M-Commerce

M (Mobile) Commerce is the E Commerce through mobile devices.

M-Commerce vs E-Commerce

M-Commerce E-Commerce
It stands for Mbile Commerce. It stands for Electronic Commerce.
It uses mobile devices for commercial transactions. It uses computers for commercial transactions.
It is not limited to location specific. It needs to go to a place where there is Internet access to computer.
It is very handy and easy to carry. It is not easy to always carry your pc or laptop.
It is always reliable and easy to access. It is not always reliable
It is costly compared to E commerce. It is economical and low priced.

M-Commerce Framework

It is a framework that is used to develop mobile commerce applications. It is a set of components that are used to develop mobile commerce applications.

m commerce framework image

The authors identified two planes of reponsibility :

User Plane

It is responsible for the interaction between the user and the system. It is divided into four layers :

Provider Plane

It is responsible for the interaction between the system and the service providers. It is divided into three layers :

Issues in M Commerce

There are several issues that need to be addressed in order to make M Commerce successful. Some of the key issues are :

Applications of E-Commerce

E-Commerce and Retail Industry

E-Commerce has provided opportunity for retailers to gain potential customers, improve communications, etc. It has made their stores a secondary option. With E-Commerce, shops will be able to sell their products 24/7 while keeping their costs at a minimum. It can also prevent over staffing because E-Commerce will be its own sales person.

E-Governance

E Governance use Information and Communication Technology (ICT) to improve the quality of delivering government services, exchange of information, etc. It can be defined as the delivery of government services and information to the public.

The importance of E-Governance can be seen in building strong and effective information chain. The rational of e governance is in its need in reducing red tape, promotion of knowledge, fulfiling expectations of people, etc.

Stages

Challenges

Cyber Law

Cyber law concentrates on creating compliance regulations for organization to protect clients and their data. Cyber law is the law governing the use of computers and the internet. It is the set of framework, some rules and guidelines that define certain business activities.

Cyber law encompasses laws relating to :

Cyber Crime

It can be defined as Offences that are committed against individuals or groupds of individuals with a criminal motive to intentionally harm them.

The cyber criminals can be distinguished on the basis of their skill levels and motivations :

Spoofing

Spoofing is a type of cyber attack in which a hacker disguises themselves as a trusted entity to gain unauthorized access to sensitive data or information. This can be done through email spoofing, IP address spoofing, or website spoofing.

There are several types of spoofing attacks, including :

Phishing

Phishing is a type of cyber attack in which a hacker attempts to trick individuals into revealing sensitive information, such as usernames, passwords, and credit card numbers, by posing as a legitimate entity in an electronic communication. This can be done through email phishing, SMS phishing, or voice phishing.

Sniffing

Sniffing is a type of cyber attack in which a hacker intercepts and monitors network traffic to capture sensitive information, such as usernames, passwords, and credit card numbers, as it travels across the network. This can be done through packet sniffing, network sniffing, or wireless sniffing.

Denial of Service (DoS) Attack

A Denial of Service (DoS) attack is a type of cyber attack in which a hacker floods a network, system, or website with traffic in order to overwhelm it and make it unavailable to legitimate users. This can be done through volumetric attacks, protocol attacks, or application layer attacks.

There are several types of DoS attacks, including :

Cyber Forensics

Cyber forensics is the process of collecting, analyzing, and preserving digital evidence in order to investigate and prosecute cyber crimes. It involves using specialized tools and techniques to recover data from computers, networks, and other digital devices, and to trace the source of a cyber attack or security breach.

Investigation and Surveillance

It includes interviewing, surveillance, search and seizure and formal legal process mechanisms.

Basic steps necessary when conducting the cyber crime investigation are :

Interview, Search and Seize

Investigation authorities often engage in personal interviews, questioning involved parties to gather as much information as possible about the case.

Search and Seize is an active mode of investigation, which involves discovering evidence, identifying suspects, apprehending offenders and interviewing witnesses.

Surveillance

Surveillance is the monitoring of activities, behavior, or information for the purpose of gathering intelligence, preventing crime, or ensuring security. In the context of cyber forensics, surveillance may involve monitoring network traffic, tracking user activities, or observing digital communications to gather evidence and identify potential cyber criminals.

Forensics

Once they have gathered enough information through interviews and surveillance, investigators will get warrants to collect targeted computers for advanced forensic analysis. It involves mining a computer and unearthing potential evidence.

Undercover

It may require investigators to go undercover, adopting fake online personae to trap criminals.

Cyber Crimes and Information Act 2000

In 1999, the government of India realised the need for introducing a new law to deal with the technology in the field of cyber crimes. In May 2000, both the houses of the Indian Parliament passed the Information Technology Bill.

Cyber crimes is not defined officially in IT Act or in any other legislation. Offence or crime has been dealt with elaborately listing various acts and punishments for each under the Indian Penal Code.

The concept of cyber crim is just a combination of crime and computer.

Scope

It covers to whole of India. This act can also be operated to any offences or contravention committed outside India by any person irrespective of his nationality.

Objective

The objective of the Information Technology Act of 2000 is to provide a legal framework for dealing with technology-related crimes and to facilitate electronic commerce. It aims to address the growing concerns of cybercrime and establish provisions for the security and protection of electronic data and information. The act also aims to promote the use of digital signatures and electronic records, ensuring their legal validity and authenticity. Additionally, the act seeks to establish a regulatory framework for electronic governance and facilitate the development of a secure and reliable digital infrastructure in India.

Chapters

It is based on UNCITRAL (United Nations Commission on International Trade Law) Model Law. It has 13 chapters, 94 sections and 4 schedules

Offences and Cyber Crimes under IT Act 2000

  1. Tampering with computer source documents
  2. Hacking with computer system
  3. Receiving stolen computer or communication device
  4. Using password of another person
  5. Cheating using computer resource
  6. Publishing private images of others
  7. Acts of cyber terrorism
  8. Publishing images containing sexual acts
  9. Failure to maintain records
  10. Misrepresentation

Conclusion

In this chapter, we explored the various applications of E-Commerce, from e-shopping and e-banking to e-learning and online auctions. We also discussed the role of mobile technology in E-Commerce and the security issues that can arise in this context. As we've seen, E-Commerce is a vast and rapidly evolving field that offers numerous opportunities for businesses and consumers alike, but it also presents significant challenges in terms of security and privacy. In the next chapter, we'll delve deeper into these challenges and explore strategies for mitigating them.