Volume- 4
Issue- 3
Year- 2017
DOI: 10.21276/ijirem.2017.4.3.3 | DOI URL: https://doi.org/10.21276/ijirem.2017.4.3.3 Crossref
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Dr. Prabhat Kumar Vishwakarma
Information Technology boom specially as E-business or online business has given the remarkable business trend among the public which can be observed easily by the frequent usages of Paytm, Debit Card, Credit Cards, Internet Banking, Mobile Banking etc. that is all business deals are just one click or one touch away . As in any business financial transactions are always and will always be the important activity therefore the key role of banking sectors with the handshaking with Information Technology along with Cyber Laws shall always be of prime importance. If the businesses are fully web enabled then basis of brand building may be customer online review about the product which is one of the informal way of certifications about the quality of product or services which could have been possible due to the emergence of E-Commerce and subsequently its effective practices. But still cyber frauds cannot be overlooked. This paper focuses on the current unethical E-Business practices and the role of Cyber laws to overcome it.
[1]https://www.statistica.com/statistics/290525/cybercrimebigges onlinedatabreachesworldwide
[2] Internet Security Threat Report 2014: Volume 19
[3]http://www.abplive.in/indianews/socialtradescamallyouneedtok nowaboutonlinefraudofrs3700cr488405
[4]http://timesofindia.indiatimes.com/city/noida/multiagencyprob einnoidaponziscamedraidsin3cities/articleshow/56992039.cms
[5] Barr, David D. "The Need of a Broad Standard in Global Ecommerce" The Internet Law Journal, Dec. 26, 2000
[6]https://www.scmagazineuk.com/top10issuesinitsecurityfor2014 /article/ 545904/
[7]"Law, Ethics and Cyber Crime" Prentice Hall 2003
[8] Garcia-Morchon, O., Kumar, S. Security Considerations in the IP-based Internet of Things , Sept. 11., 2013. http://tools.ietf.org/html/draft-garcia-core-security-06
[9] Chris Lu, Prof. Raj Jain, Security and Privacy issues in Internet of Things, 2014 http://www.cse.wustl.edu/~jain/cse57414/ftp/security/index.ht ml
Life Member of Indian Society for Technical Education
No. of Downloads: 13 | No. of Views: 942
Dr. Raj Bihari Lal Srivastava.
November 2018 - Vol 5, Issue 6
Temenuzhka Halacheva .
May 2016 - Vol 3, Issue 3
Temenuzhka Halacheva.
March 2016 - Vol 3, Issue 2