StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Enterprise Risk Management in E-commerce - Report Example

Cite this document
Summary
This report "Enterprise Risk Management in E-commerce" discusses risk management means assigning a priority to these risks and developing plans and exercises that can poise and alleviate them. Risk evaluation means the citation of all of the risks a business might countenance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful

Extract of sample "Enterprise Risk Management in E-commerce"

Enterprise Risk Management Foreword Barriers to inflowing e-commerce are moderately squat, but new chances can be followed by new risks. Risk evaluation means citation of all of the risks a business might countenance and transfer undependable degrees of significance to them. Risk management means assign a priority to these risks and developing plans and exercise that can poise and alleviate them. Every industry can benefit from carrying on a risk assessment of their e-commerce systems, even though smaller businesses may not need to execute some of the more complicated proficiencies mentioned in this report. This report explains how risk assessment and management can help in distinguishing and measuring the risks and how to set of scales for them against the possible benefits. Keying out risks in e-commerce Conventional intimidation to e-commerce organizations consist of: corporeal risks - risks bewildered to the IT infrastructure by, for example, fire or flood information risks - risks bewildered to software, files, databases, etc by viruses, Trojan horses etc mistakes by inhabitants, e.g. the unintentional cutting of information by a worker scientific breakdown, e.g. software errors infrastructure breakdown, e.g. server crashes credit card and payment deceit spiteful assaults from within or outside your commerce (Naina Parwani , Rajah & Tann, 2003) Distinctive risks to e-commerce Threat to business data and rational possessions from domestic employees and business partners. It is hard to manage how responsive data will be treated by third parties or agreement employees. Few companies have systems in place to make sure frequent touchstones in inspection of employees and give safety technical aspects between business partners. Hacker utilization of faults in software application plan, technological completion or systems procedure. In accumulation, vulnerabilities exposures in technological safety mechanisms and operating systems are currently extensively available for everyone to read or research with. Website despoilment - where the business figure or contents on the website are altered - and bug attacks can guide to marketable awkwardness and smash up to the way the business is considered by its business partners and the general public. (S.R. Warrier & P Chandrashekhar, 2006) Defense -of-service assaults - which use an overflow of fake contents to smash into a business' systems - can have a overwhelming blow upon a commerce, particularly if it is reliant upon its e-commerce system. The expansion of the Internet means that there are more chances to increase such an assault, with the secrecy yielded by the Internet meaning that there is a correspondingly lower risk of track ability. Possible affect Except when rapid act is in use, any troubles with the e-commerce website will be right away apparent to the world. E-commerce clients classically have very petite allegiance, so if the website is out of stock they will merely move on to one of the challengers. In addition, mechanical breakdown can have an important blow, not only on the clients but also on fundamental business partners.( Naina Parwani , Rajah & Tann) Due to the outlook of this approximately immediate hammering of income, taking steps to put off tribulations is much more cost-effective than annoying to fix them once they have came about. Assessing the risks Risk assessment requires finding out: how probable a risk is to take place its affect should it take place Risk assessment can be either qualitative or quantitative.( Rick Gorvett, & V Nambiar, 2006) Qualitative risk assessment This requires finding out: the major risks to the business where the schemes are susceptible the checks one can put in situate to oppose the risks or make the systems less susceptible Once these have been recognized, one should be able to evaluate whether the risk is high, medium or low. Quantitative risk assessment Quantitative assessment presumes that an assessment can be positioned on any failure that one might experience as a consequence of a safety infringement. Possibility can be used to determine the chances of such a safety event happening. (S.R. Warrier & P Chandrashekhar, 2006) How to measure the risks The e-commerce atmosphere depends upon on clients- confronting expertise, such as websites and forums, as well as more customary knowledge to offer the sustaining networks. Keep one well-versed about the risks Introduced to the systems since they can vary very rapidly in e-commerce. If a new susceptibility is acknowledged, it can be oppressed very speedily, while a new bug can have an extensive bang on businesses. It is imperative that safety organization scheme is lithe and immediate enough to compact with these threats. All threats can be measured against the likelihood of incidence and its possible bang on a high, medium or low threat origin. A straightforward four-step approach to risk measurement: come up with all threats with appropriate domestic people and outdoor skillful persons if needed concur a possibility ranking (H,M,L) for each threat consent a blow ranking for each threat (H,M,L) make use of the matrix below to enumerate all risks rating from from 1 to 5 possibility High 3 4 5 Medium 2 3 4 Low 1 2 3   Low Medium High Impact The mainly significant threats are mentioned as 5, with the lesser ones graded as 1. If the probability of an event occurring is known and can place a value on any possible failure that may take place as an outcome, one can evaluate how much time and capital he/she should use up executing the suitable security checks where needed. Consider the example, if a specific occasion is not likely to happen and, even if it does, would have modest force on the business; it is not important using excessive resourcefulness to endeavor and put off its occurrence. On the other hand it is supposed to ponder resources on mounting safety controls for proceedings that are probable to take place and, if they do, would have a large affect on the business. Stakeholders: Everyone is accountable for the successful administration of risks. The risk management process should be incorporated with other development and executive actions. Managers and employees All managers and employees are accountable for: 1. budding and carrying out risk management procedure 2. accounting all severe risk vulnerabilities to the risk manager 3. accounting instantly all severe occurrences to the risk manager 4. Accounting yearly on the position of risk management proceedings to the company level through the risk manager. The managers and employees are accountable for supporting in distinguishing possible risk vulnerabilities and for increasing and enforcing risk lessening programs for all deplorable vulnerabilities which may consist of: keeping potential harmful proceedings from happening through enforcing reduction schemes; providing decision makers with data on Risk Management to review satisfactory threats; and Where suitable, channel zing the blow of possible destructive proceedings to third parties (e.g. through assurance and contractual placements). Other stakeholders may be asked for to support recognize possible threats and put forward any planned alleviation. ( Naina Parwani , Rajah & Tann, 2203) Business level The business level has in general accountability for risk management. The business level will endorse the risk management agenda and its accomplishment. It is also answerable for coverage all other risk vulnerabilities in the i.e. commercial, monetary, saleable, IT and curriculum release threats. The CEO has full threat management accountability for exposure of risk management to stakeholders and any unit outside the institute.( Rick Gorvett, & V Nambiar, 2006) Risk manager The risk manager is accountable for the general harmonization and appraisal of all risk management actions counting: describing on all risk management actions to the business level together with yearly recounting on the accomplishment of risk management procedure organizing risk management (including claims management) actions with trade units and personnel particularly where there are deplorable threats vulnerabilities and claims coming up supervising the organization’s risk background through information from managers and employees describing risks and the type of risk alleviation procedures to the business level offering guidance and instruction to all employees on risk evaluation, alleviation and executive proficiencies escalating risk consciousness all the way through the organization Formulating a risk-management structure It is not potential to condense all the probable threats in the business to nil. This may be due to: there is no realistic method of getting rid of the risk modeled by some threats annihilating some threats is merely not monetarily meaningful as a result the threat management structure should be planed that: imitate where the maximum possible threats lie commence realistic checks to lessen threats to their lowest potential stage imitate the expenses and profit of taking action to decrease or eradicate threats Having mechanical checks in position is an indispensable element of any threat management structure but these must be confirmed by plans, measures and data safety management systems. Plans and policies It is significant to have plans in place to administer acts that could potential cause safety risks. Think about executing an Internet handling plan, so that personnel are patent about what actions they are permitted to accomplish when using the Internet and those they are not. The business should also make an email handling plan, since the threat of viruses being brought in into the business during attachments to emails is very severe Software can also be installed to obstruct any attachments that the system is hesitant about. Principles Principles are significant when mounting a protected e-commerce atmosphere. For instance, decided values for the getting possession of PCs, servers and firewalls will help to offer steadiness and will help out in growing self-assurance in the technological situation. Technological check events Plans to hold up technical checks are decisive; predominantly those that allots and removes right to use. Failures to withdraw right to use to employees that have left a trade, or persons within a third-party business partner, is a main safety deteriorating of many organizations.( Rick Gorvett, & V Nambiar, 2006) Data safety management scheme A completely purposeful data security management scheme will offer a structure within which the technological checks, plans, values and functions can be urbanized, controlled and critiqued. ISO/IEC 27001 is an worldwide standard that allows for a structure for data safety high-quality carry out. Threat prevention and relocate If there are acknowledged threats to the business data systems that can't be anticipated by any technological checks that can be put in position then there are other alternatives. Risk prevention Risk prevention is the most effectual way of managing threat It means making a conclusion not to go into into a new way of operational for the reason that of the intrinsic threats this would bring in. While this may be a suitable conclusion, it can be firm to take as the commerce drivers for altering operational exercises can be tremendously strapping, particularly if there is heaviness from your contenders. Risk prevention may not for all time be a sensible choice for your trade, but it can structure an imperative part of your in general deliberation of threat. Even if you make a decision against using it, at least one will be building the choice based on informed conclusion. Risk reassign Risk can be reassigned in two ways. The original is through insurance. This can be challenging in e-commerce as it is frequently hard to enumerate the business failure subsequent a safety occurrence. It is even more complicated if the blow was due to a safety infringement inside a trading partner's business. The subsequent choice is to bond views of e-commerce task out to a third party. This could engage an additional business holding the systems or organization them on ones behalf. The magnetism is that many third-party hosting services function in a safer technological atmosphere. on the other hand, while binding legal agreement can explain the service correspondences and any punishments that may be brought down, the most important blow of any occurrence will always be on the business. It could also potentially charge more funds. (P A T R I C K J . S T R O H, 2005) Diminution of risks and exposures One cannot entirely get rid of the threats to ones business so there is need to map how he/she will diminish the a variety of risks and exposures. Lessening of risks One can decrease the risks to e-commerce system and facilities by: building business with a reduction of a mark - think about what needs to be on communal or common systems and, where probable, do away with responsive commerce data mounting the awareness of business as protected - make sure that all expressions of safety measures come into view to be installed and well handled ascertaining that forewarning signs on the website are obviously exhibited to any customer who undertakes to right of entry into protected components of it not rendering any openly accessible data concerning the safety systems or operating systems in use Diminution of susceptibility Abridged susceptibility amounts are intended to decrease or eliminate identified impuissance in the e-commerce surroundings. Characteristic measurements consist of: Installing firewalls to sort out unlawful right of entry. Such systems should be assembled properly and the standards on which they are based should imitate the inevitably of the business. (Visa, 2002) Installing well-built verification procedures. These certify the uniqueness of users and are safer than straightforward code word systems. There are escalating numbers of using human physical characteristics (face shape, finger prints, etc) for recognition and smart-card solutions offered, but one should at least think a two-stage advancement based upon something one have. Using digital securities to offer belief between people, systems and business partners. These supply safe infrastructure by manifesting individuals, systems or organizations and defend entity transactions through the formation of digital signatures. Distributing virtual private networks (VPNs) to supply a confidential guide over the Internet that business partners can use to swap over business data steadily. (P A T R I C K J . S T R O H, 2005) Employing all accessible operating system and safekeeping product plots to make sure that hackers are not able to make use of known exposures. Conclusion: There are following important key points that an e-commerce business should follow for the expansion and accomplishment of an efficient threat approach. This preparation is according to the structure of ISO/IEC 27001: Cluster threats in an e-commerce framework, keying out alterations to customary IT system threats and the opening of new e-commerce precise risks. Think about the chance, ability and incentive behind possible assaults. Carry out usual risk investigation critical review. Set up an effectual event footage and management system that covers all components of the e-commerce atmosphere. Lay your e-commerce system inside an effectual data safety structure. Think about qualifications to ISO/IEC 27001 for your business and your business partners. put into practice customary arrangement for PCs, servers, firewalls and other technological factors of the system. Do not trust on just one technical check. Most safekeeping individuals advocate a least of "two factor" verification to warranty customer uniqueness, for instance something one have (such as an ID card) and something one be familiar with (a PIN number or password). Hold up all technological checks with suitable plans, processes and consciousness. Build up incorporated business stability programs for all significant e-commerce solutions. Accomplish usual risk investigation critical review to make sure the checks you have enforced are still successful. Reference: 1. S.R. Warrier & P Chandrashekhar, Enterprise Risk Management, Tokyo, 2006 2. Naina Parwani , Rajah & Tann, Risk Management Practices — Internet Banking Technology Risk Management GuidelinesJune 2003 3. Rick Gorvett, & V Nambiar, Setting up the enterprise risk management office, Chicago 2006 4. P A T R I C K J . S T R O H, Enterprise risk management, july 2005 5. Visa, Visa E-Commerce Merchants’ Guide to Risk Management, 2002 Visa U.S.A. Inc. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Enterprise Risk Management in E-commerce Report, n.d.)
Enterprise Risk Management in E-commerce Report. https://studentshare.org/management/2043350-enterprise-risk-management
(Enterprise Risk Management in E-Commerce Report)
Enterprise Risk Management in E-Commerce Report. https://studentshare.org/management/2043350-enterprise-risk-management.
“Enterprise Risk Management in E-Commerce Report”. https://studentshare.org/management/2043350-enterprise-risk-management.
  • Cited: 0 times

CHECK THESE SAMPLES OF Enterprise Risk Management in E-commerce

Value and Risk Management in Construction

This essay provides an evaluation of current and potential future application of Value and risk management into professional services in the construction sector.... Therefore, the writer firstly describes the fundamental risk management knowledge and principles.... (Office of government commerce, 2003) risk management mainly includes all the activities that are required for the identification and control of the risks that are related to the option of the preferred project....
10 Pages (2500 words) Essay

E-Commerce in Project Integration

Electronic commerce is referred as e-commerce or EC.... e-commerce in Construction BusinessLike any other business, the construction business involves the sales, purchase, cash and information transfer and transportation of goods.... Most of the businesses use the e - commerce applications for transfer of funds, supply chain management, e marketing, market online, processing of transactions, interchanging data, managing the inventory and for data collection....
12 Pages (3000 words) Essay

Factors Which Deter People from Using Online Banking

It uses a web based interface with connects them directly to all the transactional options available.... It is fairly easy to operate and eliminates the need to… The popularity of this form of bank access increased proportionally with rise in internet usage in recent years.... Online customer service makes one on one interaction easy, saving even more time....
4 Pages (1000 words) Essay

Opportunities and Challenges of Starting up an Online Business in China

The Taobao e-commerce platform provides new opportunities for businesses in China, and across the world, to showcase their products to a variety of growing markets in Asia.... In terms of specific shopping behaviour in the e-commerce environment, a recent survey identified that 73.... Growth in the availability of credit services in China has made Taobao ideal for new businesses that are well-equipped with high quality distribution networks that can supply consumers after making an e-commerce transaction....
9 Pages (2250 words) Essay

A Risk Management Process within a Large-Scale Information Technology Project

The author of this paper creates a risk management process within a large-scale information technology project.... The E-Commerce project is creating an online shopping site for an existing enterprise, which will demonstrate the application of risk management.... nbsp; … On a rather different approach, qualitative risk management measures, risks, or values of assets with regard to their ranking in terms of risk level such as high, medium, or low, in which the scale varies between 1 and 10....
8 Pages (2000 words) Assignment

Opportunities of Online Retailing

The author of the current research paper "Opportunities of Online Retailing" brings out that e-commerce has received worldwide attention and recognition as an effective business tool.... It is, however, important to remember that for a brick and motor business to embrace and benefit from e-commerce, it must be ready to counter some of the challenges inherent in the practice.... e-commerce can be defined as a business that is transacted electronically....
9 Pages (2250 words) Research Paper

Justification of the Concern over E-Commerces Effects on Tax Revenue

oncerns over loss in tax revenue due to an increase in e-commerce have not emerged without any valid base.... The increasing involvement of business enterprises in e-commerce has given birth to a number of problems in the area of sales tax collection by governments in many countries including Australia.... OECD has stressed on effective management in this context.... "Justification of the Concern over e-commerce's Effects on Tax Revenue" paper examines OECD's view in regard to permanent establishment and e-commerce....
7 Pages (1750 words) Coursework

Specifics of Doing Business in China

The paper "Specifics of Doing Business in China" focuses on legal forms of doing business in China and trade, establishing of sino-foreign equity joint venture or contractual joint venture enterprise, wholly foreign-owned enterprises, other businesses that foreign investors can also invest in - barter system,  compensation trading....
9 Pages (2250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us