E-Commerce Plan for Paisley Patterns Business Plan by Nicky

E-Commerce Plan for Paisley Patterns
Presents a business plan, particularly in the area of e-commerce, for the Paisley Patterns company.
# 128277 | 4,573 words | 18 sources | APA | 2010 | US


$19.95 Buy and instantly download this paper now

Description:

This paper features an e-commerce plan for the Paisley Patterns company, and intends to analyze and evaluate the decision by Paisley Patterns to expand their sales channels onto the Internet. The paper suggests that the adoption of an e-commerce initiative within any organization first necessitates fundamental changes in their core business processes, and second, a significant change in the types of systems used for support entirely new interactions and transactions with customers. The paper also addresses security concerns and possible vulnerabilities that companies may face while conducting business online, and concludes that the area of computer and Internet security is one of a continual ratcheting up on the side of government and software developers in response to accentuated and growing threats. This paper contains illustrative figures.


Outline:
Introduction
Defining an E-Commerce Strategy at Paisley Patterns
Online Ordering and Order Management
Positive and Negative Implications of A Web-Based Strategy
Security Considerations Taking the Paisley Patterns Website in-House
Vulnerability of Systems Defined and Explored
Analysis of Security Concerns for Paisley Patterns
Forms of Security
Solutions to Internet Security Challenges
Summary and Conclusions
References

From the Paper:

"The cost and integration advantages of taking their entire series of e-commerce application in-house present the daunting challenge of ensuring their security. The intent of this section of the analysis is to discuss this aspect of their strategy. As the Internet has now become a platform that enables electronic commerce, there has been an exponential rise in all forms of security breaches and theft of both data and funds over the Web that Paisley Patterns needs to be aware of and develop strategic responses for. There are six strategic pressures or concerns that are driving the need for Internet security today for them as a result. The first three are trends occurring in the external marketplace, and the remainder is originating from within organizations. These three dominant external trends impacting all organizations are first the quick and agile access to information of all kinds, including transaction data to support global trade; the continual leakage of customer and confidential data; and third, the incidences of financial and operational losses as a result of compromised confidential data and the resulting disruption of business operations. The remaining three strategic pressures on organizations include the heightened regulatory oversight and increasingly automated regulatory audits; the risks that are inherent in defining strategies for privileged access to information; and third, the risk by internally-driven security attacks and attacks from hackers outside the company but based on compromised information. These six specific strategic pressures combine to put many organizations and the individuals they serve at a higher level of risk than has been the case in the past. Clearly the needs for greater levels of attack deterrence are needed."

Sample of Sources Used:

  • Josh Bernoff, Charlene Li. 2008. Harnessing the Power of the Oh-So-Social Web. MIT Sloan Management Review 49, no. 3 (April 1): 36-42. (accessed October 31, 2008).
  • Hal Berghel, David Hoelzer. 2005. Pernicious ports. Association for Computing Machinery. Communications of the ACM 48, no. 12 (December 1): 23-30. (Accessed October 23, 2008).
  • Andre Balogh de Galantha 2006. Waste-Free Quotes and Lean Delivery. Supply Chain Europe, September 1, 24-26. (accessed October 30, 2008).
  • Angappa Gunasekaran, Kee-hung Lai, T C Edwin Cheng. 2008. Responsive supply chain: A competitive strategy in a networked economy. Omega 36, no. 4 (August 1): 549. (accessed October 29, 2008).
  • Kevin Joy 2007. Guarding Against Online Threats. Risk Management 54, no. 10 (October 1): 50. (Accessed October 28, 2008).

Cite this Business Plan:

APA Format

E-Commerce Plan for Paisley Patterns (2010, July 09) Retrieved January 28, 2023, from https://www.academon.com/business-plan/e-commerce-plan-for-paisley-patterns-128277/

MLA Format

"E-Commerce Plan for Paisley Patterns" 09 July 2010. Web. 28 January. 2023. <https://www.academon.com/business-plan/e-commerce-plan-for-paisley-patterns-128277/>

Comments