1. Introduction In recent years, broadband internet access has made the world more interconnected and unconstrained by geographical distances. Companies in the retail industry are moving forward and allowing information technology to play a vital role in providing support to their daily operations. The constantly evolving technology has brought about convenience to consumers as well as give rise to cybercrimes (Jang-Jaccard and Nepal, 2014). Also, online retailers tend to hold high concentration of wealth and rely largely on third-party cloud service providers, making them more vulnerable to cyberattacks. Zalora is an online fashion retailer that offers an extensive collection of products and allows consumers to directly buy goods over the …show more content…
Survey results has shown that a cyber breach would result in 35% of consumers to stop shopping, 23% to shop lesser with a company and 44% of consumers mention that nothing could be done too gain back their confidence and trust (Humphries, 2014). With such figures, it is clear that cyber breach can substantially damage consumer trust and driver customers away. Therefore, it is important for Zalora to adopt the above recommendations and address the trends of the rise of cybercrimes by strengthen security protocols and reduce reliance on third party cloud service providers with the use of hybrid cloud. It will help portray a positive image and improve consumers’ perception of Zalora by assuring consumers their personal information are kept safe and …show more content…
Being one of Asia’s leading online fashion retailer, Zalora should aim to extend their lead in the industry as they already have built good reputation and huge presence in many countries. By addressing the security concerns, Zalora can provide their consumers with a worry-free online shopping experience as good security practices and data confidentiality will let them feel more confident shopping at Zalora. Hence, I strongly recommend Zalora to take the proposed recommendations into consideration as it aligns with their vision on providing consumers with the best fashion forward experience and will also be beneficial for the company for future
This cyber crime is a security threat that not only affects businesses, but also everyone that has access to the World Wide Web whether it is via computer, laptop, smart phone or notepad. In order to achieve a successful breach, criminal masterminds often attempt to illegally gain access to the business through multiple targets while combining them with vulnerability tools via web access, e-mail, and even social engineering. In the recent breach to the retail store Target Inc. it was discovered that over 110 million consumers’ credit cards and personal information were exposed to attackers. Several months earlier, programs with malware-laced email phishing codes were sent to Target employees via an HVAC firm which could have been the culprit that infected Target’s point-of-sale systems. According to Fox Business, the attackers used the information gathered and gained access to additional network resources which led to the $200M breach and left the cyber door wide open to future infiltration.
One of the aspects that make consumer not to trust website is unauthorised access to products and services that they buy online. It is true that some of online retailers can use customer information whatever they want without getting permission from customers for example sends information to another vendor. Luhmann has suggest that if we want to reduce the complexity of human conduct to build good relationship with consumers by introducing ‘trust’ (Luhmann, 1989)
This is a case study of how policies, laws and regulations affect the cybersecurity field in organizations. Laws and regulations have been used in multiple various fields to provide guidance and control over how certain practices are been done. Their introduction to the Information Security field is recent, and due to the importance of what’s at stake, they seem to play a necessary role. It’s vital that we explain in details what has been observed in organizations’ programs and normal operations as a result of implementing these rules. In the past, not having any kind of direction while creating Information Security programs have proved to isolate agencies away from current progress in cybersecurity, while creating confusion on how to face
Zara is a fashion clothing store owned by Spanish fashion group Inditex. The first Zara store opened in La Coruna by Amancio Ortega in 1975. Major consumers included young, fashion forward people who resided in the city whose trends and demands were hard to forecast. Being in the apparel industry, he believed that retailing and manufacturing needs to be closely linked to meet consumer demands. What differentiates zara from competitors is the rapid turnover time and using the physical store as a source of information. The company was a huge success and the Zara chain opened an average of one store per day across the world since 2003 and currently having about 550 stores.
Zappos.com is a website that started off just selling shoes but now sells items such as handbags, clothing, and housewares in addition to shoes. Their company logo includes their catchy name with an explanation point as the end in the shape of shoe print which leads consumers to believe Zappos has strong feelings about the service they provide to their consumers. Zappos believe that customer service is the number one priority and is focused on cultivating repeat customers which is why they have always provided free shipping on both orders and returns; occasionally provides upgraded shipping so customers can receive their shoes the same day that they are ordered even though this is very expensive to the company; and they only show products on their website that they actually have in stock albeit they lose 25 percent of their potential business by doing so (Walker, 2009). For a compa...
Most people are familiar with Cybercrime or Computer Crime being crime carried out by use of computers or the Internet. With the growing use of the Internet it is no surprise to anyone that Cybercrime or Computer Crime has been on the rise and has been since the coming of the Internet and anyone can be a victim of cybercrime. Take for example in 2012, 7% of the U.S. population had their identity stolen from online (Harrell, Lang, 2013, pg. 1). There is no denying that the formation and growth of the Internet has had an impact on crime (Wall, 2011, pg. 8). The purpose of this paper is to explain and give an overview of the types of cybercrime, how law enforcement handle these types of crimes, and how prevent cybercrime.
ZALORA.com.my is the No. 1 Online Fashion shopping site in Malaysia. There are more than 600+ local and international brands, 30,000+ products across menswear, womenswear, kidswear, traditional wear, sportswear, lifestyle products and beauty and more. ZALORA Online fashion provide FREE nationwide delivery, FREE 30-day returns, Cash On Delivery, Phone Orders at +603 2382 2208 and more.
Every day millions in some cases billions of dollars are made by businesses from income brought in by online sale of products and services. As businesses continually develop and expand their client base with online products and services so does the desire by criminals to exploit vulnerabilities in their e-commerce setup. The mass worldwide internet usage growth within the last 20 years has been “an approximate 16 million users in 1995 to an estimated 2,937 million in March of 2014” As the importance of e-commerce increases so does the need to protect the technological infrastructure that will carry out online transactions for each business regardless of its size. I will attempt to highlight and review the history of a few cyber crimes to show the progression of the crimes within the last 30-40 years. I also plan to review how the economy and consumers are impacted by cyber crimes. Finally I will make an effort to contribute with information gathering on how to lower the risk of a cyber attack from and individual user to a large scale business.
At the beginning, the causes of the problem can be classified into three aspects: transferring personal data to others without consumers’ consent, lacking awareness on the protection of privacy and leaking the personal data unintentionally. The leakage of the personal data can be in the form of keeping and transmitting personal data insecurely and then stealing by crackers. There is no controversy on this cause- it is apparently a crime, hence, not discussed in this essay. One common torment of companies is that they are not renowned. Consumer personal information includi...
The ability to conduct warfare through technological methods has increased information security awareness and the need to protect an entities infrastructure. Subsequently, cyber warfare produces increased risk to security practitioners that employ technology and other methods to mitigate risks to information and the various systems that hold or transmit data. A significant risk to information lies in the conduct of electronic commerce, hereinafter called e-commerce. E-commerce is the purchasing or selling of goods and/or services through the internet or other electronic means (Liu, Chen, Huang, & Yang, 2013). In this article, the researcher will discuss cyber warfare risks, present an evaluation on established security measures, identify potential victims of identity theft, and present an examina...
To achieve this, Amazon needs to roll out its online payment system that can help in addressing issues such as security and privacy concerns. With the rapid use of internet in the globe today, there is a risk of identity theft and cyber attacks if the company is not keen. By setting up an online payment system, there is a great chance that all transactions between the company and their customers will be discreet. Moreover, the company needs to show more concern for their employee’s welfare as a way of promoting their corporate culture and getting the best out of them. In addition, the company can capitalize on their strong brand to roll more products and services to reach to more and more
Recently, the Internet has become the most significant technology in all over the world, which is not only used by the people to contact with each other but also utilized by the business organizations to become global (Taylor, Caeti, Loper, Fritsch & Liederbach, 2006). Computer and internet enable the business organizations to execute the Electronic commerce business model, which has become very popular. Computers and Internet are a powerful source in the success of globalization and international business. Computers are being used worldwide and due to this, cyber crimes are increasing continuously with a rapid growth (Cheeseman, 2006).
In today’s society technology is used for everything. With the invention of computers and the internet this open doors to the cyber world. Today you can do almost anything without having to leave your home. The internet gives us the opportunity of shopping online, ordering food online, working from home and video chatting with friends and family across the world. Everyone has a computer and internet access in their homes. While the internet is really convenient it also opens doors for cybercrimes, loss of privacy and the need for computer security.
The Internet is a connection of computers across the world through a network. Its origin dates back to the 1960s when the U.S Military used it for research, but it became more available to the public from the late 1980s. The World Wide Web was created in 1989 and browsers began appearing in the early 1990s. Over the last 24 years, the Internet has enabled people to shop, play, do research, communicate and conduct business online. It has also become cheaper and faster in performing different tasks. As much as the Internet has done immeasurable good to society, it has also dominated people’s lives and brought with it an array of cybercrimes. According to Nicholas Carr in his book The Shallows: How the Internet is Changing the Way we Think, Read and Remember (Carr, 2010). He debates on whether the Internet has done more harm than good. People use the Internet daily to exchange accurate information and constantly personal data such as credit cards, passwords and Social Security numbers are travelling through the network from one computer to another. With security measures put in place on the Internet, personal information remains confidential. But unfortunately, criminals have adapted to innovations in technology, and today, more people are increasingly becoming victims of cybercrime. The Internet has had profound effects on the public, both positive and negative. In this paper we will examine how access to personal information has led to an increase in online and offline crimes. The essay will particularly focus on ecommerce and hacking.
The Internet is rapidly becoming widespread and widely used as a tool for globalization across the world. As the Internet became more easily accessible by most people in the world, the web is bringing significant implications and changes to the way we live, including the way we shop. There is a rapid growth with e-commerce and moving businesses onto the web and retail success is no longer about stores and shopping centers. In developed countries, about two thirds of the population have access to the Internet making the option of online shopping is easily accessible to most people (Valerio). With the ease of shopping in your own home there are many benefits of doing your shopping online. Consumers can easily compare prices online, there is a larger range of products on the web, you can save time by having your shopping delivered right to your doorstep and it also overcomes physical barriers. Over the last decade online shopping has challenged and replaced the traditional means of physically going into shops as the digital world has provided customers with further convenience, flexibility and comfort from shopping from your own home.