Online Shopping: A Fiduciary Relationship between e-tailer and Customer

Author(s):  
Naheeda Praveen ◽  
Shweta Srivastava

According to Internet World Stats' statistics (2012), more than two billion people are linked to the Internet and this number shows that 30 per cent of the world population use the Internet. As a result, this can be used as an efficient marketing platform. The convenience of online shopping renders it to be an emerging trend among consumers. Online shopping involves sharing of personal and financial information from the buyer. This makes the e-tailer to stand in a fiduciary position against the buyer and he is required to act for the sole benefit of the buyer. He has to duly address the security issues involved in the online shopping transactions and exhibit highest order of diligence and care. This paper aims at identifying the potential security threats involved in the online shopping transactions and the remedial measures adopted by the e-commerce companies. The paper also exemplifies from Indian e-commerce as demonetization, along with rapid digitalization, has not paved the way for cashless transactions, but also, for the e-commerce crimes.

Author(s):  
Loo Seng Neo

The growing pervasiveness of the internet and the rise of social media have revolutionised how individuals communicate and interact with one another. Serving as an effective conduit for communication, these technological advancements have also been exploited by individuals with malicious intent (e.g., criminals, violent extremists). As the world witnesses an upward trend of such crime and security concerns in the online sphere, it places the ‘responsibility' on intelligence and law enforcement agencies to respond with the appropriate technological interventions. Thus, this article will discuss how digital footprints can be leveraged to identify potential security threats, particularly for crime and security issues that will result in negative repercussion at the national level, such as acts of violent extremism and hate crimes.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4107
Author(s):  
Sharad Agarwal ◽  
Pascal Oser ◽  
Stefan Lueders

The introduction of the Internet of Things (IoT), i.e., the interconnection of embedded devices over the Internet, has changed the world we live in from the way we measure, make calls, print information and even the way we get energy in our offices or homes. The convenience of IoT products, like closed circuit television (CCTV) cameras, internet protocol (IP) phones, and oscilloscopes, is overwhelming for end users. In parallel, however, security issues have emerged and it is essential for infrastructure providers to assess the associated security risks. In this paper, we propose a novel method to detect IoT devices and identify the manufacturer, device model, and the firmware version currently running on the device using the page source from the web user interface. We performed automatic scans of the large-scale network at the European Organization for Nuclear Research (CERN) to evaluate our approach. Our tools identified 233 IoT devices that fell into eleven distinct device categories and included 49 device models manufactured by 26 vendors from across the world.


Author(s):  
Sharad Agarwal ◽  
Pascal Oser ◽  
Stefan Lüders

The introduction of the Internet of Things (IoT), i.e. the interconnection of embedded devices over the Internet, has changed the world we live in from the way we measure, make calls, print information and even the way we get energy in our offices or homes. The convenience of IoT products, like CCTV cameras, IP phones, and oscilloscopes, is overwhelming for end-users. In parallel, however, security issues have emerged and it is essential for infrastructure providers to assess the associated security risks. In this paper, we propose a novel method to detect IoT devices and identify the manufacturer, device model, and the firmware version currently running on the device using the page source from the web user interface. We performed automatic scans of the large-scale network at the European Organization for Nuclear Research (CERN) to evaluate our approach. Our tools identified 233 IoT devices that fell into eleven distinct device categories and included 49 device models manufactured by 26 vendors from across the world.


Author(s):  
Anjum Nazir Qureshi Sheikh ◽  
Asha Ambhaikar ◽  
Sunil Kumar

The internet of things is a versatile technology that helps to connect devices with other devices or humans in any part of the world at any time. Some of the researchers claim that the number of IoT devices around the world will surpass the total population on the earth after a few years. The technology has made life easier, but these comforts are backed up with a lot of security threats. Wireless medium for communication, large amount of data, and device constraints of the IoT devices are some of the factors that increase their vulnerability to security threats. This chapter provides information about the attacks at different layers of IoT architecture. It also mentions the benefits of technologies like blockchain and machine learning that can help to solve the security issues of IoT.


Author(s):  
Shankar Chaudhary

Despite being in nascent stage m-commerce is gaining momentum in India. The explosive growth of smart-phone users has made India much loved business destination for whole world. Indian internet user is becoming the second largest in the world next to China surpassing US, which throws open plenty of e-commerce opportunities, not only for Indian players, offshore players as well. Mobile commerce is likely to overtake e-commerce in the next few years, spurred by the continued uptrend in online shopping and increasing use of mobile apps.The optimism comes from the fact that people accessing the Internet through their mobiles had jumped 33 per cent in 2014 to 173 million and is expected to grow 21 per cent year-on-year till 2019 to touch 457 million. e-Commerce brands are eyeing on the mobile app segment by developing user-friendly and secure mobile apps offering a risk-free and easy shopping experience to its users. Budget 4G smart phones coupled with affordable plans, can very well drive 4G growth in India.


2021 ◽  
Vol 10 (1) ◽  
pp. 73-88
Author(s):  
Enrique Orduña-Malea ◽  
Cristina I. Font-Julian ◽  
José Antonio Ontalba-Ruipérez ◽  
Raúl Compés-López

Globalisation, the Internet and social media have changed the kind of actors with influence in the wine industry and the way these actors create signals to communicate credible information about experience and trust attributes. Among the most prestigious experts in the world of wine are the Masters of Wine (MW). Although initially devoted to international trade, they have spread their activities and their opinion is more and more appreciated by producers and consumers. The main objective of this article is to determine this community of experts’ behaviour on Twitter. In order to do so, four factors (presence, activity, impact and community) have been considered. All Twitter profiles belonging to users awarded with the MW qualification were identified and analysed. In addition, a set of 35,653 tweets published by the MWs were retrieved and analysed through descriptive statistics. The results show MWs on Twitter as high attractors (number of followers), moderate publishers (original contents published), moderate influencers (number of likes and retweets), and low interactors (number of friends and mentions to other users). These findings reveal that the MW community is not using Twitter to gain or reinforce their reputation as an accredited expert in the wine industry, giving more influential space on Twitter to consumers and amateurs.


The world of the Internet is so big that the more you learn about the Internet, the less. Due to Internet, our life has become a lot easier. You may not even think that today you can get the exam results online with the help of the Internet, connect with friends online, earn money online from the internet, and still do much more online. But nowadays the most popular is online shopping. Because of online shopping we can buy anything from home. And the same thing we bought comes to the address we have provided. We don't have to go anywhere. Online shopping is convenient, and consumers also have a wider range of choice. But people need to understand that no company or trader can afford to hurt you by giving you cheap or free. So instead of being tempted to buy from free and discount schemes, it is important to consider such websites and their 'non-refundable' policy and the complicated and lengthy process of returning items. Nowadays everyone recommends shopping online because of their busy and fast life. The more convenient it is, the more troubles can arise.


Online based purchasing is the way toward buying products and enterprises from traders who sell them online through Internet. Since the rise of the World Wide Web, sellers have tried to offer their items to individuals who browser the Internet. Customers can visit online stores from their homes and shop comfortably. Presently a day shopping has turned out to be mainstream among individuals through browsing which has increased their web knowledge and effective utilization of internet. So internet shopping has become accustomed to the buyers which made the researcher to study the perception on internet based shopping. The principle aim of the this research is to find out the opinion of the respondents towards internet shopping. These days, there has been a flood in web based shopping. The Internet has been utilized by clothing organizations to sell their items and advance their brands. As an ever increasing number of individuals purchase attire on the web, there have been an expanding number of inquires about.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


Author(s):  
M. Raisinghani

A new form of technology is changing the way commerce is being done globally. This article provides an overall description of mobile commerce and examines ways in which the Internet will be changing. It explains the requirements for operating mobile commerce and the numerous ways of providing this wireless Internet business. While the Internet is already a valuable form of business that has already changed the way the world is doing business, it is about to change again. Telecommunications, the Internet, and mobile computing are merging their technologies to form a new business called mobile commerce or the wireless Internet. This is being driven by consumer demand for wireless devices and the desire to be connected to information and data available through the Internet. There are many new opportunities that have only begun to be explored, and for many this will become a large revenue source for those who capitalize upon this new form of technology. However, like other capital ventures, these new opportunities have their drawbacks, which may limit growth of the mobile commerce market if not dealt with. Mobile e-commerce technology is changing our world of business just as the Internet alone has changed business today.


Sign in / Sign up

Export Citation Format

Share Document