This document discusses the risks and threats associated with implementing e-business. It begins by defining e-business as conducting business processes online through activities like online shopping, banking, advertising, and more. It then outlines several common risks, including security risks from data breaches and malware, operational risks from systems failures and supply chain disruptions, reputational risks from negative customer reviews and social media backlash, legal and regulatory risks from non-compliance with privacy and security laws, financial risks from investment costs and payment processing fees, and competitive risks from new entrants and changing consumer behaviors. Examples are provided for each risk category. The document concludes by suggesting mitigation strategies like cybersecurity measures, business continuity planning, legal compliance, reputation management
The presentation is part of a series of Lectures on Management Information systems at the Department of Accounting, University of Jos. It elucidates the concept and practice of Ecommerce and its implications for the Accounting profession.
DOI: http://dx.doi.org/10.13140/RG.2.2.24508.36486
Updated at: https://www.researchgate.net/publication/353654999_E-commerce
The presentation is part of a series of Lectures on Management Information systems at the Department of Accounting, University of Jos. It elucidates the concept and practice of Ecommerce and its implications for the Accounting profession.
DOI: http://dx.doi.org/10.13140/RG.2.2.24508.36486
Updated at: https://www.researchgate.net/publication/353654999_E-commerce
e-commerce fastest growing trade need to manage their risks, educational purpose study especially for Risk Management business students... I recommend for ICMAP students
INTRODUCTION 351consumers are placing their orders online, but.docxmariuse18nolet
INTRODUCTION 351
consumers are placing their orders online, but companies still provide toll-free numbers for those who are hesitant to provide confidential information, such as credit card numbers, online. Airlines were among the first providers to provide a financial incentive to purchase online. Later, they shifted to an additional financial cost if toll-free numbers of support personnel were accessed to make a purchase.
Concerns about Internet security have been blown out of proportion. Although online business transactions are not perfectly secure, they are no riskier than ordering via telephone or fax. Computer hackers are similar to everyday criminals who try to find ways to circumvent security systems and procedures, although there are some additional security issues associated with electronic commerce. First, the Internet is an open network without any physical barriers to prevent theft (e.g., hidden cameras, safes, security guards). Second, the same technologies that are being used for commerce can be used to breach security (e.g., computer software used to search for passwords).
Several methods can be used to restrict access and improve security in electronic commerce. First, a form of authentication can be required through the use of some combination of account numbers, passwords, and IP (Internet protocol) addresses. Second, a firewall can be used to monitor traffic between an organization's network and the Internet. This barrier can restrict access to certain IP addresses or applications. A third method is to use coding or encryption techniques to transform data to protect their meaning. These security methods can be used individually or together depending on the level of security desired. For instance, firms that are transmitting payment information will be more inclined to use all three levels of defense. This next section covers four topics: the traits of a networked economy, the definition and scope of electronic commerce, the use of electronic marketing, and the beginning of electronic commerce.
Authentication
Verifying the appropriate access by a user through the use of some combination of account numbers, passwords, and IP (Internet protocol) addresses.
Firewall
A filter is used to monitor traffic between an organization's network and the Internet. This barrier can restrict access to certain IP addresses, applications or content.
INTRODUCTION 349
Traits of a Networked Economy
Some people view electronic commerce as a boom-and-bust cycle, but that is really not true. In the mid-1990s, there was a dramatic increase in activity in the broad field of e-commerce. Companies such as eBay, Amazon, and Expc dia provide tangible evidence of the impact that e-commerce has had on th business world. These companies, and hundreds like them, created an ecc nomic boom unlike anything seen before. It began to unravel in 2000, wit the dot-com bust." The impacts are still being felt. Most traditional comp; nies.
Electronic copy available at httpssrn.comabstract=2161742.docxtoltonkendal
Electronic copy available at: http://ssrn.com/abstract=2161742
Electronic Commerce Business Models:
A Conceptual Framework
By
Utkarsh Majmudar
Ganesh N. Prabhu
July 2000
Please address all correspondence to:
Prof. Utkarsh Majmudar
Visiting Faculty (Finance & Control Area)
Indian Institute of Management
Bannerghatta Road
Bangalore - 560 076
India
Fax: (080) 6584050
E m a i l ! utkarsh&qimbxmeUn
Copies of the Working Papers may be obtained from the FPM & Research Office
Electronic copy available at: http://ssrn.com/abstract=2161742
Electronic Commerce Business Models: A Conceptual Framework
Utkarsh Majmudar and Ganesh N. Prabhu
Abstract
The recent boom in the new economy of internet based commerce has created a large
number of firms with a variety of business models that aim to leverage the power of the
internet to further their business goals. In this paper we attempt to provide a
conceptual framework for understanding e-commerce business models on a number of
important dimensions - nature of consumer activity, nature of e-commerce activity,
target customers, targeting strategy, revenue generating modes, procfactfcerwce
delivery modes, payment collection modes, operating modes, market places,
advantage mechanisms and domination characteristics. We also examine means of
improving value proposition and net-friendliness for e-commerce activities and identify
areas where e-commerce models have not been explored or fully exploited so far.
Since the range of economic activities on the internet is vast and growing, newer
models and opportunities are likely to emerge through improvements in internet
technologies as well as innovations in their application to business contexts. Hence
any conceptual framework on e-commerce business models, including our own, can
never be comprehensive.
Electronic Commerce Business Models: A Conceptual Framework - 1 -
Electronic copy available at: http://ssrn.com/abstract=2161742
Electronic Commerce Business Models: A Conceptual Framework
Introduction
The recent boom in the new economy of internet based commerce has spawned a large
number of firms with a variety of business models that aim to leverage the power of the internet to
further their business goals. This paper provides a conceptual framework for understanding these
business models and their characteristics. The conceptual framework is shown in Figure 1.
Locating Electronic Commerce in the Internet Economy
We define electronic commerce as use of the internet medium for conducting economic
transactions. Electronic commerce is a part of a larger internet economy. Conceptually, the internet
economy can be divided into four layers (Barua etal., 1999). Each layer of the internet economy is
listed below with descriptions of the types of companies and names of some of the actual companies in
each category.
(a) Layer One: The Internet Infrastructure Layer. This layer includes companies with products and
services that help cr.
SITEC eCommerce Class 4
Title: Online Payment
Presenter: Chan Kok Long, Executive Director (iPay88)
Date: 11 August 2015
Venue: The Canvas @ Damansara Perdana
e-commerce fastest growing trade need to manage their risks, educational purpose study especially for Risk Management business students... I recommend for ICMAP students
INTRODUCTION 351consumers are placing their orders online, but.docxmariuse18nolet
INTRODUCTION 351
consumers are placing their orders online, but companies still provide toll-free numbers for those who are hesitant to provide confidential information, such as credit card numbers, online. Airlines were among the first providers to provide a financial incentive to purchase online. Later, they shifted to an additional financial cost if toll-free numbers of support personnel were accessed to make a purchase.
Concerns about Internet security have been blown out of proportion. Although online business transactions are not perfectly secure, they are no riskier than ordering via telephone or fax. Computer hackers are similar to everyday criminals who try to find ways to circumvent security systems and procedures, although there are some additional security issues associated with electronic commerce. First, the Internet is an open network without any physical barriers to prevent theft (e.g., hidden cameras, safes, security guards). Second, the same technologies that are being used for commerce can be used to breach security (e.g., computer software used to search for passwords).
Several methods can be used to restrict access and improve security in electronic commerce. First, a form of authentication can be required through the use of some combination of account numbers, passwords, and IP (Internet protocol) addresses. Second, a firewall can be used to monitor traffic between an organization's network and the Internet. This barrier can restrict access to certain IP addresses or applications. A third method is to use coding or encryption techniques to transform data to protect their meaning. These security methods can be used individually or together depending on the level of security desired. For instance, firms that are transmitting payment information will be more inclined to use all three levels of defense. This next section covers four topics: the traits of a networked economy, the definition and scope of electronic commerce, the use of electronic marketing, and the beginning of electronic commerce.
Authentication
Verifying the appropriate access by a user through the use of some combination of account numbers, passwords, and IP (Internet protocol) addresses.
Firewall
A filter is used to monitor traffic between an organization's network and the Internet. This barrier can restrict access to certain IP addresses, applications or content.
INTRODUCTION 349
Traits of a Networked Economy
Some people view electronic commerce as a boom-and-bust cycle, but that is really not true. In the mid-1990s, there was a dramatic increase in activity in the broad field of e-commerce. Companies such as eBay, Amazon, and Expc dia provide tangible evidence of the impact that e-commerce has had on th business world. These companies, and hundreds like them, created an ecc nomic boom unlike anything seen before. It began to unravel in 2000, wit the dot-com bust." The impacts are still being felt. Most traditional comp; nies.
Electronic copy available at httpssrn.comabstract=2161742.docxtoltonkendal
Electronic copy available at: http://ssrn.com/abstract=2161742
Electronic Commerce Business Models:
A Conceptual Framework
By
Utkarsh Majmudar
Ganesh N. Prabhu
July 2000
Please address all correspondence to:
Prof. Utkarsh Majmudar
Visiting Faculty (Finance & Control Area)
Indian Institute of Management
Bannerghatta Road
Bangalore - 560 076
India
Fax: (080) 6584050
E m a i l ! utkarsh&qimbxmeUn
Copies of the Working Papers may be obtained from the FPM & Research Office
Electronic copy available at: http://ssrn.com/abstract=2161742
Electronic Commerce Business Models: A Conceptual Framework
Utkarsh Majmudar and Ganesh N. Prabhu
Abstract
The recent boom in the new economy of internet based commerce has created a large
number of firms with a variety of business models that aim to leverage the power of the
internet to further their business goals. In this paper we attempt to provide a
conceptual framework for understanding e-commerce business models on a number of
important dimensions - nature of consumer activity, nature of e-commerce activity,
target customers, targeting strategy, revenue generating modes, procfactfcerwce
delivery modes, payment collection modes, operating modes, market places,
advantage mechanisms and domination characteristics. We also examine means of
improving value proposition and net-friendliness for e-commerce activities and identify
areas where e-commerce models have not been explored or fully exploited so far.
Since the range of economic activities on the internet is vast and growing, newer
models and opportunities are likely to emerge through improvements in internet
technologies as well as innovations in their application to business contexts. Hence
any conceptual framework on e-commerce business models, including our own, can
never be comprehensive.
Electronic Commerce Business Models: A Conceptual Framework - 1 -
Electronic copy available at: http://ssrn.com/abstract=2161742
Electronic Commerce Business Models: A Conceptual Framework
Introduction
The recent boom in the new economy of internet based commerce has spawned a large
number of firms with a variety of business models that aim to leverage the power of the internet to
further their business goals. This paper provides a conceptual framework for understanding these
business models and their characteristics. The conceptual framework is shown in Figure 1.
Locating Electronic Commerce in the Internet Economy
We define electronic commerce as use of the internet medium for conducting economic
transactions. Electronic commerce is a part of a larger internet economy. Conceptually, the internet
economy can be divided into four layers (Barua etal., 1999). Each layer of the internet economy is
listed below with descriptions of the types of companies and names of some of the actual companies in
each category.
(a) Layer One: The Internet Infrastructure Layer. This layer includes companies with products and
services that help cr.
SITEC eCommerce Class 4
Title: Online Payment
Presenter: Chan Kok Long, Executive Director (iPay88)
Date: 11 August 2015
Venue: The Canvas @ Damansara Perdana
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
test test test test testtest test testtest test testtest test testtest test ...
Infomation Technology class Presentation.pptx
1. Introduction To Information Technology
(Risk/Threats in E-Business Implementation)
Presented To:
Ma’am Sumaira Aman
Presented By:
13104 M. Ahmad
13117 M. Maymoon Ali
2. What Is E-business:
• E-Business, also known as Electronic Business,
refers to the conduct of business processes online,
encompassing a wide range of activities.
• It utilizes the internet, web, to facilitate buying and
selling goods and services, advertising, customer
communication, and more.
Here are some common examples of e-business
activities:
Online shopping, Online banking, Online advertising,
Customer service, Supply chain management, Human
resources, Marketing and sales.
3. Risks And Threats In E-business Implementation:
• While e-business offers significant benefits, its implementation
also comes with various inherent risks and threats.
Here are some Risk/Threats that are the most common ones:
1. Security Risks
2. Operational Risks
3. Reputational Risks
4. Legal and Regulatory Risks
5. Financial Risk
6. Competitive Risks
4. Security Risk
Data breaches:
Hackers can steal sensitive customer information such as
credit card numbers, passwords, and addresses. This can
lead to financial losses, identity theft, and reputational
damage for businesses.
Malware:
Malicious software can infect websites and steal data,
disrupt operations, and damage the company's reputation.
Phishing attacks:
Hackers can trick users into revealing personal information
by sending emails or text messages that appear to be from
legitimate sources.
Example: In 2017, Equifax, a major credit reporting
agency, experienced a massive data breach that exposed the
personal information of over 147 million people. This
incident highlighted the vulnerability of personal data stored
online and the importance of robust cybersecurity measures.
5. Operational Risks
System failures:
Technical glitches or outages can disrupt online operations and lead
to lost revenue and customer dissatisfaction.
Supply chain disruptions:
E-businesses rely heavily on their supply chains for delivering goods
and services to customers. Disruptions in the supply chain due to
natural disasters, pandemics, or geopolitical events can significantly
impact business performance.
Human errors:
Mistakes made by employees can lead to financial losses, data leaks,
and other problems.
Example: In 2018, Amazon Web Services, a major cloud
computing platform, experienced a major outage that disrupted
services for many businesses, including Netflix, Spotify, and Airbnb.
This incident showed how dependent businesses have become on
cloud services and the importance of having a robust disaster
recovery plan.
6. Reputational Risks
Negative customer reviews:
Unhappy customers can share their negative experiences online, which can damage a company's reputation and
deter potential customers.
Social media backlash:
E-businesses can face public scrutiny and criticism for their actions on social media. This can lead to negative
publicity and damage the company's reputation.
Product recalls:
Product safety issues can lead to product recalls, which can damage a company's reputation and result in
financial losses.
Example: In 2016, Samsung was forced to recall its Galaxy Note 7 smartphones due to a fire hazard. This
incident resulted in significant financial losses for Samsung and damaged its brand reputation.
7. Legal And Regulatory Risks
Data privacy regulations:
E-businesses must comply with a complex set of laws and
regulations, which can change frequently. Failure to comply can
result in fines, penalties, and even legal action.
Cybersecurity regulations:
Businesses may also be subject to cybersecurity regulations that
require them to implement specific security controls to protect
sensitive data of customers.
Intellectual property infringement:
E-commerce businesses need to be mindful of intellectual
property rights, such as copyrights and trademarks, to avoid
legal disputes.
Example: In 2020, the European Union fined Google a record €5
billion for violating GDPR by collecting and using personal data
without proper consent.
8. Financial Risk
Investment costs:
Implementing and maintaining an e-business platform
can be expensive, requiring investment in technology,
infrastructure, and personnel.
Payment processing fees:
Online payment processors charge fees for each
transaction, which can impact a business's profitability.
Businesses need to choose payment processors that offer
competitive rates and reliable service.
Currency fluctuations:
E-commerce businesses that operate internationally are
exposed to the risk of currency fluctuations, which can
affect their profitability.
9. Competitive Risks
New entrants:
The e-commerce landscape is constantly evolving, with new
competitors entering the market all the time. This can put
pressure on existing businesses to innovate and adapt to stay
ahead of the competition.
Disruptive technologies:
New technologies such as artificial intelligence and blockchain
can disrupt existing business models and create new challenges
for e-businesses.
Changes in consumer behavior:
Consumer preferences and buying habits are constantly
changing. E-businesses need to stay up-to-date with these
changes to remain competitive.
Example: The rise of online marketplaces such as Amazon and
eBay has made it easier for new businesses to enter the e-
commerce market. This has increased competition for established
businesses and put pressure on them to offer competitive prices
and products.
10. Mitigation Strategies
By understanding and addressing these risks and threats,
e-businesses can mitigate potential harm and ensure their
long-term success.
Implement robust cybersecurity measures:
This includes using strong passwords, firewalls, and
intrusion detection systems.
Develop a business continuity plan:
This plan should outline how the business will respond to
disruptions such as natural disasters or cyberattacks. Stay
informed about legal and regulatory changes:
This will help businesses comply with the latest laws and
regulations.
Build a strong brand reputation:
This involves providing excellent customer service and
being transparent about business practices.
Continuously innovate and adapt:
This will help businesses stay ahead of the competition
and capitalize on new opportunities.