University Assignment: Style Icon E-commerce Mitigation Plan Report
VerifiedAdded on 2020/05/08
|17
|3437
|38
Report
AI Summary
This report provides a comprehensive mitigation plan for the e-commerce business of Style Icon, a clothing retailer. It begins with an executive summary and table of contents, followed by an introduction that identifies key security and fraud issues in e-commerce, such as privacy concerns, technical attacks, phishing, email fraud, and social engineering. The report then details a risk mitigation plan with specific activities, responsible parties, and descriptions of measures like employee awareness training, secure payment gateways, and system alerts. Furthermore, it addresses ethical and legal issues like web tracking, consumer privacy, internet fraud, copyright, and domain name disputes, offering solutions to manage these challenges. The report emphasizes the importance of policies, training, secure connections, and customer awareness to protect both the business and its customers. Finally, it provides a conclusion summarizing the key findings and recommendations.

MITIGATION PLAN 1
Assessment Item 3 – Mitigation Plan
Student’s Name
Course ID
University
Date
Student’s Name Student ID
Assessment Item 3 – Mitigation Plan
Student’s Name
Course ID
University
Date
Student’s Name Student ID
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

MITIGATION PLAN 2
Executive Summary
The management of an e-commerce business needs to understand the security and fraud
issues that are faced by the e-commerce businesses in the recent times. As the operations of the
firm is totally based on online platform, the vulnerability to security risk increases due to the
increase in hacking and information theft. It is important for the management of Style Icon to
consider the security and fraud issues to develop an adequate risk mitigation plan. Additionally,
the management of an e-commerce firm must take care of several ethical and legal requirements
in order to keep the firm safe from legal obligations and uncertainties during the course of
operations.
Student’s Name Student ID
Executive Summary
The management of an e-commerce business needs to understand the security and fraud
issues that are faced by the e-commerce businesses in the recent times. As the operations of the
firm is totally based on online platform, the vulnerability to security risk increases due to the
increase in hacking and information theft. It is important for the management of Style Icon to
consider the security and fraud issues to develop an adequate risk mitigation plan. Additionally,
the management of an e-commerce firm must take care of several ethical and legal requirements
in order to keep the firm safe from legal obligations and uncertainties during the course of
operations.
Student’s Name Student ID

MITIGATION PLAN 3
Table of Contents
Introduction......................................................................................................................................4
Security and Fraud Issues................................................................................................................4
Mitigation Plan for security and fraud issues..................................................................................7
Ethical and Legal Issues................................................................................................................12
Solutions for addressing the ethical and legal issues.....................................................................13
Conclusion.....................................................................................................................................15
References......................................................................................................................................17
Student’s Name Student ID
Table of Contents
Introduction......................................................................................................................................4
Security and Fraud Issues................................................................................................................4
Mitigation Plan for security and fraud issues..................................................................................7
Ethical and Legal Issues................................................................................................................12
Solutions for addressing the ethical and legal issues.....................................................................13
Conclusion.....................................................................................................................................15
References......................................................................................................................................17
Student’s Name Student ID
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

MITIGATION PLAN 4
Introduction
E-commerce business set up requires fulfilling of a number of criteria protecting rights of
the buyers and target demographics. In this particular report, the major issues and challenges of
setting up the E-commerce business of a clothing retailer, Style Icon, have been discussed. In the
meanwhile, the potential security and fraud issues associated to the eBusiness have been
elaborated. Identification of the security and fraud related threats in E-commerce business will be
evident to develop a risk mitigation plan describing the methods to counter the potential security
concerns and online frauds (Anandarajan and Simmers, 2012).
By conducting the risk analysis associated to the eBusiness of Style Icon, an effective
mitigation plan has been developed to protect the business as well as the customers from
potential online threats and fraud issues (Hinde, 2015). Furthermore, the report has described the
potential ethical and legal challenges attached to the eBusiness of the retail company. In addition,
the study has investigated the key concepts related to the ethical and legal issues that might affect
the proceedings of the E-commerce business of Style Icon. At the end of the report, the process
that can be utilised to solve the ethical and legal issues affecting the eBusiness has been
discussed.
Security and Fraud Issues
The E-commerce business of Style Icon, the retail clothing brand has to deal with a
number of security and fraudulent issues in the online platform. In this particular section of the
report, the most evident security and fraudulent challenges to be faced by the eBusiness have
been analysed as follows:
Student’s Name Student ID
Introduction
E-commerce business set up requires fulfilling of a number of criteria protecting rights of
the buyers and target demographics. In this particular report, the major issues and challenges of
setting up the E-commerce business of a clothing retailer, Style Icon, have been discussed. In the
meanwhile, the potential security and fraud issues associated to the eBusiness have been
elaborated. Identification of the security and fraud related threats in E-commerce business will be
evident to develop a risk mitigation plan describing the methods to counter the potential security
concerns and online frauds (Anandarajan and Simmers, 2012).
By conducting the risk analysis associated to the eBusiness of Style Icon, an effective
mitigation plan has been developed to protect the business as well as the customers from
potential online threats and fraud issues (Hinde, 2015). Furthermore, the report has described the
potential ethical and legal challenges attached to the eBusiness of the retail company. In addition,
the study has investigated the key concepts related to the ethical and legal issues that might affect
the proceedings of the E-commerce business of Style Icon. At the end of the report, the process
that can be utilised to solve the ethical and legal issues affecting the eBusiness has been
discussed.
Security and Fraud Issues
The E-commerce business of Style Icon, the retail clothing brand has to deal with a
number of security and fraudulent issues in the online platform. In this particular section of the
report, the most evident security and fraudulent challenges to be faced by the eBusiness have
been analysed as follows:
Student’s Name Student ID
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

MITIGATION PLAN 5
Privacy Concerns
Privacy of customers visiting the website has been a major challenge for the E-commerce
providers in the recent times. Due to technological advancement, theft of identity of the
consumers and impersonation has become some serious privacy concerns that must be handled
effectively by the E-commerce businesses (Kahn and Liñares-Zegarra, 2012). For instance, E-
commerce providers should deliver a secured online platform and payment gateway to the
customers so that private information such as credit card and debit card numbers will be kept
highly secure. Evidently, the E-commerce business of Style Icon must deliver disclaimer through
the privacy policies to maintain the privacy of the online customers both offline and online
(Martin, 2015).
Integrity, Client Authentication, and Non-repudiation
In any E-commerce business set up, data integrity, authentication of the target audience,
and non-repudiation can determine the sustainability of the business. In the E-commerce
business platform, Style Icon has to provide the assurance to the online customers that every data
transmitted is correct. In the meanwhile, the verification of the transmitted data will certify that
data has not tampered during the phase of transmission by any third party (Cheeseman, 2007). At
the same point of time, the authentication of the customers must be developed so that online
transactions will be secured. In addition, the E-commerce providers must deliver non-repudiation
towards the clients to assure the transactions through online medium.
Student’s Name Student ID
Privacy Concerns
Privacy of customers visiting the website has been a major challenge for the E-commerce
providers in the recent times. Due to technological advancement, theft of identity of the
consumers and impersonation has become some serious privacy concerns that must be handled
effectively by the E-commerce businesses (Kahn and Liñares-Zegarra, 2012). For instance, E-
commerce providers should deliver a secured online platform and payment gateway to the
customers so that private information such as credit card and debit card numbers will be kept
highly secure. Evidently, the E-commerce business of Style Icon must deliver disclaimer through
the privacy policies to maintain the privacy of the online customers both offline and online
(Martin, 2015).
Integrity, Client Authentication, and Non-repudiation
In any E-commerce business set up, data integrity, authentication of the target audience,
and non-repudiation can determine the sustainability of the business. In the E-commerce
business platform, Style Icon has to provide the assurance to the online customers that every data
transmitted is correct. In the meanwhile, the verification of the transmitted data will certify that
data has not tampered during the phase of transmission by any third party (Cheeseman, 2007). At
the same point of time, the authentication of the customers must be developed so that online
transactions will be secured. In addition, the E-commerce providers must deliver non-repudiation
towards the clients to assure the transactions through online medium.
Student’s Name Student ID

MITIGATION PLAN 6
Technical Attacks
Technical attacks can be identified as one of the most serious challenges to be tackled by
the eBusiness organisations in terms of delivering security. For instance, Denial of service (DoS)
attacks can paralyse the normal activities of an E-commerce business. By overwhelming a
server, such attacks can create massive difficulty for the hosts (Roberts, 2013). Therefore, the E-
commerce business of Style Icon must develop defending efforts to deal with such security
challenges.
Phishing Attacks and Social Engineering
In case of describing the criminal fraudulent issues in the E-commerce business, the
phishing attack can be identified as the most concerning process. By using masquerading
technique applied in electronic communication, the process can hack any sensitive data and
information such as user name, credit card details, and high-security passwords, etc (Bottiglieri,
2011). Apart from that, social engineering is another fraudulent issue that can manipulate the
actions of users to divulge confidential and sensitive data and information. In this method,
fraudsters utilises Trojans horses, a malware system to get the sensitive data from the E-
commerce set up (Atkins and Huang, 2013). Meanwhile, these are the two most evident
fraudulent issues to be considered by eBusiness providers.
Email Frauds and Scams
Another major security problem that is faced by the e-commerce businesses in the recent
years is the email frauds and scams (Panwar, 2014). It can be seen that some thieves are sending
email on behalf of the company in order to collect private information of the customers.
Student’s Name Student ID
Technical Attacks
Technical attacks can be identified as one of the most serious challenges to be tackled by
the eBusiness organisations in terms of delivering security. For instance, Denial of service (DoS)
attacks can paralyse the normal activities of an E-commerce business. By overwhelming a
server, such attacks can create massive difficulty for the hosts (Roberts, 2013). Therefore, the E-
commerce business of Style Icon must develop defending efforts to deal with such security
challenges.
Phishing Attacks and Social Engineering
In case of describing the criminal fraudulent issues in the E-commerce business, the
phishing attack can be identified as the most concerning process. By using masquerading
technique applied in electronic communication, the process can hack any sensitive data and
information such as user name, credit card details, and high-security passwords, etc (Bottiglieri,
2011). Apart from that, social engineering is another fraudulent issue that can manipulate the
actions of users to divulge confidential and sensitive data and information. In this method,
fraudsters utilises Trojans horses, a malware system to get the sensitive data from the E-
commerce set up (Atkins and Huang, 2013). Meanwhile, these are the two most evident
fraudulent issues to be considered by eBusiness providers.
Email Frauds and Scams
Another major security problem that is faced by the e-commerce businesses in the recent
years is the email frauds and scams (Panwar, 2014). It can be seen that some thieves are sending
email on behalf of the company in order to collect private information of the customers.
Student’s Name Student ID
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

MITIGATION PLAN 7
Recently, several cases of spam emails claiming that the receiver has won a huge amount of
price have been filed in Australia and several other countries (Panwar, 2014). This sort of scams
lead to loss of reputation of the firm and creates a feeling of insecurity among the customers.
Hence, it is important for the management of Style Icon to take care of such issues and make the
customers aware that the company will never ask for personal information such as credit card
number or passwords through email or phone calls.
Mitigation Plan for security and fraud issues
It is important for the Style Icon to develop a security and fraud risk mitigation plan in
order to keep the online transactions safe and maintain the safety of data of the consumers.
Furthermore, the risk mitigation plan is required by the firm to meet the legal terms and stay safe
from legal actions in the future (Hoffman and McGinley, 2010). The mitigation plan that can be
used by the e-commerce business has been presented herein below:
Mitigation Plan for Security and Fraud Issues
Activities Description Person Responsible
Develop a security and
fraud risk mitigation
policy
First of all the management of Style
Icon need to develop a policy statement
regarding the identification, analysis
and mitigation of security and fraud
risk in the e-commerce operations
(Costa, 2011). The policy document
will include the role of the key
members and their responsibilities in
IT management and
customer service
department
Student’s Name Student ID
Recently, several cases of spam emails claiming that the receiver has won a huge amount of
price have been filed in Australia and several other countries (Panwar, 2014). This sort of scams
lead to loss of reputation of the firm and creates a feeling of insecurity among the customers.
Hence, it is important for the management of Style Icon to take care of such issues and make the
customers aware that the company will never ask for personal information such as credit card
number or passwords through email or phone calls.
Mitigation Plan for security and fraud issues
It is important for the Style Icon to develop a security and fraud risk mitigation plan in
order to keep the online transactions safe and maintain the safety of data of the consumers.
Furthermore, the risk mitigation plan is required by the firm to meet the legal terms and stay safe
from legal actions in the future (Hoffman and McGinley, 2010). The mitigation plan that can be
used by the e-commerce business has been presented herein below:
Mitigation Plan for Security and Fraud Issues
Activities Description Person Responsible
Develop a security and
fraud risk mitigation
policy
First of all the management of Style
Icon need to develop a policy statement
regarding the identification, analysis
and mitigation of security and fraud
risk in the e-commerce operations
(Costa, 2011). The policy document
will include the role of the key
members and their responsibilities in
IT management and
customer service
department
Student’s Name Student ID
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

MITIGATION PLAN 8
controlling the issues.
Employee awareness
training
An employee awareness training
program must be organised by the
management to make the workers
aware of the security and fraud issues
(Martin, 2015). The training program
will teach the employees to handle such
situations and strengthen the workforce
in terms of security and fraud activities.
HR department
Use secure payment
gateway
Style Icon must use a secure third
party payment gateway in order to
make secure transactions of money
(Martin, 2015).
IT department
Use secure connection for
online checkout
The company must use Secure Sockets
Layer (SSL) authentication for the
website and data protection
(Cheeseman, 2013). It helps the
company and its customers from
getting the essential information stolen.
IT department
Do not store sensitive data It is important for the ecommerce
organisation to note that the website do
store sensitive data of the customers
such as CVV (Card Verification Value)
IT department
Student’s Name Student ID
controlling the issues.
Employee awareness
training
An employee awareness training
program must be organised by the
management to make the workers
aware of the security and fraud issues
(Martin, 2015). The training program
will teach the employees to handle such
situations and strengthen the workforce
in terms of security and fraud activities.
HR department
Use secure payment
gateway
Style Icon must use a secure third
party payment gateway in order to
make secure transactions of money
(Martin, 2015).
IT department
Use secure connection for
online checkout
The company must use Secure Sockets
Layer (SSL) authentication for the
website and data protection
(Cheeseman, 2013). It helps the
company and its customers from
getting the essential information stolen.
IT department
Do not store sensitive data It is important for the ecommerce
organisation to note that the website do
store sensitive data of the customers
such as CVV (Card Verification Value)
IT department
Student’s Name Student ID

MITIGATION PLAN 9
Codes or passwords (Martin, 2015).
Implement a strong
verification system
The security or IT department of the
company will take care of the
verification system. For instance,
during the change of password, the
customer needs to use verified email id
and phone numbers (Martin, 2015).
Also, the customers have to answer
different verification questions in order
to change the password.
IT department
Set-up system alerts for
suspicious activity
The activities in the website and related
to the name of the company must be
tracked in order to get aware of any
sort of suspicious activities (Costa,
2011). The security department can set
up an alert notice for suspicious and
multiple transactions that take place
through a particular IP address.
IT department
Implement a whistle
blowing hotline
A whistle blowing hotline system must
be implemented that can be used by the
company to accept complaints from the
consumers regarding security and fraud
issues related to the company
Customer Service
department
Student’s Name Student ID
Codes or passwords (Martin, 2015).
Implement a strong
verification system
The security or IT department of the
company will take care of the
verification system. For instance,
during the change of password, the
customer needs to use verified email id
and phone numbers (Martin, 2015).
Also, the customers have to answer
different verification questions in order
to change the password.
IT department
Set-up system alerts for
suspicious activity
The activities in the website and related
to the name of the company must be
tracked in order to get aware of any
sort of suspicious activities (Costa,
2011). The security department can set
up an alert notice for suspicious and
multiple transactions that take place
through a particular IP address.
IT department
Implement a whistle
blowing hotline
A whistle blowing hotline system must
be implemented that can be used by the
company to accept complaints from the
consumers regarding security and fraud
issues related to the company
Customer Service
department
Student’s Name Student ID
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

MITIGATION PLAN 10
(Tomlinson, 2010).
Develop a security and
fraud response
management plan
The management of the firm must
develop a security and fraud response
management plan in order to answer
and solve the queries of the consumers
regarding the occurrence of such issues
(Costa, 2011).
IT department and
customer service
department
Create awareness The marketing department must create
awareness among the consumers
regarding the email and phone scams
that are taking place in the recent days
(Cheeseman, 2013). For instance, the
management can send mails or message
to the customers stating that the
company will never ask for personal
information and high security data
(Tomlinson, 2010). Additionally, the
company will never offer any sort of
suspicious offers or price money to the
consumers.
Customer service
department
Student’s Name Student ID
(Tomlinson, 2010).
Develop a security and
fraud response
management plan
The management of the firm must
develop a security and fraud response
management plan in order to answer
and solve the queries of the consumers
regarding the occurrence of such issues
(Costa, 2011).
IT department and
customer service
department
Create awareness The marketing department must create
awareness among the consumers
regarding the email and phone scams
that are taking place in the recent days
(Cheeseman, 2013). For instance, the
management can send mails or message
to the customers stating that the
company will never ask for personal
information and high security data
(Tomlinson, 2010). Additionally, the
company will never offer any sort of
suspicious offers or price money to the
consumers.
Customer service
department
Student’s Name Student ID
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

MITIGATION PLAN 11
Ethical and Legal Issues
In the E-commerce business platform, Style Icon has to deal with a number of ethical
issues related to information technology that have been applied to the eBusiness. Although
vastness of internet popularity has delivered significant platform for E-commerce business, it is
the responsibility of the E-commerce providers to offer safe and secure transactions and access.
Effectively, the ethical and legal issues associated to the E-commerce business in Australia have
been discussed herein below:
Web Tracking
Web tracking has been identified as one of the major ethical challenges to any eBusiness.
E-commerce businesses draw customer related information using the log files. Furthermore, by
using cookie analysis and tracking software, E-commerce websites can trace the online
preferences and movement of the individual consumers (Salehnia, 2012). In the meanwhile, such
online application and tracking activities should be performed following ethical guidelines.
Privacy of Consumers
During the tracking and monitoring of the activities of the online consumers, privacy of
the visitors should be maintained by the E-commerce business. Precisely, the privacy policy of
the eBusiness must confirm that the portal will not save the sensitive and confidential data and
information of the clients following the ethical guidelines.
Internet Fraud
E-commerce fraud can be identified as one of the leading legal issues to be tackled by
any eBusiness. Therefore, as per the Australian Statutory Regulations, E-commerce business
Student’s Name Student ID
Ethical and Legal Issues
In the E-commerce business platform, Style Icon has to deal with a number of ethical
issues related to information technology that have been applied to the eBusiness. Although
vastness of internet popularity has delivered significant platform for E-commerce business, it is
the responsibility of the E-commerce providers to offer safe and secure transactions and access.
Effectively, the ethical and legal issues associated to the E-commerce business in Australia have
been discussed herein below:
Web Tracking
Web tracking has been identified as one of the major ethical challenges to any eBusiness.
E-commerce businesses draw customer related information using the log files. Furthermore, by
using cookie analysis and tracking software, E-commerce websites can trace the online
preferences and movement of the individual consumers (Salehnia, 2012). In the meanwhile, such
online application and tracking activities should be performed following ethical guidelines.
Privacy of Consumers
During the tracking and monitoring of the activities of the online consumers, privacy of
the visitors should be maintained by the E-commerce business. Precisely, the privacy policy of
the eBusiness must confirm that the portal will not save the sensitive and confidential data and
information of the clients following the ethical guidelines.
Internet Fraud
E-commerce fraud can be identified as one of the leading legal issues to be tackled by
any eBusiness. Therefore, as per the Australian Statutory Regulations, E-commerce business
Student’s Name Student ID

MITIGATION PLAN 12
firms have to follow the guidelines and regulations stated in the Australian Consumer Law (Cth).
During the E-commerce business set up, the obligation of consumer law and cyber security terms
must be followed so that internet fraudulent through E-commerce portals can be avoided (Nasir,
2014).
Copyright
In developing the E-commerce business, the management of Style Icon must identify the
copyright laws that are implemented to protect the intellectual property of any business (Nasir,
2014). For instance, in case of purchasing software for commercial purpose should be utilised as
per the copyright laws. Also, copying contents for developing E-commerce portal should be
avoided to refrain from copyright laws.
Domain Names
In an E-commerce business, contest over the domain name can be termed as one of the
leading legal issues. Internet addresses of the E-commerce portals should be checked and
verified so that domain names cannot create untoward legal challenges (Cross et al., 2012).
Domain names are considered as trademark of a business. Hence, similar domain names should
be avoided to evade legal consequences.
Solutions for addressing the ethical and legal issues
In order to protect the E-commerce site from potential ethical and legal issues, security
experts’ solution and technological assistance must be taken into account. In the underlying
section, some of the solutions have been described as follows:
Student’s Name Student ID
firms have to follow the guidelines and regulations stated in the Australian Consumer Law (Cth).
During the E-commerce business set up, the obligation of consumer law and cyber security terms
must be followed so that internet fraudulent through E-commerce portals can be avoided (Nasir,
2014).
Copyright
In developing the E-commerce business, the management of Style Icon must identify the
copyright laws that are implemented to protect the intellectual property of any business (Nasir,
2014). For instance, in case of purchasing software for commercial purpose should be utilised as
per the copyright laws. Also, copying contents for developing E-commerce portal should be
avoided to refrain from copyright laws.
Domain Names
In an E-commerce business, contest over the domain name can be termed as one of the
leading legal issues. Internet addresses of the E-commerce portals should be checked and
verified so that domain names cannot create untoward legal challenges (Cross et al., 2012).
Domain names are considered as trademark of a business. Hence, similar domain names should
be avoided to evade legal consequences.
Solutions for addressing the ethical and legal issues
In order to protect the E-commerce site from potential ethical and legal issues, security
experts’ solution and technological assistance must be taken into account. In the underlying
section, some of the solutions have been described as follows:
Student’s Name Student ID
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





