Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

The Need and Impact of Implementing an Effective Virtual Private Network (VPN) in the Retail Business Sector during COVID-19 Pandemic


Affiliations
1 Lecturer, Digital Business Management, Martin de Tours School of Management and Economics, Assumption University, Thailand
     

   Subscribe/Renew Journal


As a result of digitalization, retail organisations have more freedom and opportunities to reduce the cost of transitions, capture many new customers, maintain positive relationships with current customers, and provide positive energy and motivation to employees by offering a variety of benefits such as work from home and remote working, as well as allowing consumers to purchase goods and services from any location [1]. When employees are working or when customers visit the retail business network, the retail business is concerned with maintaining a secure connection [2]. Most employees and consumers use computers and mobile devices for work, so they require a secure connection as well as protection against the sharing of sensitive information and data [3]. The purpose of this study is to examine the factors that influence the adoption of virtual private networks in the retail industry using secondary data. According to the findings of this study, Virtual private networks (VPNs) are necessary for providing secure connections over public networks. There are numerous factors that have an impact on the adoption of virtual private networks in retail businesses to create a risk-free and secure network. These factors are both direct and indirect. Virtual private networks (VPNs) not only provide security for network and data access, but they also assist in keeping the data that is made available safe and secure.

Keywords

Digitalisation, E-Commerce, Retail business, Security, Virtual Private Network (VPN).
Subscription Login to verify subscription
User
Notifications
Font Size


  • L. McGregor, and N. Doshi, “How to make your team motivated, remotely,” Harvard Business Review, 2020. [Online]. Available: https://hbr.org/2020/04/how-to-keep-your-team-motivated-remotely
  • D. Gilmore, “9 ways to make your company network secure,” 2019. [Online]. Available: https://tdwi.org/articles/2019/04/23/dwt-all-9-ways-to-make-your-company-network-secure.aspx
  • N. Lord, “An expert guide to securing sensitive data: 34 experts reveal the biggest mistakes companies make data security,” 2021. [Online]. Available: https://digitalguardian.com/blog/expert-guide-securing-sensitive-data-34-experts-reveal-biggest-mistakes-companies-make-data
  • OECD, “OECD policy responses to corona virus (COVID-19), e-commerce in the time of COVID-19,” 2020. [Online]. Available: https://www.oecd.org/coronavirus/policy-responses/e-commerce-in-the-time-of-covid-19-3a2b78e8/
  • UNCTAD, “Digital economy report 2019, value creation and capture: Implications for developing countries,” 2019. [Online]. Available: https://unctad.org/system/files/official-document/der2019_en.pdf
  • Forbes, “What is a business VPN, and how can it secure your company?,” 2018. [Online]. Available: https://www.forbes.com/sites/forbestechcouncil/2018/11/15/what-is-a-business-vpn-and-how-can-it-secure-your-company/?sh=38169dc563a5
  • IBM Cloud Education, “Virtual private could,” 2019. [Online]. Available: https://www.ibm.com/cloud/learn/vpc
  • Allied Market Research, “Virtual private network market by component (solution and services), type (remote access VPN, site-to-site VPN, and others), deployment (cloud and on-premise), and end user (commercial users and individual users): Global opportunity analysis and industry forecast, 2020-2027,” 2020. [Online]. Available: https://www.alliedmarketresearch.com/virtual-private-network-market
  • D. Chou, D. Yen, and A. Chou, “Adopting virtual private network for electronic commerce: An economic analysis,” Industrial Management and Data Systems, vol. 105, pp. 223-236, 2005, doi: 10.1108/02635570510583343.
  • T. S. Sobh, and Y. Aly, “Effective and extensive virtual private network,” Journal of Information Security, vol. 2011, no. 2, pp. 39-49, 2011, doi: 10.4236/jis.2011.21004. Published Online Jan. 2011. [Online]. Available: http://www.SciRP.org/journal/jis
  • M. Mkansi, “Ebusiness adoption costs and strategies for retail micro businesses,” Electronic Commerce Research, 2020. [Online]. Available: https://doi.org/10.1007/s10660-020-09448-7
  • A. R. Locket, “Online marketing strategies for increasing sales revenues of small retail businesses,” Ph.D. dissertation, Walden University, 2018. [Online]. Available: https://scholarworks.waldenu.edu/dissertations
  • W. Reinartz, N. Wiegand, and M. Imschloss, “The impact of digital transformation on the retailing value chain,” International Journal of Research in Marketing, vol. 36, no. 3, pp. 350-366, Sep. 2019. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0167811618300739
  • N. Giandomenico, and J. de Grooto, “Insider vs. Outsider data security threats: What’s the greater risk?,” 2020. [Online]. Available: https://digitalguardian.com/blog/insider-outsider-data-security-threats
  • McKinsey and Company, “Digital globalization: The new era of global flows,” 2016. [Online]. Available: https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/McKinsey%20Digital/Our%20Insights/Digital%20globalization%20The%20new%20era%20of%20global%20flows/MGI-Digital-globalization-Full-report.ashx
  • N. Lord, “Social engineering attacks: Common techniques and how to prevent an attack,” 2020. [Online]. Available: https://digitalguardian.com/blog/social-engineering-attacks-common-techniques-how-prevent-attack
  • S. S. Darvazeh, I. R. Vanani, and F. M. Musolu, “Big data analytics and its applications in supply chain management,” 2020. [Online]. Available: https://www.intechopen.com/chapters/69320
  • N. Ndung’u, and L. Signe, “The fourth industrial revolution and digitization will transform Africa into a global powerhouse,” 2020. [Online]. Available: https://www.brookings.edu/research/the-fourth-industrial-revolution-and-digitization-will-transform-africa-into-a-global-powerhouse/
  • Cameron Camp, “As the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks,” 2020. [Online]. Available: https://www.welivesecurity.com/2020/03/18/work-home-how-set-up-vpn/
  • L. Silver, A. Smith, C. Johnson, J. Jiang, M. Anderson, and L. Rainie, “Use of smartphones and social media is common across most emerging economies,” 2019. [Online]. Available: https://www.pewresearch.org/internet/2019/03/07/use-of-smartphones-and-social-media-is-common-across-most-emerging-economies/
  • N. J. Rubenking, “The best antivirus protection for 2021,” 2021. [Online]. Available: https://in.pcmag.com/antivirus-from-pc-ma/34241/the-best-antivirus-protection-for-2020
  • S. Ursillo, C. Arnold Jr., “Cyber security is critical for all organizations - large and small,” 2019. [Online]. Available: https://www.ifac.org/knowledge-gateway/preparing-future-ready-professionals/discussion/cybersecurity-critical-all-organizations-large-and-small
  • P. Renjen, “The heart of resilient leadership: Responding to COVID-19,” 2020. [Online]. Available: https://www2.deloitte.com/us/en/insights/economy/covid-19/heart-of-resilient-leadership-responding-to-covid-19.html
  • D. Janssen, “VPN explained: How does it work? Why would you use it?,” 2021. [Online]. Available: https://vpnoverview.com/vpn-information/what-is-a-vpn/
  • L. Spawn, “6 ways to keep employer data secure when working remotely,” 2019. [Online]. Available: https://www.cmswire.com/information-management/6-ways-to-keep-employer-data-secure-when-working-remotely/
  • J. Anderson, “Experts say the ‘New Normal’ in 2025 will be far more tech-driven, presenting more big challenges,” 2021. [Online]. Available: https://www.pewresearch.org/internet/2021/02/18/experts-say-the-new-normal-in-2025-will-be-far-more-tech-driven-presenting-more-big-challenges/
  • N. Cory, “Cross-border data flows: Where are the barriers, and what do they cost?,” 2017. [Online]. Available: https://itif.org/publications/2017/05/01/cross-border-data-flows-where-are-barriers-and-what-do-they-cost
  • J. Gervais, “What is a VPN?,” 2021. [Online]. Available: https://us.norton.com/internetsecurity-privacy-what-is-a-vpn.html
  • J. Jang-Jaccard, and S. Nepal, “A survey of emerging threats in cyber security,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 973-993, ISSN 0022-0000, 2014. [Online]. Available: https://doi.org/10.1016/j.jcss.2014.02.005. https://www.sciencedirect.com/science/article/pii/S0022000014000178
  • D. Gewirtz, “What is a VPN and why do you need one? Everything you need to know,” 2021. [Online]. Available: https://www.zdnet.com/article/what-is-a-vpn-and-how-does-it-work/
  • S. Beaver, “10 top financial challenges for small businesses and how to overcome them,” 2020. [Online]. Available: https://www.netsuite.com/portal/resource/articles/business-strategy/small-business-financial-challenges.shtml

Abstract Views: 173

PDF Views: 0




  • The Need and Impact of Implementing an Effective Virtual Private Network (VPN) in the Retail Business Sector during COVID-19 Pandemic

Abstract Views: 173  |  PDF Views: 0

Authors

Pritam Kumar
Lecturer, Digital Business Management, Martin de Tours School of Management and Economics, Assumption University, Thailand

Abstract


As a result of digitalization, retail organisations have more freedom and opportunities to reduce the cost of transitions, capture many new customers, maintain positive relationships with current customers, and provide positive energy and motivation to employees by offering a variety of benefits such as work from home and remote working, as well as allowing consumers to purchase goods and services from any location [1]. When employees are working or when customers visit the retail business network, the retail business is concerned with maintaining a secure connection [2]. Most employees and consumers use computers and mobile devices for work, so they require a secure connection as well as protection against the sharing of sensitive information and data [3]. The purpose of this study is to examine the factors that influence the adoption of virtual private networks in the retail industry using secondary data. According to the findings of this study, Virtual private networks (VPNs) are necessary for providing secure connections over public networks. There are numerous factors that have an impact on the adoption of virtual private networks in retail businesses to create a risk-free and secure network. These factors are both direct and indirect. Virtual private networks (VPNs) not only provide security for network and data access, but they also assist in keeping the data that is made available safe and secure.

Keywords


Digitalisation, E-Commerce, Retail business, Security, Virtual Private Network (VPN).

References