¶ … Optimal IT Security Solution for Zappos
Established in 1999, Zappos.com, operated and maintained by Zappos IP, Inc. (hereinafter alternatively "Zappos" or "the company"), has emerged in recent years as one of the leading providers of online apparel and footwear sales (Zappos media kit, 2014). The company has achieved its success through a combination of top-notch customer service, innovative marketing and order fulfillment practices as well as providing its customers with an enormous array of selections. In fact, at present, Zappos.com features millions of products from more than one thousand shoe and clothing brands (Zappos media kit, 2014). For 6 years running, Zappos.com has also been designated as one of the Fortune 100's Best Companies to Work For (Zappos media kit, 2014). Moreover, Zappos.com has been rated as "Elite" by STELLA Service and has been designated one of just 40 J.D. Power's Customer Service Champions in the United States in 2011 (Zappos media kit, 2014). This paper provides an analysis, evaluation and synthesis of the best solution for the current information technology security issues at Zappos. A summary of the research and important findings concerning these information security issues are provided in the conclusion.
Review and Analysis
Statement of the problem
Companies that use a Web site for their central business hub for integrated marketing must provide a comprehensive approach to customer service (Cusick, 2009). Irrespective of the type of platforms used for customer interactions, the overarching objective is to develop a positive rapport with customers to build loyalty and repeat business (Cusick, 2009). According to Cusick, "Zappos understands that -- Web company or not -- the true customer experience is the cumulative effect of all interactions and communications on the customer's perception of the company" (2009, p. 122).
While the company has managed to deliver the high quality of customer service that is needed to build and sustain a successful enterprise, Zappos has experienced some significant information technology security issues in recent months, some of which are still in place. For instance, on the company's Web site page, "Protecting Your Personal Information," it boasts that personal customer information is thoroughly protected by Trustwave. In this regard, Zappos' Web site encourages visitors to "Click on the Trustwave Trusted Commerce Seal for details regarding the Trustwave compliance and security services provided to Zappos. You can also find verification of this certificate on some Zappos.com secure pages, like our checkout and billing pages" (Protecting your personal information, 2015, para. 4). When visitors click on the Trustwave Trusted Commercial Seal, though, the following message appears:
Trustwave does not recognize this organization. Trustwave Holdings, Inc. makes no representation or warranty as to whether systems are secure from either an internal or external attack or whether cardholder data is at risk of being compromised. Trustwave Holdings, Inc. makes no representations or warranties regarding this company's business activities or operations (Trustwave recognition, 2015, para 1)
An email query concerning the above directed to the customer service department at Zappos remained unanswered at the time of this writing. Despite this incongruence, Zappos continues to emphasize the protections afforded to its customers by the Trustwave service. For instance, the company's Web site enthuses, "While on one of these pages, simply click on the key or lock image in the bottom bar of your browser window. A window will appear with our site security information" (Protecting your personal information, 2015, para. 3). Notwithstanding these assurances, a visit to the company's checkout page at https://secure-www.zappos.com/cart reveals that no such key or lock image appears in the bottom bar of the browser window.
There were some other inconsistencies identified in the company's information technology security systems. For example, the company states that its servers are protected by secure firewalls that provide complete protection for its customers. In this regard, Zappos maintains that, "You're absolutely safe while you shop. SSL Technology, Trustwave, and Industry Standard Firewalls all work together to ensure your privacy and to assist in protecting your personal data" (Protecting your personal information, 2015, para. 4). As noted above, not only is the company's Trustwave protection disabled, Zappos also reported on October 15, 2014 that it has experienced other problems in its IT security systems. According to a Zappos technician, "Due to the SSL vulnerability that was announced [October 14, 2014], Zappos has taken proactive steps to disable SSLv3/v2. SSL or secure sockets layer provides encryption to prevent your information from being intercepted in between you and a service provider, such as Zappos" (Zappos technology,...
However, the company needs to be cautious of putting too much power in the customers' hands. 5. Competitive Rivalry between Existing Players Direct competitors are currently not able to match Zappos capabilities, especially in terms of customer service. But this does not mean they should be dismissed as viable competitors. In fact all direct competitors should be watched very closely. SWOT Analysis Strengths Outstanding customer service Free overnight shipping Wide variety of products Happy, dedicated employees Weaknesses Cannot afford
solution to the IT issue selected for this project. The implication of IT security for online retailers is fundamental to ensuring consumer confidence and trust (Streeter, 2009). Moreover, online consumers are far less forgiving of IT security failures than they were just a few years ago based on their positive online experiences with other secure sites (Streeter, 2009). Lapses in IT security can also cause a loss of business and
Today only a General Manager of a distribution center can gain access to the databases where customer records are kept and only by role access privileges can they even see them, which were a requirement of customers who were outraged by the breach (Shine, 2012). Providing Greater Security for Customers: Two Alternatives The most effective security strategy Amazon can take in light of the breach of their confidential data from internally
Lessons Learned From Zappos' Security Breach in January, 2012 On January 16, 2012 Zappos' experienced its first major security breach through a compromised server at its recently opened Kentucky Distribution Center, with an experienced hacker gaining access to potentially 24 million customer records. The Zappos' internal ordering systems had encrypted passwords for safety as part of its basic architecture, yet the last four digits of credit cards, complete customer histories and
Organizational culture is defined as the personality of an organization since it comprises the norms, values, and assumptions that govern work practices in an organization (McNamara (2000). Therefore, organizational structure determines how work is divided, coordinated, and categorized in an organization. Organizational structure is one of the most influential factors on the success and profitability of an organization since it affects members and influences how organizational strategy is executed. This
Chronology of the Internet's Development When the internet search titan Google stated a "mission to organize the world's information and make it universally accessible and useful," this vision statement encapsulated both the scope of the company's strategic objective, and the supremacy of the online age in modern society. Founded in 1998 by Stanford University Ph.D. students Larry Page and Sergey Brin, Google has since emerged as the global leader in the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now