The main objective of the private sector is to earn profits and become a leading organization in their line of business. To enhance this objective, most of the private sectors have embraced technological advancements where business is operated online. E-business is one of the current advancements where a business can advertise, market and make sales through the Internet. The business has to share its information online to attract a large pool of potential customers. Most of the business websites operates on intranets and extranets. Customers can only gain access to business information through the extranet. Authorized users can access most of the crucial and confidential information of a business through the intranet via an encrypted link. …show more content…
The main aim of going online was to expand its market niche by penetrating the international market, thus increasing sales and profits (Gordon, Loeb, Lucyshyn & Sohail, 2006). From Amazon’s official website, it is evident that customers have various tastes, preferences, and experiences according to diverse products that have been posted. Amazon is using the Big Data about its consumers, in order to build better relationships. Through Big Data, Amazon can identify recent consumer trends, improve on new product planning, marketing guidance, and evolve new brands.
Although customers and consumers’ Big Data is important for communication between the business and its customers, there are some instances where the Big Data may not be good for the consumers and their information. For instance, a customer called Amazon’s customer care after his Kindle malfunctioned (Cavelty, 2007). Within 30 seconds, he received a call from Amazon’s customer care desk and the representative greeted him by name. His problem was resolved immediately. It is evident that Amazon had all information about the customer. However, in the event that their website is hacked, customer information is at risk.
3 Dangers of gathering metadata
Gathering of metadata by the business may pose a threat to the customers, particularly when transacting online. The opportunity gives hackers a chance to acquire confidential information through
This paper is about E-Business / E-Commerce E-Trust, E-Security, & E-Privacy. The main topics that will be discussed are mainly from the consumers standpoint, but also a little from the E-Business and E-Commerce standpoint as well. The scope of this paper does not include details on how to establish security nor address privacy concerns.
First of all, Amazon was an early exploiter of online technologies for e-commerce, which made it one of the first online retailers. Amazon has developed a customer base of around 30 million people. Since it was founded, Amazon has been expanding its product categories. As a result, not only can customers buy almost everything they need in regular life, but also they can open their own business on Amazon. Secondly, Amazon carefully records data
Businesses are becoming ever more dependent on digital information and electronic transactions, and as a result face stringent data privacy compliance challenges and data security regulations. With the enterprise increasingly under threat of cyber attacks and malicious insiders, business applications and networks are now dependent on the use of digital credentials to control how users and entities access sensitive data and critical system resources.
We are living in the world where we are required to yield our personal data information to authority or companies such as names, date of birth, social security number or even credit numbers (Magalhaes, 2012). We may be aware that the personal data can expose to unauthorized people if our data is not secure properly, either via wire or wireless network. Lost or stolen data has been seen while data is transferred between different users using both networks. Can we trust companies to keep our data safe from being lost or misuse? Yes, we can. With new cyber-crime laws are enforced, it is in the company's best interest to keep their customers' data more secure (Magalhaes, 2012). This article will summarize the major security risks and threats to
Data mining companies have servers that process 50 trillion “transactions” every year. Through interviews with security experts the author establishes the companies stand for the corporate clients’ interest than the consumers. As the digital economy is changing fast, Acxiom have refined data and better mining techniques. Website such as Google, Amazon and Microsoft, uses companies like Acxiom, for data mining of consumers. When consumers see ads for previous items they have searched, it is not at random. Acxiom have a classification system, design for race, age, income and other statuses, to see what other items a consumer may be interested in purchasing. Consumer advocates worry that the more information that brokers mine, the more hackers will target
As more companies have made use of technology and have been offering digital services, they have been facing the issue of data breaches which has negatively impacted their businesses. During recent years, data breaches have been high in number. Only in 2011 there were 535 breaches reported in the US, which involved 30.4 million sensitive records (Caldwell, 2012). In 2012, The New York State Electric & Gas Co. in Rochester, New York experienced a data breach involving 1.8 million files containing people’s personal information, such as social security numbers, and bank accounts. Utah Department of Technology Services also experienced an attack by hackers which exposed 780,000 patient files (Arma International, 2012). Important information
The objective of this case study is to outline and provide a brief overview of Amazon.com’s (Amazon) mission, strategic direction, core competencies, relied technologies and their future impact of new technologies, and how management and use of consumer data will impact future business.
Amazon is focused on the customer. “Our vision is to be earth’s most customer centric company; to build a place where people can come to find and discover anything they might want to buy online” (Bhasin, 1). Amazon has a clear goal of providing excellent customer service and offering a large variety of products for their customers to purchase. Amazon’s marketing plan should reflect their commitment to the customer. The popular e-commerce website—Amazon.com—demonstrates their vision “To leverage technology and the expertise of our invaluable employees to provide our customers with the best shopping experience on the internet” (Bhasin, 1). The website offers a customized online shopping experience where product suggestions reflect on the customer’s viewing and purchase history.
Amazon.com, Inc. is one of the largest multinational, e-commerce enterprise with its headquarter in Seattle, Washington. Amazon, initially started as an online book store. However, over passage of time, the enterprise expanded its business by introducing several other products such as DVDs, CDs. MP3, computer, software, video games, electronics, apparel, furniture, fax and toys. Amazon.com has achieved a high level of customer loyalty and satisfaction by providing personalized Web pages and easy selection of products at low prices. Amazon.com has a large database of customers. It collects information related to the buying habits and the last purchasing experience of customers. Using this formation, it provides
Amazon is the world’s largest online retailer and is indeed a pioneer in the online retailing world. Though it started as an online bookstore, its success in its venture drove it to diversify into selling anything that can be sold online. Furthermore, Amazon has also expanded globally and now operates around the world through a combination of localized gateways and globalized delivery and logistics platforms. Amazon follows a well implemented strategy that contains five parts.
When major business, industry, government agencies are adopting Big Data to their daily operation, increasing security measures need to be implemented to avoid data breach and loss. Big Data breaches will likely to cause more damage than other cyber breaches, with the potential for more serious reputational destruction and legal repercussion than at present. User information and financial loss will not only cause more insurance claims, but the loss of business losing customers.
Launched by Jeff Bezos, the Amazon.com website started in 1995 and is today considered as one of the most prominent retail website on the internet with a record turnover of US$ 14.87 billion in 2007. Jeff Bezos’s intention was to create an internet based company with the most dedicated product portfolio on the internet where customers could find anything they might want. Amazon’s success is based on technology, services and products (Jens et al., 2003).
In a society exploding with information, people are forced to conduct business contracts online. As the business grows, so does the data they have on hand. Most of the companies, for instance, the Wonderful Company, have built their own databases to store complex data, including their customers’ personal information, business plans, secret contracts, supplier files, human resources and other important business information that they do not want their competitors to see, or get into hackers’ hands. The problem is that the unprotected databases are easily accessed by a third party (Bobbie, 2007). The severe consequences of leaking data could be commercial malicious deception, customer churn if they found your branch leaked out their personal
Amazon has successfully stayed on the leading edge and has remained an analytical competitor for many years. Few ways, one can see the company’s growth is through the limited tests it has performed of new features on Amazon.com. The company rigorously quantifies user reaction before rolling the features out to the market. Amazon also uses extensive analytics to help predict what products will be successful in the future. Through the statistical and quantitative analysis approach, the company recommends products to its customers based on their previous buying experience.
Due to the rapid growth in the use of Internet and its connected tools, an enormous amount of data are being produced on a daily basis. The concept of big data arrives when we were unable to manage this huge data with traditional methods. Big data is a mechanism of capturing, storing and analyzing the big datasets and also an idea of extracting some value from it. It is very handful while determining the root causes of failures, issues and defects in near-real time, creating coupons and other sales offers according to the customers shopping patterns, detecting any suspicious and fraudulent activities in real-time. As it is very advantageous, it also has some issues. Some of the common issues can be characterized into heterogeneity, complexity, timeless, scalability and privacy. The most important and significant challenge in the big data is to preserve privacy information of the customers, employees, and the organizations. It is very sensitive and includes conceptual, technical as well as legal significance.