Open Environments and Overly Secure Environments in E-Commerce Grandmas Treats

In order to expand its markets and tap into the new virtual sales market, Grandmas treat has researched and implemented a plan for an online site. The site will be used to promote business through advertising and conduct online sales. Like any other business that ventures into e-commerce (buying and selling online) there are a number of security issues that are of concern to the company. As a result the company has researched and collected information regarding the open and overly secure environments in an effort to make the decision on the right security measures to be implemented by Grandmas treats.

Open Source Environment
Open source e- commerce is built through sharing of technological and virtual information. Companies are granted a code after payment of a small fee. The codes guarantee the business a virtual space through which they can conduct their business.

Benefits of an Open Environment
The first and most revered advantage of open source e-commerce is its low costs. Businesses wishing to venture to the open environment need only pay a small fee to gain the access codes to their virtual space. In some online communities businesses are not required to pay anything at all, one only needs to download some software which grants them their own virtual space, (Rosen 2002, P.69).

The open source e-commerce is open to changes and evolutions of the virtual world. Unlike the overly secure platform, open source allows for creativity and innovation that in turn makes business in this environment easier. The open environment creates sub-segments and subcultures that cater to specific client needs and in turn give rise to better technical infrastructures. The open environment additionally provides the technical knowhow that may be difficult and costly for companies to access and maintain. The open source sites rely on the already hired engineers for the maintenance and repair that they may require.

Finally the open environment provides easily accessible websites for both the companies and their clients. Clients do not need to struggle or spend a lot of time placing order or browsing catalogues. In addition the companies can easily access other clients through business affiliates.

Consequences of Using an Open Environment
For a company to open a successful open source environment website, they require the specifically built software, hardware, development technology, search engines and security firewalls. This sometimes increases the cost to beyond that of secure sites, in addition to making the maintenance costly. The open environment often results in inflexible sites. Once a company opens an open source website, only the host community can provide equipment and maintenance for the site. Companies find themselves stuck when they wish to pursue other avenues in the virtual markets, (Korper and Ellis 2001, P.172).

Finally, the company and its clients are often exposed to hackers who may access the companys sensitive information and that of its clients. Such exposure leads to mistrust foam the clients and becomes a major setback to the companys business.

Overly Secure Environment

Benefits of an Overly Secure Environment
Perhaps the most obvious advantage of overly secure sites is the security of the information from the company and clients. The overly secure sites are harder and sometimes impossible to penetrate without authorization. The security of information upholds the trust of the clients in the company.

The secure sites are flexible since they are maintained privately by the companies. Tipton and Krause (2004, 1590), the basics of the sites that is firewalls and software can be easily changed when the company feels the need to.  The company does not need to use the host products as is often the case in an open environment site. Once the site is set up and running, upgrading the security measures is much simpler than many people imagine. In most cases the software used to firewall and protect the clients and companys information is set to upgrade itself periodically.

Consequences of using an overly secure environment
Secure environments are often difficult to access. Clients are required to have passwords and verify their information before they are granted access. The main result is that many people may leave the site before even viewing the catalogues. Although the site guarantees privacy and confidentiality the process involved in accessing the site often discourages potential clients. The secure sites are often complex and hard to maintain. Maintenance requires the company to be aware and have access to the latest security programs which are costly to purchase. Without frequent maintenance the companys website is exposed to some forms of security risks (Korper and Ellis 2001, P.175).

Ethical and Legal Issues
Business clients and customers place a great deal of trust in the company they are dealing with they provide them with personal information such as credit card numbers and addresses. Each company that is undertaking e-commerce ventures is responsible for ensuring that the privacy of the customer is maintained, (Campbell and Woodley 2003, 199).

If Grandmas treats feels that they cannot offer the client the security they need or require, then they are required to place a viable warning informing the client of the same. For the purpose of promoting sales and ensuring good business morals however, Grandmas treats must protect its customers and clients information vehemently. The information should never be used for unauthorized research or sold to any other companies. Once transactions are completed, the company should get rid of all personal information that may have been provided by the client.

Recommendation
Grandmas treats requires an open source website with minimum security measures. This is because the site will be easily maintainable and accessible therefore promoting more and more sales. An overly secure site could discourage clients who visit the site with the purpose of purchasing pies and cakes and find themselves overwhelmed with the security measures. However, despite the site being in an open environment some security measures need to be put in place to protect clients financial and personal information. The secret lies in finding a balance between security and accessibility.

0 comments:

Post a Comment