Computer Sciences and Information Technology
UNFO experiences challenges as a result of operating traditionally and upon adopting a modern strategy the firm still experiences difficulties that need to be addressed. UNFO has operated traditionally and thus face challenges of shoplifting and employees theft. In this regard, due to losses and uncertainty experienced the company adopted e-commerce model to mitigate the challenges. The new model introduces other risks that have to be countered to ensure that the business operates effectively. The E-commerce model introduces new risks as well as motivating factors that involve exploiting the vulnerabilities that will eventually be mitigated.
These paper presents are port on the newly introduced e-commerce model. Initially, the organization was operating traditionally thus experiencing challenges of shoplifting and employees theft. The challenges inclined the organization to adopt e-commerce model. However, the e-commerce model has a weakness and is prone to attacks that are driven by motivations. Additionally, the paper will address the roles of various parties to the e-commerce model to ensure that the system works without hitches. More so, the weaknesses of the web application will have a significant impact on the operations of the business. Lastly, the paper will identify the importance of identifying the weaknesses as well as the driving motivation in the development and implementation process.
Weaknesses of e-commerce
To begin with, the e-commerce is associated with risks that adversely affect the operations of a business. In this respect, businesses face online insecurity as a result of adopting e-commerce model in their business operations. Using e-commerce in business increases chances of data phishing and hacking thus leaving an organization vulnerable. Consequently, issues of customer dispute increase leading to significant economic setbacks. The issues arising out of customer dispute destroys the image and reputation of businesses thus scaring current and potential customers. The common disputes in this case issues of products sold or payment methods.
Motivation to attacks
Consequently, the identified business risks of using e-commerce have various motivations that drive them. In this regard, online insecurity is motivated by the presence of increased internet users with ulterior motives of disfranchising the users and the business. On the other hand, the customer dispute risk is motivated by rival businesses wanting to present the other business as ineffective in serves delivery as well as meeting the demands of the customers.
Parties under the e-commerce
Furthermore, there are various parties with different qualifications tasked with ensuring that the e-commerce model operates effectively. In this case, the system administrator tasked with managing the operation of the e-commerce system and they have a degree in computer science or system administration. Moreover, there is the developer tasked with programming or developing different World Wide Web applications and they must have a degree in software engineering. More so, there is the security engineer tasked handling security issues in the course of designing systems to avoid disruptions, attacks. The Security Engineer must have a bachelor’s degree in computer science or Cybersecurity. Lastly, there is the quality assurance tasked with maintaining the e-commerce system at every level or process of delivery and must have a bachelor’s degree in computer science or other related fields.
Impacts of Web application weaknesses
Consequently, weaknesses in Web applications have various impacts on a business. In this case, weaknesses expose the vital details and information on an organization thus leaving it vulnerable. The attackers can make an attack at any time as they are aware of the loopholes in the system. Additionally, weaknesses in the web application destroy the image and reputation of an organization as it will operate with defects. Defects in the system mean that customers will experience delays or sub-standard services.
In conclusion, there ar4e various risks associated with the e-commerce model in business. The weaknesses pose as a challenge to the efficient operation of an organization and thus should be mitigated. There is a need to identify the weaknesses and motivations of the attack to enable the affected organization to take the necessary strategies to mitigate losses related to the system weaknesses.