Interdisciplinary Perspectives on Business Convergence, Computing, and Legality - Advances in E-Business Research
Latest Publications


TOTAL DOCUMENTS

20
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781466642096, 9781466642102

Author(s):  
Amita Verma ◽  
Amit Verma

With the growth and development in technology, one of the most significant changes has been the commercialisation of Internet. There has been a revolution in Internet technology with the International Convention on Civil and Political Rights recognizing “Right to Internet” as a human right. There are countries like Antigua and Barbuda, Angola, Armenia, Colombia, the Czech Republic, the Dominican Republic, Estonia, Finland, France, Iceland, Liechtenstein, Panama, Poland, Peru, South Africa, Turkey, Trinidad and Tobago, Slovakia, and the United Kingdom, which already have legislations promoting the cause of Internet to every citizen. This chapter aims to study the implementation and utility of the right to Internet being recognized as a fundamental right and the principles behind it. It also intends to study the method of implementation of this right keeping in mind the situation prevalent in China, which restricts Internet usage. The chapter would also make suggestion with regards to the remedies available to the people in the cases of the countries not recognizing the right.


Author(s):  
Nisha Dhanraj ◽  
Mamta Sharma

As IPR and competition laws share the same economic rationale, they both are crucial for the establishment of competitive and innovative market conditions. On the other hand, these two regimes are conflicting to each other, IP grants monopoly, whereas competition laws seek to undo monopolistic and restrictive trade practices. Therefore, focus has been shifted towards how these two separate regimes are complementary and conflicting to each other through their goals, how competition policy is effective on IPRs, and IPRs on competition policy. IPRs granted by patents, copyrights, and trademarks, etc. play an important role in fostering innovation and sustaining economic growth.


Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Cloud computing is expanding in reach, with its utility-based features and enhanced agility. Still, there is a big concern about the privacy and security of the data. Because of these concerns, third-party cloud users are employing the cloud only for less sensitive data, and the advantage of cloud computing is not fully harnessed. In order to ensure the privacy and security of data, proper compliance and regulatory standards become very important for the cloud domain. Although a number of such standards exist for the traditional computing, they must be modified for their wider adoption to the cloud platforms. This chapter considers the worldwide available standards in the technical and non-technical categories for wider coverage of the cloud platforms. In the technical category, security standards presently followed by cloud computing have been discussed, while in the non-technical category, privacy and accounting standards like HIPPA, SAS 70, GAPP, etc. have been considered.


Author(s):  
Rashmi Aggarwal

Cyber law is law of the Internet; hence, any crime on the Internet is basically cyber crime. It is committed on cyber space, but all the pre mediation is an act of individual/s, who are the perpetrators of crime with malicious intentions and commission of these acts. Cyber crimes were initially perceived as a subset of Information Technology (IT) laws, which governed the digital dissemination of both digitalized information and software. Digital information includes information security and electronic commerce. However, as the world became subservient to digitalization, cyber/Internet laws became more pronounced in their origin and are now a special branch of Internet laws. These laws include study of Internet access and usage, privacy rights, freedom of expression, and extra territorial jurisdiction issues. This chapter analyzes the cyber laws in India and raises the issues of criticality of provisions relating to dispute resolution in India.


Author(s):  
Reema Khurana ◽  
Vijay V. Mandke

This chapter is aimed at identification of a method for problem solving strategies to moderate the complex error resulting from change in environment by analysis, identification, and communication. The method is based on analysis through integrity of information. Integrity of Information (I*I) is defined as accuracy, consistency, and reliability of information at a given instance. The I*I value of any piece of information (in a work-related process) is subject to the 5 Cs in the environment, namely Complexity, Change, Communication, Conversion, and Corruption. The method provides an inventory about complex errors to modulate the complex error from the problem domain and share the right information at the right time with information integrity and also to project the need for an environmental view of information system design for large and complex enterprises.


Author(s):  
Teena Bagga ◽  
Roushan Chouhan

Electronic commerce is becoming increasingly important in business, and Consumer-to-Consumer (C2C) e-commerce is a growing area of e-commerce. C2C (Consumer to Consumer) refers to transactions that take place directly between consumers; the suitable example would be consumers selling their used or new things directly to other consumers on some auction sites like eBay. There are various items, such as books, designer items, collectibles, and so on, that have gained immense popularity and business on such sites. The purpose of this study is to find the factors contributing to the success of a C2C Websites and to understand the impact of various factors on the effectiveness of a C2C Website. A structured questionnaire survey is used to collect data from selected users of C2C Websites. Questionnaire are filled by 200 respondents and used for analysis. These respondents are selected with the help of convenience as well as snowball sampling. The findings indicate that the effectiveness of a C2C Website in e-commerce is affected by ease of use of the C2C Website, usefulness of the C2C Website, security, vender’s competence, and transaction facilities. On the contrary, third-party facilitators do not vary according to the demographic predictors and do not contribute to the effectiveness of a C2C Website. This study proves that while using a C2C Website some variables affect effectiveness of C2C Website. These variables also vary across age, household income, and occupation of the respondents.


Author(s):  
Dilip Kumar Mallick ◽  
Susmi Routray

Social media is altering interpersonal and social connections, empowering new forms of commitment and contribution. The emergence of social media has a dramatic impact on the current commercial environment. The power of authority has shifted from business to potential consumers. Going wrong in social media can have a huge impact on a business. However, at the same time, the huge potential of the medium cannot be overlooked. In this chapter, the authors compile a review of the cases where companies have undervalued or misused the power of social media. The research is basically a secondary market analysis wherein the failures have been identified and analyzed. Based on the analysis of the cases, the chapter suggests elucidation for companies going public through social media.


Author(s):  
Rajinder Kaur ◽  
Prabal Mehrotra

The right to privacy, characterised by Justice Brandeis in Olmestead v. United States (1928)277 US 438 as the “right to be let alone: the most comprehensive of rights and the right most valued by civilised men,” is recognized under India’s constitution by the Supreme Court in four rulings: Kharak Singh v. State of Uttar Pradesh and Ors. AIR 1963 SC 1295; Govind v. State of Madhya Pradesh and Anr. (1975)2 SCC 148; R. Rajagopal alias R.R. Gopal and Anr. v. State of Tamil Nadu and Ors. (1994)6 SCC 632; and District Registrar and Collector, Hyderabad and Anr. v. Canara Bank (2005)1 SCC 496.1 This aim of this chapter is to analyze the legislative provisions prevalent in India, especially those afforded by the Information Technology (Amendment) Act, 2008, and the Ministry of Communication and Information Technology, Government of India, and also the legislative provisions accorded to data protection in the United Kingdom and the United States of America, so as to be able to reach a conclusion that will address the need for data protection law(s).


Author(s):  
Amita Verma

Phishing is one of the fastest-growing Internet crimes in recent history. Millions of people are affected, and billions of dollars are stolen. Phishing is a technique used to extract personal information from victims by means of deceptive and fraudulent emails for identity theft. As a result of this, the organizations as well consumers are facing enormous social and economic effects. Phishing is causing two-way damage. This chapter lists the effects of phishing to e-commerce and summarizes techniques available that can be used to prevent phishing with special reference to Indian laws.


Author(s):  
Benu Sagar Dubey ◽  
Gopakumar K ◽  
Mukesh Singh

This chapter presents the trends in IT services, outsourcing, and vendor management in Indian IT industry. It includes a study of IT services, vendor management, and business model of Outworks Solution India Private Limited, NOIDA. Major findings are in the field of Cloud Computing, mobile applications, and digital illustrations. Digital illustration can be the next big thing that replaces the traditional study thorough books to digitally created cartoons and creatures for the kids. Mobile has become a necessity of life; in such an environment, mobile applications are in high demand. Each organization launches their mobile applications, WAP, so that they can reach to the greater audience in this competitive atmosphere. Cloud Computing proved a boon for SMEs in India because of value for money solutions. Near future in the field of IT is dedicated to Cloud Computing, mobile applications, and digital illustration technologies.


Sign in / Sign up

Export Citation Format

Share Document