Embark on a journey through the realms of E-Business with our in-depth report, covering key aspects critical for success in the digital landscape. The report is structured into four sections, each shedding light on crucial facets of E-Business: Cloud Computing, E-Commerce Presence, E-Commerce Security Environment, and E-Commerce Retailing.
In the Cloud Computing section, we explore the deployment models – public, private, hybrid, and community clouds – and their impact on operational costs, data security, and business continuity. We delve into the benefits and risks associated with cloud computing, emphasizing its transformative power and potential pitfalls.
Moving on to E-Commerce Presence, the report unveils the rationale behind the establishment of an online bookstore. Targeting a diverse audience, from students to researchers, we discuss the strategic approach to creating a universal store with a wide-ranging book collection. The low capital requirements and considerations for both domestic and international markets are highlighted.
E-Commerce Security Environment takes center stage as we address the potential risks associated with online transactions. Loss of control, data security concerns, and the rising threat of phishing attacks are dissected. The report provides actionable insights into achieving a secure E-Commerce environment, emphasizing real-time categorization, resolution, and fraud detection measures.
The final section, E-Commerce Retailing, examines the challenges of integrating online and offline sales. Issues such as over-demand, capital constraints, and service quality are discussed, offering recommendations for mitigating these challenges. The report concludes with strategic goals for the business and a forward-looking perspective on the industry.
This comprehensive assessment serves as a valuable resource for businesses transitioning into the digital sphere, offering insights, recommendations, and a roadmap for success in the dynamic world of E-Business.
1
E – Business
2
Table of Contents Executive summary ....................................................................................................................................... 4
Introduction ................................................................................................................................................... 5
Report Section 1- Cloud computing.............................................................................................................. 6
Report Section 2- E-commerce Presence ...................................................................................................... 8
Report Section 3- E-commerce Security Environment ............................................................................... 10
Report Section 4 – E-commerce Retailing .................................................................................................. 13
Conclusions and Recommendation ............................................................................................................. 15
References ...................................................................................................... Error! Bookmark not defined.
Letter of Transmit
3
Declaration: I declare that:
This assignment is my work and has never been submitted to any academic institution or copied
from another person’s work only under circumstances where due acknowledgment has been
made in the text. I have done this assignment individually with no collaboration or assistance
from any individual. I hold a copy of this work that I can produce in case the original is
misplaced or damaged.
Signature:
Date:
4
Executive summary
Cloud computing is an internet supported activity depending on resource sharing rather than
having to handle applications by many devices. Private cloud authorizes only the users with
authorization, and it gives companies great and direct control of their data. The resources in a
hybrid that are not critical to the development and test workloads can be hosted in the public
cloud owned by a third party. Critical workloads can only be housed in an internal cloud. One
benefit of cloud computing is the low operational costs for IT. The business can rent additional
server space for some time instead of maintaining servers without worrying about the upgrading
of resources. There is also no hardware or software installation and maintenance. Data recovery
is a risk factor associated with cloud computing. Hosting the computing resources and data in the
cloud makes the provider's recovery capabilities a significant aspect of the business recovery
plans. Data security is considered a key benefit that many cloud providers have usually cited as
their marketing efforts taking advantage of the many companies with no capabilities to manage
to secure their data and systems. Transactions with risk scores exceeding certain thresholds that
is defined by the business owner of the fraud expert can automatically be placed into various
categories for further actions. The transaction can be accepted immediately or rejected but can as
well be flagged for a manual evaluation if it is among the two classes
5
Introduction
Cloud computing is an internet supported activity depending on resource sharing rather than
having to handle applications by many devices. The cloud can serve many functions over the
web including storage and virtual servers, applications and allowing desktop applications. Online
bookstores have become a first hit in the current century because the books are offered at low
prices than in the physical stores and because there is no significant difference between the
online and the offline purchase. Online book retailer gives a preview that reveals more about the
book than the physical appearance and quick glance of its content. Students, researchers and
creative writers will be among the target audience for the business. Students will range from pre-
school students to university students. The online book retail will accommodate books from the
cheap school to university, making it a universal store (Vacca, 2017).
6
Report Section 1- Cloud computing
Cloud computing is an internet supported activity depending on resource sharing rather than
having to handle applications by many devices. Through the use of internet enabled devices,
cloud computing allows the functions of application software. The cloud can serve many
functions over the web including storage and virtual servers, applications and allowing desktop
applications. Through utilizing the advantage of sharing of resources, cloud computing has
enabled consistency and economies of scale. The types of cloud are classified in the contexts of
two models; cloud computing service models and cloud computing deployment models.
Cloud computing deployment models
These represent the specific class of cloud environment and majorly differentiated by
proprietorship, size, and access. Many firms are willing to implement cloud considering it
reduces the expenditure and cut costs. While selecting the deployment that can best fit a
business, it is recommended to know and understand all the four models of cloud computing.
a. Public cloud
A cloud where the services are delivered over the network that has a free usage for the public.
The model is a genuine representation of cloud hosting where the service provider gives their
services and infrastructure to many clients. The public cloud can best be applied to the
businesses that need one to manage the load that is the application that is SaaS-based and also
manages the applications that are consumed by the users. The model is considered economical as
it is associated with reduced capital overheads and also cut operational costs (Kandukuri, Paturi
and Rakshit, 2009).
b. Private cloud
Is also known as an internal cloud and is a platform for cloud computing implemented on a
secured cloud-based environment safeguarded by a firewall controlled by an IT department
belonging to a particular corporate. Private cloud authorizes only the users with authorization,
and it gives companies great and direct control of their data. Defining the composition of a
private cloud is difficult because it has significant differences when classified according to
services regardless of whether the computers are internally and externally they all provide
resources from a pool of private cloud services. The obstacles associated with security can be
evaded in a private cloud, but in the case of a natural disaster, or a case where the data is
internally stolen, the private cloud may be exposed to vulnerabilities.
7
c. Hybrid cloud
Is a cloud computing model that is integrated and can be an arrangement of two or more servers
bound together but are still categorized as individual entities. The benefits of the multiple
deployment models can be seen in a hybrid cloud. The model can cross isolation and overcome
the boundaries placed by the provider, and as such, it can only be categorized as public, private
of a community cloud. It allows the users to expand their capacity and capabilities by the
integration, assimilation or customization with another cloud package. In a hybrid cloud model,
the resourced are managed and allocated as in-house or as external providers. It represents an
adaptation in two platforms where the workloads are transferred between the private and public
clouds as per the need and demand. The resources in a hybrid that are not critical to the
development and test workloads can be hosted in the public cloud owned by a third party.
Critical workloads can only be housed in an internal cloud. Businesses focused on security and
demand for their presence can use the hybrid cloud as a business strategy. Companies can use the
model for big data processing. A private cloud can host sales, business, and other data and can as
well start analytical queries regarding public cloud which is effective to meet demand spikes.
d. Community cloud
Is a cloud that its setup is shared between companies belonging to an individual community? It is
a model with a multi-tenant setup shared among different organizations owned by a particular
group that has similar privacy, performance, and securities. The first agenda for these
communities is to achieve their business stated objectives. Community cloud can be managed
internally or via a third party provider. It is a model that best suits companies and firms that work
on joint ventures, tenders, and research that needs a centralized cloud computing capabilities for
managing and implementing similar projects.
Benefits and risks of cloud computing
One of the benefits is low capital costs as companies can give unique services through the use of
large-scale computing resources from cloud service providers. Also, it can remove the IT
capacity to be able to meet the peak and the demands of the fluctuating service while still paying
for the actual capacity. Another benefit is the low operational costs for IT. The business can rent
additional server space for some time instead of maintaining servers without worrying about the
upgrading of resources. There is also no hardware or software installation and maintenance. The
optimized IT infrastructure provides quick access to the required computing services.
8
The associated risks with cloud computing include the environmental security where the
concentration of the resources and the cloud users are a security threat. Their size and
significance make the cloud environment a target by the virtual machines, the malware, and other
cloud attacks. There is also data privacy and security issues were hosting of confidential data
with the cloud service providers involves the transfer of a right amount of data over the data
security to the provider. The provider has to understand the business desires for data privacy and
safety. Data availability and business continuity is another risk factor. It can be unfortunate for
the business if there at any time occurs internet failure. The cloud provider has to ensure that
there is a full-time internet connectivity and when a vulnerability has been identified, there is a
need to terminate all the access to cloud provider until the case is rectified. Data recovery is also
a risk factor associated with cloud computing. Hosting the computing resources and data in the
cloud makes the provider's recovery capabilities a significant aspect of the business recovery
plans. A business owner has to know the data recovery abilities and asks the provider to test their
effectiveness (Jajodia, 2016).
Report Section 2- E-commerce Presence
Main idea behind the online retail
Online bookstores have become a first hit in the current century because the books are offered at
low prices than in the physical stores and because there is no significant difference between the
online and the offline purchase. However, many people have since shifted to online purchasing
as they can easily find their desired books without having to locate a physical bookstore. Online
bookstores are available at a click with available internet connectivity and a computer or tablet.
In this century, many people have gone digital with the advance in technology, and as such,
many households have internet access and digital devices to use over the web. Many students are
also using the online platform for various purposes, and it seemed wise to introduce an online
bookstore to also catch their attention. The online bookstore also makes work easier during
purchase as it is easier to scan the book and make a selection. Online book retailer gives a
preview that reveals more about the book than the physical appearance and quick glance of its
content.
The most appeal for the online bookstore is the low prices. The stores operating exclusively
online can afford to reduce their prices because they do not buy or rent space for the books or
there is no hiring of a team of employees to serve the clients. Also, when there is an order from
9
the online store, it does not have to be physically in the warehouse, but the order can be
forwarded to the publisher or the wholesalers. The process reduces the operational costs allowing
online retailers to sell their books at significantly low prices and still earn some profits. The
stores make it convenient to the clients as the product is just a click away and no need to hustle
around looking for a store to get the book.
Money and funding
The business does not need a lot of capital to be able to run. It only needs a website and a
network with different publishing institutions where the books will be coming from. The primary
requirement from the business is a well-published website that will be an interface between the
customers and the book retailer. The website have already been made, and it is just a matter of
launching it, and all will be good to go. However, there will be small capital needed to be able to
get a client the ordered books from the retailers. The capital will be generated from the savings
and contributions from friends and family. In cases where there will be bulk purchases, and there
will be a huge amount, the funding will be sourced from the banks that will give loads at a fair
rate.
Target audience
The target market for the business will be people from various walks of life. The store will have
different books for different clients. Students, researchers and creative writers will be among the
target audience for the business. Students will range from pre-school students to university
students. The online book retail will accommodate books from the low school to university,
making it a universal store. The store will offer services to people across all gender as long as a
customer finds a book they intend to buy. People from different locations can buy the books and
delivery will be done for individuals who wish to have the hard copies, and soft copy pdf will be
sent to clients who prefer pdf copies. For international clients, the books can be delivered
through shipping that will off course come with additional shipping charges. The store offers
books for people with different income levels. Low, middle and high-income earners can all
access books from the online store. Mostly, the target customers are those whose lifestyle
revolves around the use of the internet. These are the people who would find it easier to make
orders online as they have all the resources to access the website. Purchasing habits will not be
an issue. The store welcome both active, dormant, and new customers and all will be served
equally.
10
Size and characteristics of the market
The size of the market is never an estimate as millions of people use the internet globally, and
they all have access to the website as it is hosted on a public cloud. Anyone who wishes to
purchase from the online store is welcome from different parts of the world as deliveries are
made globally via shipping. The market can be divided into many potential buyers with regards
to their age and gender. Apart from the academic resources, other books are read for general
education and others for lifestyle and fun. These books are categorized as per the gender
difference as a certain gender is more likely to purchase specific books than the other. There is
also an occupational difference; there are students and researchers who also wish to purchase
books. Students will be served on a student’s platform on the website, and they will have prices
suiting their affordability. There are the domestic and international buyers who also have a
different price range as international clients have to pay for shipping.
Strategic and development timeline goals
As the business commences, there will be a close monitor on the customer preferences and
behavior regarding the services offered. There will be a popup survey menu on every new and
existing customer to be able to get feedback on what the client’s desires or expect from the
website. All the feedback will be assessed, and the desires and preferences of the customers will
be highly considered. Transformations will frequently be made during the system maintenance to
make the website more attractive and promising for the clients. The business is expected to grow
within a year and make the best interest in its first half as there is every reason to believe that the
customers will enjoy the services from the site.
Report Section 3- E-commerce Security Environment
As much as e-commerce has been associated with benefits towards the clients and the business
owner, there are several security issues associated with the business that has to be addressed to
be able to have a smooth running of the business. There are security risks facing the e-commerce
that business owners and service providers have to ensure are controlled to have a secured
transaction over the internet. Some of the associated risks are;
Loss of control
There are chances of a possible loss of control of the data being transferred via the cloud and the
network availability from the internet. In the traditional setting, companies have the ability to
evaluate and adjust their systems to be compliant with the regulations and standards set.
11
Companies sending data to a cloud provider in the European member states has to be following
the data protection requirements by the EU. There are many unethical internet users who can
pose many risk challenges to the online business systems. The online book retail website can
suffer in the hands of unauthorized and malicious persons who have hidden interest. These
unauthorized access can interfere with the data from the website by removing some of the
important information or posting false information on behalf of the business owner. The data that
the clients will-will see on the website will be false, and they can be trapped into false purchase
or even fraud cases. The business owner, in this instance, can be deprived of the control of the
website, and many unethical factors can happen before regaining control of the online business.
The customers would have been tricked into a fraud business, and the business will have lost its
reputation and its potential clients (Mahmood, 2014).
Data security
Data security is considered a key benefit that many cloud providers have usually cited as their
marketing efforts taking advantage of the many companies with no capabilities to manage to
secure their data and systems. However, outsourcing the data to a single provider comes with
aggregated risks. Many companies have failed to recognize their responsibility to secure their
data before it can be sent to the cloud and they also fail to acknowledge the fact that the cloud
providers will not guarantee their security of the data. In the business environment today, there is
a growth in the use of big data and analytics that is followed rapidly by the growth of the value
of the personal information stored by organizations in the cloud. Organizations storing the
Personal Identifiable Information (PII) are expected to note the growth of the definition of what
constitutes the PII as many data are still being categorized within the definition. When the data is
not properly secured, it might expose the organization when the statutes and regulations demand
the protection of elements as zipping codes. However, the significant aspect to note is that the
growth of the definition of the personally identifiable information and the combination of these
elements could result in greater risks.
Phishing
This is another of the risks associated with e-commerce business, and it refers to the spoof emails
and other tricks attempting to make people give their personally identifiable information. It is a
type of identity theft that employs both the social engineering and technical efforts to steal access
information or other information that can be sold to a third party using specialized chat rooms
12
that have been established for the purpose of selling information of such kinds. Selling the
information on is said to reduce the risks of being apprehended as it minimizes the link between
the hacker and the users of the information to gain the unauthorized access to accounts and
profiting from them. The social engineering schemes employ the spoof emails that lead
customers to fake websites that have been designed to trick people into exposing their financial
data. The Technical subterfuge schemes have crime ware planted onto computers to allow the
unethical experts to steal the credentials by using the keylogging systems. Phishing has been
since a serious and rapidly increasing spam and also appears to be among the major techniques in
business and consumer identity theft.
Achieving a secure e-commerce environment for your online business
Management of the post-purchase transactions
Optimal fraud service offering should entail a system that reviews the operations under the
“accept” and “reject” thresholds to allow the merchant staff to identify the appropriate activities
in an operation with a single dashboard. The panel can include many tools and features that assist
the merchants not only with the first resolutions of the operation but with a follow-up activities
as reporting and performance analysis. The life cycle of fraud done not start and stop with the
attempt to purchase. To actively handle the fraud incidences, business people have to find a
database that can maintain a detailed record and be used to understand transactions trending over
prolonged period. Representing and resolving the fraud cases can be a technical issue and time to
consume. Dashboards utilized by the merchants can help extract the details of a transaction to
help with the re-presentment efforts for more money.
Real-time categorizing and resolution
Transactions with risk scores exceeding certain thresholds that is defined by the business owner
of the fraud expert can automatically be placed into various categories for further actions. The
transaction can be accepted immediately or rejected but can as well be flagged for a manual
evaluation if it is among the two classes. The categorization process can need manual efforts to
be compatible with the authorization or the fulfillment actions depending on the expert providing
the solution to fraud cases. Many businesses have been fortunate to allow fraud services to
operate in-line with the payment verification flow that needs very low intervention by the
merchant and streamlining the business processes (Bavisi, 2009).
Fraud detection measures
13
The merchant can also seek to install systems that detect fraud incidences like the unauthorized
access to their accounts of activities. The system can also be in place to identify genuine buyers
and fraudsters and raise the alarm before any transaction is complete. The system will need to
have full-time surveillance to be able to have a quick response in case any alarms are raised. The
system should be able to protect both the merchant and their customers from fraud cases.
Report Section 4 – E-commerce Retailing
Challenges online and offline integration in business
Both online and offline sales are important in business as every business needs to make profits in
the industry and become an outstanding enterprise and a competitive factor in the market.
However, in the integration of both online and offline sales in the online book retail market can
be associated with certain challenges. However, the online platform can also be challenging and
tricky to attract and retain customers.
Online and offline integration
Over demand of books
By selling online and offline, the business attracts many clients in the store. It is a positive
reflection of business, but it is to the disadvantage of the brand's reputation in the market. Being
a startup business, there are possibilities that the books in the store are not enough to satisfy the
needs of all the clients. As such, there will be an over demand in the market while the business
will have little to offer to the customers and as such, some of the customers will not be served
within the desirable timeline especially the online clients who make orders online and expect
deliveries within a specified time. Also, the customers visiting the stores can become wild and
irritated when they visit the store only to find the book they are looking for, that they saw online
that it is available, it out of stock. The business risks losing many customers because of this
factor. As such, it is advisable to remain focused in online sales until the company is stable and
has evaluated the market and the buying habits of the customers (Ionita, Litoiu & Lewis, 2013).
Lack of enough capital
Because customers will be many from both online and offline platforms, the business will need
more money to be able to purchase enough books and make them available for the customers in
the store. As the industry is finding its feet in the market, and that it has to assess and evaluate
the market, there will be a major problem as customers will exceed the books in the store and
there will be no capital to supply enough of them to satisfy all the clients. The business will be at
14
risk of losing clients at an early stage in the firm, and it will be difficult to attract more customers
or even retain the customers. There will also be a problem in recruiting staffs to assist in offline
sales as they will need to get paid while the business will not have enough money to sustain
them. As a result, there will be a lack of enough labor to serve the customers.
Poor services
While using the online platform alone, the business will need no team of employees to serve the
customers as they will be using the website as an interface to connect to the merchant. With the
incorporation of the offline services, it means the business has to find the extra human resources
to be able to serve the customers who will be flowing in and out of the stress. As such, the
business risk offering poor services as customers will experience delays and congestion waiting
to be served. The customers will most likely not like the services and will look for another
bookshop to buy their desired books.
Online sales
Even though the online store can be quick and simple than the physical stores, the absence of a
location for business makes it more costly to drive customers through to the business. The
enterprise will have to accept large marketing budgets compared to the offline stores. There will
be a high need to allocate resources and time to marketing to be able to create awareness of the
existence of the business since there will be no interactions on a face-to-face basis. The business
will need to go extra miles to be able to give the customers confidence in the store and assure
them of the worthiness of the business. To earn the trust of the customers is usually a challenge
as many people have turned out to be fraudsters especially in the online business. Most of the
customers will be reluctant to purchase goods from an online store that has not been on business
and had no reviews yet. Cases of loss of money over the online platform will also be another
issue that will prevent many customers from purchasing from a new online store. Assuring the
clients that transaction over the website is safe and free from hackers and other cyber-attacks will
be among the key challenges in the online business (Krutz & Vines, 2013).
A good number of customers love bargaining before making their purchases. As such, they will
shy off from using the inline marketing sites and will prefer going to a physical store to make the
purchases. While at the physical stores, the customers get assistance from the sales team and
enjoy interacting with them. This can be a big hit to online retain if many clients prefer having a
sales assistant to take them through the product before buying. Online purchases also have terms
15
and conditions that can be a barrier to many customers. While buying in a physical store, one can
easily return a product and get a refund. The online store is different as the terms and conditions
make it have a long process before one can get a refund from the company. There will be many
documents to be given as a proof of purchase, and the verification process can be long and
tiresome.
Conclusions and Recommendation
As much as e-commerce has been associated with benefits towards the clients and the business
owner, there are several security issues associated with the business that has to be addressed to
be able to have a smooth running of the business. The online book retail website can suffer in the
hands of unauthorized and malicious persons who have hidden interest. These unauthorized
access can interfere with the data from the website by removing some of the important
information or posting false information on behalf of the business owner. Organizations storing
the Personal Identifiable Information (PII) are expected to note the growth of the definition of
what constitutes the PII as many data are still being categorized within the definition.
Transactions with risk scores exceeding certain thresholds that is defined by the business owner
of the fraud expert can automatically be placed into various categories for further actions. The
transaction can be accepted immediately or rejected but can as well be flagged for a manual
evaluation if it is among the two classes. Both online and offline sales are important in business
as every business needs to make profits in the industry and become an outstanding enterprise and
a competitive factor in the market. Because customers will be many from both online and offline
platforms, the business will need more capital to be able to purchase enough books and make
them available for the customers in the store. Even though the online store can be quick and
simple than the physical stores, the absence of a location for a business makes it more costly to
drive customers through to the business. The enterprise will have to accept large marketing
budgets compared to the offline stores.
It is recommended that the business should ensure that its online platform has the capability to
attract customers and assure them of a safe and secured online transactions. This is after it has
been identified that many potential online buyers fear being victims of fraud cases and loss of
money to fraudsters.
16
The business also have to implement security measures to protect both the merchant and the
clients. The merchant can also seek to install systems that detect fraud incidences like the
unauthorized access to their business accounts. The system can also be in place to detect genuine
buyers and fraudsters and raise alarm before any transaction is complete. Optimal fraud service
offering should entail a system that reviews the transactions under the “accept” and “reject”
thresholds to allow the merchant staff to identify the appropriate activities on a transaction with a
single dashboard.
There has been a challenge of people opting for offline business because there are sales
assistance to assist in purchasing. The online platform can also have online support assistant who
should be there to answer every questions customers have and assist them in other ways before
they can make their purchases. This will make online purchasing more comfortable than
expected.