Question A: Introduction to Privacy and Privacy Protection
Technological developments and enhancements have facilitated the digital migration of both big and small business enterprises (Curtis, 2013). A lot of communication is done online, with these business enterprises developing and maintaining websites where they provide information regarding their businesses. Technology has also led to the emergence of electronic marketing (e-commerce) solutions where buyers and sellers engage in business transactions over a virtual market (Curtis, 2013). The websites of these enterprises also contain highly sensitive data and information that forms the backbone of their success and existence. Increased technological advancement has in turn increased the sophistication of cyber-criminal activities, making these websites vulnerable to attacks. Therefore, websites should be well protected since they have details that can be used by intruders to bring down these enterprises (Rubinstein, G& Lee, 2014.). In relation to this, website developers need to be keen on implementing security features while building new websites for business organizations in order to bar away intruders. In addition to the protection of the privacy of the Company’s sensitive data and information website, particularly those of electronic commerce should ensure the protection of privacy and security of clients’ confidential information. It is ensured through the installation and implementation of several online security measures and features (Thurott, 2011). The following chapter of this essay is going to list and discuss a number of features that should be present in thewebsite in order to ensure efficient and secure privacy of sensitive data and information.
Features That Should be Present if a Website is Serious about Protecting Privacy
- Encryption of log-in pages: One of the protective features that a website should have an encrypted login page (Jeff, 2013). The login pages should be developed in such a manner that only authorized users are able to access and navigate it. The encryption of a web page is important because it will help in keeping off intruders, particularly in e-commerce websites which involve buying, selling and financial transactions. Encryption helps in user authentication, even after one has logged into the website. It is because there are website crackers who are able to circumvent transaction and communication processes using malicious security crackers (Online Privacy Alliance, 2014). A website that carries out encryption process during the communication process is very secure and serious in protecting the privacy of both the Company and that of its clients.
- Server-side data validation: The second feature that should be present in a secure website is the ability to perform data validation from the side of the server (Jeff, 2013). Various websites form use Java Script data validation in order to increase or improve security. If data is not validated at all, there are instances where security crackers that are malicious are able to craft in a given form that enables it to access resources from the other end of the website pages (Jon, 2014). Activities like password validation should not be done by the client-side, but rather should be done by the server-side in order to prevent cases of circumvention. Client-side validation of password is a common event in Facebook websites, thereby, exposing users to hackers. Server-side validation is safe and secure as compared to client-side because one has to gain access to it in order to compromise it (Eckersley, 2011).
- Well managed connections: A secure website that ensures privacy should be managed using encrypted connections (Jeff, 2013). Enterprises can do this through the use of encrypted protocols SSH in order to access secure resources with verifiable security tools. It will help in the elimination of the man-in-the-middle and its attacks. The threat of password sniffing is also eliminated.
- Connection from secure Networks: A secure website will always connect from a secure network with known security characteristics, for example, a connection that originates from a secure proxy (Jeff, 2013). Insecure networks include, wireless access that is offered free of charge in shopping malls or coffee shops.
- Strong cross-platform encryption: A secure website uses the transport layer security for encryption, which does not limit the user base (Jeff, 2013). Therefore, the encryption technology used should be compatible across platforms in order to eliminate resistance to use of the safest encryption. Use of Redundancy: A website that makes use of failovers and back-ups prove to be secure in the event of a server crash. It is because the back-up server will ensure that information relating to clients is not lost.
- A secure website does not share login credential among its users: It is because the sharing of these credentials makes it difficult to track down and identify sources of problems over the website (Stravarius, 2010).
- Key-based authentication: Secure websites that ensure privacy uses a key based method of authentication instead of password method of authentication (Gerber & Compton, 2014). It is because it is very easy for hackers to crack passwords as opposed to key based authentication, which is cryptographic in nature (Bott, 2011).
Ratings to Websites Based on the List of Privacy Features
Since online activities involve the exchange of personal details and other highly sensitive data and information, website security is mandatory (Broadband, 2014). Major enterprises apply the above mentioned measures in order to protect their websites from any forms of intruders. Despite the need for these measures, different organizations implement these measures differently, with some websites fully implementing them. It results in varying levels of privacy and security of the various available websites. The illustration below is a summary of the four websites that I visited in an effort to identify the measures they take in ensuring privacy protection of data and information exchanged through their websites. The maximum score is 10.
Comparisons of Similar Websites for Privacy Policies
Following the observations I made in the privacy policies after visiting the various websites, I found out that ensuring a fully-complete (100%) online security is not possible for most websites (Chad, 2008). The above is due to the advancements in the level of technology, which in turn has led to the emergence of highly skilled and sophisticated website hackers. It is, therefore, necessary that every website uses a combination of the above listed features in order to ensure security and privacy in their websites.
In conclusion, the security of a website is very critical in the protection and maintenance of sensitive data and information regarding the organization as well as that of its users. All IT departments in every organization should prioritize information and data security because it is the backbone of the success of a business enterprise.
Question B: Introduction to First Movers and Market Followers
According to the Business Dictionary (2014), market follower is a small business enterprise that allows other larger market enterprises to lead market activity and all operations and then they follow. The followers normally do a close up monitor of the activities of first market movers, and then they improve these efforts. On the other hand, the first market mover is a term that is used to describe early market entrants into the market (Golder&Tellis, 2013). It may be an early entrance due to the technological advantage that the Company has, as a result, of breakthrough in research. In the business industry, there are a number of benefits that the first mover into the market enjoys, normally referred to as economic benefits. A first mover in a given market is assumed to be enjoying a number of benefits while in the real sense; market followers enjoy the market more than first movers. It is because making the first step of venturing a market is a risky step; in addition to that, the ability to survive the market challenges is unpredictable. Every market has a specific first mover; however, there could be many movers who entered the market during a given period (Fernando, &Giavito, 2014). It is known as simultaneous market pioneering. The firms that come to join the market later are, therefore, referred to as late or fast followers.
The success of the first mover in the market depends on several factors, for example, preemptible resources, network effects, appropriable technology and customer switching costs (Golder&Tellis, 2013). The aforementioned characteristics must be fully exploited by the first movers before emergence of fast followers in order to be successful. The following section discusses how a first market mover should exploit the aforementioned advantages in order to be successful.
Appropriable technology: Firms that pioneer a market are known to have a technological advantage over its followers. These are the companies that have created a unique technological instrument that keeps them ahead of their potential competitors. In order to remain with this advantage, a market mover should find a method of keeping the proprietary of that technology. They are able to do this through patent rights. However, in the practical world, technological advancements have made it very easy for fast market followers come up with even better technology than that of the first market mover.
Pre-emptily Resources: First market movers have the advantage of accessing raw materials, having better physical locations in terms of the market as well as the power to persuade clients. In the current market, the aforementioned advantages are not major determining factors forthesuccess of the firm. Fast market followers always have the opportunity to improve on the practices of the first market mover.
Customer Switching Cost: The first market movers have the advantage of developing the switching costs of customers. These mechanisms will tie down the fast market followers who will have to invest more resources into forming new costs. They will be forced to offer very low prices in order to sway away customers from the market pioneer.
Network Effects: The market pioneer has a very big advantage over the market followers in the formation of a platform where buyers and users want to interact with other users. The ability to create this network gives them an extra advantage of attracting more clients to their firm.
Justification for Fast Market Followers
Despite the fact that first market movers (pioneers) have the aforementioned advantages, the fast market followers still stand a big chance of beating them at their own game and become more successful in the market than they(Barnett, MiFeng&Luo. 2014.). In a liberal market, the market pioneers are not able to fully defend themselves against the competition; therefore, fast market followers are in a better position to overtake them by improving and enhancing their market activities. There are several advantages that a fast market follower enjoys when entering the firm, making it easier to be successful (Fernando, &Giavito, 2014). The above advantages of a market follower are discussed in the following paragraphs.
Late market entrants are able to benefit from the huge financial investments that early entrants make, for example, client education and overcoming the risk of uncertainty (Constatinos& Paul, 2014). They also invest in developing of infrastructure in order to develop the market. Therefore, the market follower will find an already developed market, and all, the firm has to do is to improve on where the pioneer is missing the mark. In turn, the market follower will enjoy operating in a ready-made market and with a lower investment cost.
Majority of market followers are established firms which have high quality skills and assets that are necessary for successful market operations (Constatinos& Paul, 2014). These are the resources which they make use of after realizing that there are no serious risks by following up what market pioneers have managed to do. Therefore, this is a strategy to save their resources from the risks of making the first move. Coming up as a market follower gives the specific firm time to study market evolution so that they know where to make improvements, hence the higher chances of success.
Analysis of Two E-commerce Companies
The current century has witnessed a high level of technological enhancements that have resulted in widespread digital migration. The implementation of technology in most activities of business enterprises has seen the creation of e-solution centers where buyers and sellers are able to transact business activities in a virtual market ( Waterman,&Bruening, 2014). In this section, I am going to analyze two e-commerce Companies, which in the real sense are market followers/fast market followers. These are the Microsoft and Gmail.com.
Amazon.com and Abine.com e-Commerce Companies
These two are among the currently leading online stores. Both the Amazon.com and Abine.com are e-solution centers where one can be able to place an order on items ranging from electronic gadgets, books, foodstuffs among other items (Web Technology Surveys, 2014). Both Abine.com and Amazon are not the market pioneers in the e-commerce industry; they are market followers that successfully improved on the marketing activities of the pioneer e-commerce firms. The two firms realized that the success in e-commerce is to be customers oriented. Delivery of high quality services in a timely manner would win you more clients in the market (Mark, 2014). In order to effectively serve their customers, Abine.com and Amazon have aligned all their activities to satisfying the clients’ needs. Firstly, they have several distribution centers in major cities worldwide; therefore, orders placed by their clients are delivered in a timely manner (Dariusz&Anna 2014). Secondly, they utilize their members of staff in an innovative manner in order to come up with ideas that ensure they remain competitive in their particular markets (Curtis, 2013). These two companies incessantly introduce new technologies in the industry, technologies that are mainly enhancements of original ideas of the market pioneers (Gauzente, 2013). Thirdly, they do implement very safe and secure measures of online security over their websites in order to ensure the security and privacy of all their stakeholders (Lin, 2014). It makes them attractive to clients because it is a genuine business.
Conclusion
Market pioneers enjoy several advantages in the market, but this is only applicable before the fast market followers venture into the market. In addition to this, they make an entrance into the market easy for fast followers, giving them a platform to prosper within a short duration. It is, therefore, advisable for non-established firms that do not have a huge financial base to study market evolution first before making an entrance into the market.
References
Amazon. 2014. Amazon.com Privacy Notice. [Online] Available at <http://www.amazon.com/gp/help/customer/display.html?nodeId=468496> [Accessed 8 June 2014]
Bott, E. 2011. Privacy protection and IE9: who can you trust? [Online] Available at <http://www.zdnet.com/blog/bott/privacy-protection-and-ie9-who-can-you-trust/3014>[Accessed 8 June 2014]
Broadband. 2014. What is Gmail Privacy Policy? [Online] Available at <http://www.dslreports.com/faq/10396> [Accessed 8 June 2014]
Bruce, S. 2014.EPIC Online Guide to Practical Privacy Tools.[Online] Available at <http://epic.org/privacy/tools.html>[Accessed 8 June 2014]
Business Dictionary. 2014. Definition of Market Follower and First Market Movers. [Online] Available at <http://www.businessdictionary.com/definition/market-follower.html>> [Accessed 8 June 2014]
Barnett, W.,MiFeng&Luo. 2014. Social identity, market memory, and first-mover advantage. Journal of Industrial Corporate Change.23(3).53-67.
Chad, P. 2008. Ensure basic Web site security with this checklist. [Online] Available at <http://www.techrepublic.com/blog/it-security/ensure-basic-web-site-security-with-this-checklist/>[Accessed 8 June 2014]
Craig, N. 2013.Gmail Privacy FAQ. [Online] Available at<http://epic.org/privacy/gmail/faq.html> [Accessed 8 June 2014]
Curtis, S. 2013. Amazon at 15: The technology behind Amazon UK's success. [Online] Available at <http://www.telegraph.co.uk/technology/amazon/10377834/Amazon-at-15-the-technology-behind-Amazon-UKs-success.html> [Accessed 8 June 2014]
DariuszKloza&Anna Mościbroda. 2014. Making the case for enhanced enforcement cooperation between data protection authorities: insights from competition law. Journal of International Data Privacy Law.4(2).120-138.
Eckersley, P. 2011. Tracking Protection Lists: A privacy enhancing technology that complements Do Not Track. [Online] Available at <https://www.eff.org/deeplinks/2011/03/tracking-protection-lists> [Accessed 8 June 2014]
Jeff, T. 2013. How Encryption Works. [Online] Available at <http://computer.howstuffworks.com/encryption.htm>[Accessed 8 June 2014]
John, B. 2014. Marketing Tools: Sample privacy policy. [Online] Available at <www.redfusionmedia.com/sample_privacy.html>[Accessed 8 June 2014]
Gauzente, Claire. 2013. Web Merchants' Privacy and Security Statements: HowReassuring Are They for Consumers? A Two-Sided Approach.Journal of Electronic Commerce Research.5(3).181-195.
Gerber, R., &Compton, T. 2014. 10 security tips to protect your website from hackers.[Online] Available at <http://www.creativebloq.com/web-design/website-security-tips-protect-your-site-7122853>[Accessed 8 June 2014]
Golder, P.,N., &Tellis, G., J. 1993. Pioneer Advantage: Marketing Logic or Marketing Legend?" Journal of Marketing Research 30 (2): 158-170.
Constantinos, M., & Paul, G.2014.Fast Second: How Smart Companies Bypass Radical Innovation to Enter and Dominate New Markets. Jossey-Bass, San Francisco.
Lin, Elbert. 2014. Prioritizing Privacy: A ConstitutionalResponse to the Internet. Berkeley Technology Law Journal.1(1).8-20.
Mark, Brown. 2014. Investigating the relationship Between Internet PrivacyConcerns and Online Purchase Behavior. Journal of Electronic Commerce Research.5(1).62-70.
Online Privacy Alliance. 2014.Rules and Tools For Protecting Personal Privacy Online. [Online] Available at<http://www.privacyalliance.org/resources/rulesntools.shtml> [Accessed 8 June 2014]
Rubinstein,Ira, &Nojeim,Gregory & Lee, Ronald. 2014. Systematic government access to personal data: a comparative analysis. Journal of International Data Privacy Law.4(2).96-119.
Stravarius, J. 2010.15 Great Ways to Secure Your Website.[Online] Available at <http://web.appstorm.net/roundups/self-publishing/15-great-ways-to-secure-your-website/>[Accessed 8 June 2014]
Stallings, William.2014. SSL: Foundation for Web Security. The Internet Protocol Journal.1(1). 1.
Fernando, F.,&Giavito, L. 2014. “The Half-truth of First-mover Advantage,” Harvard Business Review 83 (4): 125-127.
Thurrott, P. 2011.Internet Explorer 9 Feature Focus: Tracking Protection. [Online] Available at <http://winsupersite.com/windows-7/internet-explorer-9-feature-focus-tracking-protection>[Accessed 8 June 2014]
Waterman, Krasnow&Bruening,Paula. 2014. Big Data analytics: risks and responsibilities. Journal of International Data Privacy Law. 4(2), 89-95.
Web Technology Surveys, 2014.Site Info Amazo.com.[Online] Available at
<http://w3techs.com/sites/info/amazon.com> [Accessed 8 June 2014]