Online Businesses Term Paper

Pages: 11 (2846 words)  ·  Style: Turabian  ·  Bibliography Sources: 15  ·  File: .docx  ·  Topic: Business

Threats to Online Businesses

The internet has forever changed the manner in which people operate in our society. The internet has also had a profound effect upon the ability of business owners to have instant access to consumers on an international level. As a result, the presence of online businesses has increased dramatically in the past five years. The new influx of online businesses has also resulted in an increase in threats associated with these businesses. The purpose of this discussion is to examine the front-end and back-end threats associated with the online business industry. In addition the research will compare and contrast the strategies of EBay and Amazon in eliminating their losses and gaining market share in the U.S. Let us begin our discussion with a brief overview of online businesses.

Overview of Online businesses

There are now thousands of businesses that are involved in ecommerce. Some of these businesses also have traditional stores, while others such as EBay and Amazon operate solely on the internet. According to an article found in the Journal of International Business Studies, even though the dotcom bust meant the end of many online businesses it did not mean that ecommerce could or would not become a lucrative form of business.

Indeed, companies such as EBay and Amazon have proven that the internet can be a very lucrative place. To this end the article contends that many entrepreneurs choose to conduct business online because of the inherent benefits associated with the internet. For instance, the article positsBuy full Download Microsoft Word File paper
for $19.77

Term Paper on Online Businesses Assignment

The e-commerce corporations (EGGs) are unique in four ways. First, from their inception, ECCs have multinational accessibility. Second, EGGs compete not just with domestic firms but also with firms all over the world. Third, these new breed of Internet-based multinationals (ECCs) are largely small or medium sized firms that strategically use complementary assets through networks of partnerships and alliances. Finally, unlike traditional multinationals, EGGs on the Internet have a unique set of advantages based on network resources, open accessibility, innovative entrepreneurship, and information sharing."

Indeed the internet offers businesses a unique set of opportunities to reach customers in an unprecedented manner. Although these opportunities create a platform upon which businesses can become extremely successful, it has also created a plethora of threats. The next section of this discussion will focus on specific threats related to the front-end and back-end systems of online businesses.

Front-end and Back-End System Threats

Every online business has to deal with threats related to how their business is run. One of the primary threats that internet businesses face has to do with front-end and back-end systems. Front-end systems refer to a workstation or group of workstations that supply operators with the ability to network with a large-scale computer system. The back end system refers to business and legacy systems that support inventory, order processing, and receivables for both buyers and suppliers in Business-to-Business ecommerce.

Threats to Front End Systems

According to an article entitled "What is E-commerce," the threats to front end systems include the following Web Server or Internet Connection overload due to unforeseen demand for access causing a loss in performance or problems with the system. This threat to the front end system can lead to a loss if revenues for an online business. This loss of revenue occurs because consumers may choose to do business with another internet company.

Web sites that have the wrong price or product information. This is a threat to online businesses because profits can be eroded if products are sold at a price that is not correct.

Disclosure of private information that is often held within a website. This information could include personal data such as phone numbers, addresses and credit card information. This threat usually exists when security features are not installed properly.

This is perhaps the single most prevalent threat to online businesses, because identity theft is a serious problem that can ruin the credit of the victim. Identity theft is defined as "the practice of using the identity of another to obtain credit. After the identity thief defaults, lenders and credit bureaus attribute the default to the impersonated consumer."

Web pages that have been changed to display obscene or pornographic materials. This can occur when a system is vulnerable and is infiltrated by hackers. These individuals often have the capacity to alter the contents of a web page. When this occurs online businesses can loose customers because they may be offended by the content and never return to the site.

Failure of the web server because of software or hardware is unreliable or because there are operational mistakes. This could cause an online business to loose their reputation because such problems tend to draw a great deal of attention in media outlets.

All of these threats are present for online businesses as it relates to front end systems. There are many tactics that can be used to minimize these threats, but in most cases these threats cannot completely be eliminated. In addition to front end threats, online businesses also have to content with back end threats. According to the article "What is E-commerce" these threats are as follows

Failure to connect front end and back end systems. This can have the effect of causing incorrect or out of date information to be displayed on websites. For an online business this threat means that commitments made to customers cannot be realized.

An unexpected number of transactions from ecommerce web servers degrading the performance of essential internal systems. This threat means that critical business functions will be disturbed and the functions that these systems depend on will also be disrupted.

Internal systems vulnerable to unauthorized access through the internet. This threat means that there will be serious disruption of business through hackers corrupting critical information.

Front-end applications can also be subverted to pass incorrect information to back end systems that makes them functions in ways that are not desirable.

This is a threat because it has the potential to cause important business systems to fail because they can not handle the onslaught of unexpected data.

Vulnerability analysis and assessment tools

To analyze how vulnerable a company is to certain threats, companies perform vulnerability analysis and rely upon certain assessment tools.

As far as vulnerability analysis or risk assessment is concerned, online businesses must use risk management to find out what threats are present and how to reduce the presence of such threats. Vulnerability analysis can be used to measure the risks associated with many different types of threats that an organization may face.

According to the book "Surviving Security: How to Integrate People, Process, and Technology" such an analysis can be utilized to check an organization's system for vulnerabilities and also the likelihood that a vulnerability will be effectively exploited. The analysis of these vulnerabilities should not only include electronic risks, but also physical risks, that might involve an individual using a floppy disk and steal data or modifying the system. The book also explains that Vulnerabilities are the main method a threat event can use to cause harm or loss. According to Charles LeGrand, a vulnerability is the absence of or ineffective implementation of safeguards or controls. For example, the failure to adequately safeguard a known hole in a Web server might allow an attacker or business competitor to shut down your organization's Web server, your main means of revenue."

Also, the author asserts that in addition to analyzing the host- and network-level threats, online businesses should view the applications running on the company's systems, including both Web and e-mail servers. The author also asserts that most successful attacks usually come as a result of mis-configured or un-patched Web servers. This aspect of an analysis guarantees that an organization covers the main points of attack for networks and systems.

Techniques used in Vulnerability Analysis

There are three primary techniques that are used to analyze vulnerability. These techniques include the following Informal Approach- the advantage of this approach is that it requires no additional skills for carrying out the analysis. In addition, this type of analysis can be performed quickly. There are also some disadvantages associated with this approach. For instance, the analysis may be incorrect or skewed because the analysis is ore subjective than objective.

In addition, because the analysis is not detailed some vulnerability may be overlooked.

Baseline Approach -- the primary advantage of this approach is the minimal amount of time and resources that are required. Additionally, this approach features pre-assessed safeguards that are recommended in manuals. Another advantage of this approach is that it provides security across the entire organization. The disadvantage of this approach is that the security levels may be too low or too high.

Detailed risk analysis -- the primary advantage of this approach is that the safeguards are usually justifiable. In addition, there security level prescribed to each level of the system. The primary disadvantage of this type of assessment is the time, effort and expense associated with carrying out such an analysis.

As it relates… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (11 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Business Plan Business Plan

Ecommerce the Online Business Idea Term Paper

Business Plan for a Company Business Plan

Business Research Analysis Case Study

Business Plan for the Farmery Business Plan

View 200+ other related papers  >>

How to Cite "Online Businesses" Term Paper in a Bibliography:

APA Style

Online Businesses.  (2006, December 7).  Retrieved September 22, 2020, from

MLA Format

"Online Businesses."  7 December 2006.  Web.  22 September 2020. <>.

Chicago Style

"Online Businesses."  December 7, 2006.  Accessed September 22, 2020.