pp.12650-12657.
Leão, F., 2012. Communication strategy for Continente online store: improving the Ecommerce
experience (Doctoral dissertation, NSBE-UNL).
Leão, F., 2012. Communication strategy for Continente online store: improving the Ecommerce
experience (Doctoral dissertation, NSBE-UNL).
Ledbury, S., 2015. Smart supply chain solutions for ecommerce distribution. MHD Supply Chain
Solutions. 45(3). p.26.
Liang, T. P. And et. al., 2011. What drives social commerce: The role of social support and
relationship quality. International Journal of Electronic Commerce, 16(2), pp.69-90.
Lokhande, P. S., 2013. E-Commerce Applications: Vulnerabilities, Attacks and
Countermeasures.
Mascavage III, J. J., Weichert, M. M. and Dravenstott, R. E., The Western Union Company,
2011. Online purchasing method. U.S. Patent 8.041.606.
15
Document Page
Matbouli, H. and Gao, Q., 2012, March. An overview on web security threats and impact to e-
commerce success. In Information Technology and e-Services (ICITeS), 2012
International Conference on (pp. 1-6). IEEE.
Mistry, J. and Dhavale, D., 2011. Application of Balanced Scorecard in eCommerce
Environment. Journal of Knowledge Globalization. 4(2).
Mulpuru, S., 2011. Will Facebook Ever Drive eCommerce?. Forrester Research.
Narayana, V. S. and Newton, P. D., 2013. Customer expectations of E-commerce. ZENITH
International Journal of Business Economics & Management Research. 3(8). pp.194-
204.
Narayana, V. S. and Newton, P. D., 2013. Customer expectations of E-commerce. ZENITH
International Journal of Business Economics & Management Research. 3(8). pp.194-
204.
Phillips, J., 2016. Ecommerce analytics: analyze and improve the impact of your digital strategy.
FT Press.
Siddiqi, J. and et. al., 2013. Emerging Trends in ICT Security: Chapter 8. Assessing the Role of
Governments in Securing E-Business: The Case of Jordan. Elsevier Inc. Chapters.
Spieth, P. and et. al., 2013. Special issue on business model innovation—editorial note.
Turban, E. and et. al., 2015. E-Commerce Security and Fraud Issues and Protections. In
Electronic Commerce (pp. 457-518). Springer International Publishing.
Wickramsainghe, D. M. J. and et. al., 2017. Impact of accounting software for Business
Performance. Imperial Journal of Interdisciplinary Research.3(5).
Xie, K. and et. al., 2014. Ecommerce: channel or strategy? insights from a comparative case
study.
Yassine, A. and et. al., 2012. Privacy Tradeoffs in eCommerce: Agent-Based Delegation for
Payoff Maximization. Recent Progress in Data Engineering and Internet Technology.
pp.121-127.
Yu-ping, T. I .A. N., 2012. Analysis of E-commerce Security Problem and Its Prevention
Strategy [J]. Value Engineering. 33. p.103.
Zhang, Y. and et. al., 2011. Repurchase intention in B2C e-commerce—A relationship quality
perspective. Information & Management. 48(6). pp.192-200.
Online
7 ways to protect your ecommerce site from security threats. 2015. [Online]. Available through :
<https://www.wamda.com/2015/12/7-ways-to-protect-your-ecommerce-site-from-
security-threats>. Accessed on 4th October 2017.
Methods of Payment. 2017. [Online]. Available through:
<http://www.1stclasstraveltaxis.co.uk/payment_methods/payment_methods.html>.
[Accessed on 4th October 2017].
What is e-commerce and what are the major threats to e-commerce security?. 2017. [Online].
Available through : <https://www.techgenyz.com/best-practice/e-commerce-major-
threats-e-commerce-security/>. Accessed on 4th October 2017.
16

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
17
1 out of 20
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]