SlideShare a Scribd company logo
Subject - Cyber Laws & Rights
M. tech. 3rd Sem., ISM.
 By: Prashant Kr. Vats,
 M.tech., Ph.D.
• E-Commerce: What is it?
• E-Commerce: Business Models
• Why is E-Commerce important?
• Challenges and Issues
• Conclusions
• “Any form of economic activity conducted via
electronic connections”
• Does not have to involve the Internet and WWW
• Three main components to e-commerce:
– Economic activity involved
– Interaction occurs electronically
– The interaction crosses organizational boundaries
• What about “e-business”?
– e-commerce definition plus within firm operations
Examples of 2-tier and n-tier implementations
Consumer PCs
Web Server
Application Server
Database Server
Application
Server
Database
Server
Small
Company Larger
Company
Internet
Web Server
Busine
ss
Consume
r
Governmen
t
B2C
G2C
G2B
B2B C2C
G2G
• Lowers transaction costs
• Estimates of future use in the trillions of dollars
of activity
Industry Total Market Internet Share
Internet Share
in 2003
% increase
Retail $2.6 trillion $16.8 billion $62 billion 269
Manufacturing $4.2 trillion $134 billion $1.7 trillion 1169
Finance $1.9 trillion $103 billion $435 billion 322
Source: C. Byron, “Net Dry Rot,” Business 2.0 (April 2000): 195-210
Top 5 dot-com flops*
1. Webvan (1999-2001): online grocery
2. Pets.com (1998-2000): online pet-supply store
3. Kozmo.com (1998-2001): online store and delivery
service
4.Flooz.com (1998-2001): online currency
5. eToys.com (1997-2001):
* Source: Top 10 dot-com flops, cnet.com
• Technical issues
• Perceptual issues
• Societal issues
• Legal and ethical issues
• Intellectual property issues
• Interoperability
• Security
• Privacy
• Connectivity to existing systems (backward compatibility)
– Web-based front-end systems must be able to connect with back-end legacy
systems that tend to be large, complex, and poorly documented.
– Must use “middleware” to translate data from one system to another.
• Internet “pipeline” capacity to support efficient transmission of possibly
large-sized contents (music, videos, high-resolution graphics/photos)
– E.g., Napster phenomenon
• Web organization – how to conveniently locate products or services on-line
from a dozen of “directories” on the Web.
• The ability of systems running in different
operating environments to communicate and
work together.
– E.g., clients running Windows XP can access Web
pages from servers running Linux.
• For the interoperability to work, the same set of
rules (protocols) must be followed.
• Internetworking standard, i.e., TCP/IP
– TCP: managing overall network transport function
• Breaking information into data packets, tagging each packet
with a sequence number before submitting it to the IP layer.
• At the other end, TCP layer assembles all packets received
and rearrange them in original order.
– IP: managing addressing and routing
• Addressing – determining the addresses to be used
• Routing – determining the best possible route for packet
transmission
• Threats to systems
• Three types of security threats
– denial of service,
– unauthorized access, and
– theft and fraud
• Denial of Service (DOS)
• Two primary types of DOS attacks: spamming and
viruses
• Spamming
– Sending unsolicited commercial emails to individuals
– E-mail bombing caused by a hacker targeting one computer or
network, and sending thousands of email messages to it.
– Smurfing involves hackers placing software agents onto a third-
party system and setting it off to send requests to an intended
target.
– DDOS (distributed denial of service attacks) involves hackers
placing software agents onto a number of third-party systems
and setting them off to simultaneously send requests to an
intended target
• Viruses: self-replicating computer programs
designed to perform unwanted events
• Worms: special viruses that spread using direct
Internet connections
• Trojan Horses: disguised as legitimate software
and trick users into running the program
• Illegal access to systems, applications or data
• Passive unauthorized access – listening to
communications channel for finding secrets.
– May use content for damaging purposes
• Active unauthorized access
– Modifying system or data
– Message stream modification
• Changes intent of messages, e.g., to abort or delay a
negotiation on a contract
• Masquerading or spoofing – sending a message
that appears to be from someone else.
– Impersonating another user at the “name” (changing
the “From” field) or IP levels (changing the source
and/or destination IP address of packets in the
network)
• Sniffers – software that illegally access data
traversing across the network.
• Software and operating systems’ security holes
• Data theft already discussed under the
unauthorized access section
• Fraud occurs when the stolen data is used or
modified
• Theft of software via illegal copying from
company’s servers
• Theft of hardware, specifically laptops
• Threats to data
• Data collection
– Faster and easier data collection thru online technology
– Cross-referencing (aggregation) real offline consumer data with
online purchasing habits collected with or without their
knowledge. Or cross-referencing online data with other online
data between several Web entrepreneurs, for example
– Hidden data collection without consumer consent, possibly thru
cookies, for example
• Usage tracking
– Patterns of online activity lead to inferences about the user’s
product preferences for providing customized pop-up ads and
referring sites.
– May include today’s spyware.
• Spyware: a type of program that watches what
users do with their computer and then sends that
information over the Internet to the spyware’s
author
(Phishing Techniques)
• Misspelled URLs or the use of subdomains, e.g.,
http://www.yourbank.com.example.com
• Spoofing links using Web addresses containing the @ symbol, e.g.,
http://www.google.com@members.tripod.com
//<user>:<password>@<host>:<port>/<url-path>
• Use of JavaScript commands to alter the address bar by placing a
picture of the legitimate URL over the fake one, or by closing the
fake URL and opening a new one containing the legitimate URL
• One of the most important barriers to the use of e-business.
• Hosmer (1995): “the expectation that the other party will behave in
accordance with commitments, negotiate honestly, and not take
advantage, even when the opportunity arises.”
• Trust lies somewhere between total trust or complete lack of trust.
• Level of trust may change over time as one becomes more familiar
with the other party through experience or other knowledge.
• Characteristics of e-business transactions that make trust important
– Distance
– Technology – e.g., buyers must trust a merchant to be knowledgeable
enough to make use of IT to implement some security measure to
protect their credit card numbers.
• Predictability
– Establishing clear expectations – e.g., consistently sending email
notifications of order confirmation, and of order shipment.
• Reliability
– Providing follow through (do according to what merchants’
promise)
• Technical competence
– Ability to carry out responsibilities (and show this clearly to
potential users)
• Fiduciary responsibility
– Act on behalf of the customer’s interests (e.g., on-line travel
agencies)
• Telecommunications Infrastructure
– Differences in cost of connecting and (cost/income)
• Access Inequalities
– Digital Divide and access to equipment
• Information Technology Skills Shortage
– Workforce shortage (large number of unfilled IT positions)
– Global movement of IT workers (“brain drain”) from developing
countries to developed ones for higher salaries
– Retaining IT workers in the field (jobs rotations, providing
training)
• Digital signatures
– Knowing whose messages come from
– Used for 2 purposes
• Authenticate identity of signer
• Nonrepudiation
• Consumer Protections!
– Small-claims courts
– Limited liability
– Return policies
• Protection
– Copyrights – software, arts (literature, artwork, music)
– Patents – inventions
– Trademarks – name brands and logos
• Global uniformity of laws – different countries may
enforce software copyright laws differently
• “Link liability” – linking to other sites that publish
materials belonging to other people without permission
• Domain names (who owns “lakers.com”?)
– The basketball team or some individual
• Patenting business processes
– Amazon’s “1-Click” VS Barnes & Noble’s “Express Lane”
– Priceline’s name-your-price VS Expedia’s price matching system
• To achieve projected goal of Internet exercise of
e-commerce activities, several tasks must be
accomplished
– Telecom and basic infrastructure must be widespread
throughout the country and affordable
– Relevant laws must be in place and strictly enforced
– Independent organizations must be established to
protect consumer’s right
– People must be educated enough to understand how
to use the Internet to its fullest capacity
– IT personnel must be built

More Related Content

What's hot

E commerce website proposal
E commerce website proposalE commerce website proposal
E commerce website proposal
Neha sharma
 
Unit 1 overview
Unit 1 overviewUnit 1 overview
Unit 1 overview
Neelam Rawat
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
Blinsink
 
e-Commerce Website Development Proposal
e-Commerce Website Development Proposale-Commerce Website Development Proposal
e-Commerce Website Development Proposal
Indicsoft Technologies
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
Naren Naren
 
6. electronic payment systems
6. electronic payment systems6. electronic payment systems
6. electronic payment systems
Pratap Tirkey
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Noorhidayu Yussof
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
Bhagya Bgk
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
Dr. Arun Verma
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commerce
sajid ullah
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
Atul Kumar Pandey
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
Workflow automation
Workflow automationWorkflow automation
Workflow automation
aneeshcheriank
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
Muhammad Haroon
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
sohaildanish
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
Gc university faisalabad
 
Types of web portals
Types of web portalsTypes of web portals
Types of web portals
sanjeevagarwal123
 

What's hot (20)

E commerce website proposal
E commerce website proposalE commerce website proposal
E commerce website proposal
 
Unit 1 overview
Unit 1 overviewUnit 1 overview
Unit 1 overview
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
e-Commerce Website Development Proposal
e-Commerce Website Development Proposale-Commerce Website Development Proposal
e-Commerce Website Development Proposal
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
6. electronic payment systems
6. electronic payment systems6. electronic payment systems
6. electronic payment systems
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber Law With case studies
Cyber Law With case studies Cyber Law With case studies
Cyber Law With case studies
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
Phishing
PhishingPhishing
Phishing
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commerce
 
Ethics in Information Technology
Ethics in Information TechnologyEthics in Information Technology
Ethics in Information Technology
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Workflow automation
Workflow automationWorkflow automation
Workflow automation
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Types of web portals
Types of web portalsTypes of web portals
Types of web portals
 

Similar to E-Commerce: Challenges and Issues

History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
Tallat Satti
 
Unit Iv
Unit IvUnit Iv
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
Internet
InternetInternet
Internet
Coding Man
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)
Amber Bhaumik
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
rocky781582
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
Meletis Belsis MPhil/MRes/BSc
 
Week two lecture
Week two lectureWeek two lecture
Week two lecture
Harry Essel
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technology
Sharmila Devi
 
Unit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetUnit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internet
gabriela-technoteacher
 
9 - Security
9 - Security9 - Security
9 - Security
Raymond Gao
 
Unit 1
Unit 1Unit 1
Unit 1
Karthi Vel
 
The Internet
The InternetThe Internet
The Internet
webhostingguy
 
Lecture_6_E-commerce_Infrastructure.pptx
Lecture_6_E-commerce_Infrastructure.pptxLecture_6_E-commerce_Infrastructure.pptx
Lecture_6_E-commerce_Infrastructure.pptx
AmanyaLaban
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
University of Delhi
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
Mr. Moms
 
Web security
Web securityWeb security
Web security
Jin Castor
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
FarhanMalik93
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
Murali Mohan
 

Similar to E-Commerce: Challenges and Issues (20)

History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Unit Iv
Unit IvUnit Iv
Unit Iv
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Internet
InternetInternet
Internet
 
Internet and Information Technology (IT)
Internet and Information Technology (IT)Internet and Information Technology (IT)
Internet and Information Technology (IT)
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
 
Week two lecture
Week two lectureWeek two lecture
Week two lecture
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
Internet &web technology
 Internet &web technology Internet &web technology
Internet &web technology
 
Unit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internetUnit 1. chapter 5. presentation internet
Unit 1. chapter 5. presentation internet
 
9 - Security
9 - Security9 - Security
9 - Security
 
Unit 1
Unit 1Unit 1
Unit 1
 
The Internet
The InternetThe Internet
The Internet
 
Lecture_6_E-commerce_Infrastructure.pptx
Lecture_6_E-commerce_Infrastructure.pptxLecture_6_E-commerce_Infrastructure.pptx
Lecture_6_E-commerce_Infrastructure.pptx
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
 
Web security
Web securityWeb security
Web security
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 

More from Dr. Prashant Vats

Multiplexers
MultiplexersMultiplexers
Multiplexers
Dr. Prashant Vats
 
C lab programs
C lab programsC lab programs
C lab programs
Dr. Prashant Vats
 
Financial fucntions in ms e xcel
Financial fucntions in ms e xcelFinancial fucntions in ms e xcel
Financial fucntions in ms e xcel
Dr. Prashant Vats
 
4. text functions in excel
4. text functions in excel4. text functions in excel
4. text functions in excel
Dr. Prashant Vats
 
3. lookup functions in excel
3. lookup functions in excel3. lookup functions in excel
3. lookup functions in excel
Dr. Prashant Vats
 
2. date and time function in excel
2. date and time function in excel2. date and time function in excel
2. date and time function in excel
Dr. Prashant Vats
 
1. statistical functions in excel
1. statistical functions in excel1. statistical functions in excel
1. statistical functions in excel
Dr. Prashant Vats
 
3. subtotal function in excel
3. subtotal function in excel3. subtotal function in excel
3. subtotal function in excel
Dr. Prashant Vats
 
2. mathematical functions in excel
2. mathematical functions in excel2. mathematical functions in excel
2. mathematical functions in excel
Dr. Prashant Vats
 
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIARESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
Dr. Prashant Vats
 
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An OverviewIndia: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
Dr. Prashant Vats
 
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Dr. Prashant Vats
 
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Dr. Prashant Vats
 
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIAMETHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
Dr. Prashant Vats
 
Computer Software and Related IPR Issues
Computer Software and Related IPR Issues Computer Software and Related IPR Issues
Computer Software and Related IPR Issues
Dr. Prashant Vats
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Dr. Prashant Vats
 
Trademark Issues in cyberspace
Trademark Issues in cyberspace Trademark Issues in cyberspace
Trademark Issues in cyberspace
Dr. Prashant Vats
 
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Dr. Prashant Vats
 
How to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright actHow to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright act
Dr. Prashant Vats
 
International Treaties for protection of IPR
International Treaties for protection of IPRInternational Treaties for protection of IPR
International Treaties for protection of IPR
Dr. Prashant Vats
 

More from Dr. Prashant Vats (20)

Multiplexers
MultiplexersMultiplexers
Multiplexers
 
C lab programs
C lab programsC lab programs
C lab programs
 
Financial fucntions in ms e xcel
Financial fucntions in ms e xcelFinancial fucntions in ms e xcel
Financial fucntions in ms e xcel
 
4. text functions in excel
4. text functions in excel4. text functions in excel
4. text functions in excel
 
3. lookup functions in excel
3. lookup functions in excel3. lookup functions in excel
3. lookup functions in excel
 
2. date and time function in excel
2. date and time function in excel2. date and time function in excel
2. date and time function in excel
 
1. statistical functions in excel
1. statistical functions in excel1. statistical functions in excel
1. statistical functions in excel
 
3. subtotal function in excel
3. subtotal function in excel3. subtotal function in excel
3. subtotal function in excel
 
2. mathematical functions in excel
2. mathematical functions in excel2. mathematical functions in excel
2. mathematical functions in excel
 
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIARESOLVING CYBERSQUATTING DISPUTE IN INDIA
RESOLVING CYBERSQUATTING DISPUTE IN INDIA
 
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An OverviewIndia: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
India: Meta-Tagging Vis-À-Vis Trade Mark Misuse: An Overview
 
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
Trademark Cases Arise from Meta-Tags, Frames: Disputes Involve Search-Engine ...
 
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
Scheme for Notifying Examiner of Electronic Evidence Under section 79A of the...
 
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIAMETHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
METHODS OF RESOLVING CYBERSQUATTING DISPUTE IN INDIA
 
Computer Software and Related IPR Issues
Computer Software and Related IPR Issues Computer Software and Related IPR Issues
Computer Software and Related IPR Issues
 
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
Amendments to the Indian Evidence Act, 1872 with respect to IT ACT 2000
 
Trademark Issues in cyberspace
Trademark Issues in cyberspace Trademark Issues in cyberspace
Trademark Issues in cyberspace
 
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)Trade-Related Aspects of Intellectual Property Rights (TRIPS)
Trade-Related Aspects of Intellectual Property Rights (TRIPS)
 
How to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright actHow to Copyright a Website to Protect It under IPR and copyright act
How to Copyright a Website to Protect It under IPR and copyright act
 
International Treaties for protection of IPR
International Treaties for protection of IPRInternational Treaties for protection of IPR
International Treaties for protection of IPR
 

Recently uploaded

How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
Wahiba Chair Training & Consulting
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Leena Ghag-Sakpal
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
Amin Marwan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 

Recently uploaded (20)

How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience How to Create a More Engaging and Human Online Learning Experience
How to Create a More Engaging and Human Online Learning Experience
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdfIGCSE Biology Chapter 14- Reproduction in Plants.pdf
IGCSE Biology Chapter 14- Reproduction in Plants.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 

E-Commerce: Challenges and Issues

  • 1. Subject - Cyber Laws & Rights M. tech. 3rd Sem., ISM.  By: Prashant Kr. Vats,  M.tech., Ph.D.
  • 2.
  • 3. • E-Commerce: What is it? • E-Commerce: Business Models • Why is E-Commerce important? • Challenges and Issues • Conclusions
  • 4. • “Any form of economic activity conducted via electronic connections” • Does not have to involve the Internet and WWW • Three main components to e-commerce: – Economic activity involved – Interaction occurs electronically – The interaction crosses organizational boundaries • What about “e-business”? – e-commerce definition plus within firm operations
  • 5. Examples of 2-tier and n-tier implementations Consumer PCs Web Server Application Server Database Server Application Server Database Server Small Company Larger Company Internet Web Server
  • 7. • Lowers transaction costs • Estimates of future use in the trillions of dollars of activity Industry Total Market Internet Share Internet Share in 2003 % increase Retail $2.6 trillion $16.8 billion $62 billion 269 Manufacturing $4.2 trillion $134 billion $1.7 trillion 1169 Finance $1.9 trillion $103 billion $435 billion 322 Source: C. Byron, “Net Dry Rot,” Business 2.0 (April 2000): 195-210
  • 8.
  • 9.
  • 10. Top 5 dot-com flops* 1. Webvan (1999-2001): online grocery 2. Pets.com (1998-2000): online pet-supply store 3. Kozmo.com (1998-2001): online store and delivery service 4.Flooz.com (1998-2001): online currency 5. eToys.com (1997-2001): * Source: Top 10 dot-com flops, cnet.com
  • 11. • Technical issues • Perceptual issues • Societal issues • Legal and ethical issues • Intellectual property issues
  • 12. • Interoperability • Security • Privacy • Connectivity to existing systems (backward compatibility) – Web-based front-end systems must be able to connect with back-end legacy systems that tend to be large, complex, and poorly documented. – Must use “middleware” to translate data from one system to another. • Internet “pipeline” capacity to support efficient transmission of possibly large-sized contents (music, videos, high-resolution graphics/photos) – E.g., Napster phenomenon • Web organization – how to conveniently locate products or services on-line from a dozen of “directories” on the Web.
  • 13. • The ability of systems running in different operating environments to communicate and work together. – E.g., clients running Windows XP can access Web pages from servers running Linux. • For the interoperability to work, the same set of rules (protocols) must be followed.
  • 14. • Internetworking standard, i.e., TCP/IP – TCP: managing overall network transport function • Breaking information into data packets, tagging each packet with a sequence number before submitting it to the IP layer. • At the other end, TCP layer assembles all packets received and rearrange them in original order. – IP: managing addressing and routing • Addressing – determining the addresses to be used • Routing – determining the best possible route for packet transmission
  • 15. • Threats to systems • Three types of security threats – denial of service, – unauthorized access, and – theft and fraud
  • 16. • Denial of Service (DOS) • Two primary types of DOS attacks: spamming and viruses • Spamming – Sending unsolicited commercial emails to individuals – E-mail bombing caused by a hacker targeting one computer or network, and sending thousands of email messages to it. – Smurfing involves hackers placing software agents onto a third- party system and setting it off to send requests to an intended target. – DDOS (distributed denial of service attacks) involves hackers placing software agents onto a number of third-party systems and setting them off to simultaneously send requests to an intended target
  • 17. • Viruses: self-replicating computer programs designed to perform unwanted events • Worms: special viruses that spread using direct Internet connections • Trojan Horses: disguised as legitimate software and trick users into running the program
  • 18. • Illegal access to systems, applications or data • Passive unauthorized access – listening to communications channel for finding secrets. – May use content for damaging purposes • Active unauthorized access – Modifying system or data – Message stream modification • Changes intent of messages, e.g., to abort or delay a negotiation on a contract
  • 19. • Masquerading or spoofing – sending a message that appears to be from someone else. – Impersonating another user at the “name” (changing the “From” field) or IP levels (changing the source and/or destination IP address of packets in the network) • Sniffers – software that illegally access data traversing across the network. • Software and operating systems’ security holes
  • 20. • Data theft already discussed under the unauthorized access section • Fraud occurs when the stolen data is used or modified • Theft of software via illegal copying from company’s servers • Theft of hardware, specifically laptops
  • 21. • Threats to data • Data collection – Faster and easier data collection thru online technology – Cross-referencing (aggregation) real offline consumer data with online purchasing habits collected with or without their knowledge. Or cross-referencing online data with other online data between several Web entrepreneurs, for example – Hidden data collection without consumer consent, possibly thru cookies, for example • Usage tracking – Patterns of online activity lead to inferences about the user’s product preferences for providing customized pop-up ads and referring sites. – May include today’s spyware.
  • 22. • Spyware: a type of program that watches what users do with their computer and then sends that information over the Internet to the spyware’s author
  • 23.
  • 24.
  • 25. (Phishing Techniques) • Misspelled URLs or the use of subdomains, e.g., http://www.yourbank.com.example.com • Spoofing links using Web addresses containing the @ symbol, e.g., http://www.google.com@members.tripod.com //<user>:<password>@<host>:<port>/<url-path> • Use of JavaScript commands to alter the address bar by placing a picture of the legitimate URL over the fake one, or by closing the fake URL and opening a new one containing the legitimate URL
  • 26.
  • 27.
  • 28. • One of the most important barriers to the use of e-business. • Hosmer (1995): “the expectation that the other party will behave in accordance with commitments, negotiate honestly, and not take advantage, even when the opportunity arises.” • Trust lies somewhere between total trust or complete lack of trust. • Level of trust may change over time as one becomes more familiar with the other party through experience or other knowledge. • Characteristics of e-business transactions that make trust important – Distance – Technology – e.g., buyers must trust a merchant to be knowledgeable enough to make use of IT to implement some security measure to protect their credit card numbers.
  • 29. • Predictability – Establishing clear expectations – e.g., consistently sending email notifications of order confirmation, and of order shipment. • Reliability – Providing follow through (do according to what merchants’ promise) • Technical competence – Ability to carry out responsibilities (and show this clearly to potential users) • Fiduciary responsibility – Act on behalf of the customer’s interests (e.g., on-line travel agencies)
  • 30. • Telecommunications Infrastructure – Differences in cost of connecting and (cost/income) • Access Inequalities – Digital Divide and access to equipment • Information Technology Skills Shortage – Workforce shortage (large number of unfilled IT positions) – Global movement of IT workers (“brain drain”) from developing countries to developed ones for higher salaries – Retaining IT workers in the field (jobs rotations, providing training)
  • 31. • Digital signatures – Knowing whose messages come from – Used for 2 purposes • Authenticate identity of signer • Nonrepudiation • Consumer Protections! – Small-claims courts – Limited liability – Return policies
  • 32. • Protection – Copyrights – software, arts (literature, artwork, music) – Patents – inventions – Trademarks – name brands and logos • Global uniformity of laws – different countries may enforce software copyright laws differently • “Link liability” – linking to other sites that publish materials belonging to other people without permission • Domain names (who owns “lakers.com”?) – The basketball team or some individual • Patenting business processes – Amazon’s “1-Click” VS Barnes & Noble’s “Express Lane” – Priceline’s name-your-price VS Expedia’s price matching system
  • 33. • To achieve projected goal of Internet exercise of e-commerce activities, several tasks must be accomplished – Telecom and basic infrastructure must be widespread throughout the country and affordable – Relevant laws must be in place and strictly enforced – Independent organizations must be established to protect consumer’s right – People must be educated enough to understand how to use the Internet to its fullest capacity – IT personnel must be built