Professional Documents
Culture Documents
E-Commerce (IT430) - Notes
E-Commerce (IT430) - Notes
LE
CTURE NO. 27
Withdrawing Coins:
- Client requests coins with a signed request containing serial numbers, encrypted for security.
E-Cash Purchase:
- Merchant sends payment request to client's cyber wallet.
- Wallet auto-assembles payment amount and securely pays the merchant.
Payment Deposit:
- Encrypted deposit request accompanies payment info to the bank for validation.
- Bank checks validity and prevents double spending, credits the merchant's account.
Lost Coins:
- In case of network failure, client retrieves signed blinded coins from the bank.
- Client reveals serial numbers for verification of unspent coins, gets credited accordingly.
SSL encrypts data between clients and servers and is built into browsers. "https" in a URL indicates
SSL. To configure SSL on a client using Internet Explorer: Tools -> Internet options -> Advanced -
> Security (enable SSL). This ensures encrypted data exchange with web servers.
SSL Handshake
SSL Handshake initiates secure communication between a client and a server by negotiating
encryption methods and authenticating parties via digital certificates. In this process, the client
generates a secret symmetric key, encrypts it using the server's public key, and sends it. Once
decrypted by the server, both sides use this key for encrypted communication. SSL, commonly used
in online shopping, ensures secure transmission of credit/debit card information through encryption.
While its simplicity, built into browsers, aids widespread use, a drawback is the potential access to
decrypted card data stored in a merchant's database by unauthorized parties.
SETCo.
SETCo. Enforces SET standards for software vendors, overseeing compliance. Merchants hold
brand certificates allowing card payments; customers possess bank-issued certificates. SETCo. acts
as the primary certification authority.
E-Business
E-businesses operate online, selling, trading, or transacting, making them part of e-commerce.
Their model encompasses policies, operations, technology, and ideology.
Advantages of E-business
Some of the major advantages of an e-business as compared to a traditional business are as under:
E-Commerce (IT430) Short Notes
Personalized service
High-quality customer service No inventory cost
Worldwide reach of the business
Electronic catalogues (convenient and quick transaction) Bulk transactions
Improved supply chain management
E-Commerce (IT430) Short Notes
Lesson 29
E-BUSINESS
Advantages of E-business:
1. Personalized service: Gathering and using customer data for tailored service.
2. High-quality customer service: Easy feedback collection for service improvement.
3. No inventory cost: Minimal overheads, no physical storage needed.
4. Worldwide reach: Global accessibility and 24/7 availability.
5. Electronic catalogues: Quick, convenient, and adaptable shopping experiences.
6. Bulk transactions: Ability to handle large-scale purchases efficiently.
7. Improved supply chain management: Streamlined processes from suppliers to customers.
Disadvantages of E-business:
1. Less security: Vulnerability to hacking and potential data misuse.
2. Less privacy: Collection and use of customer data might breach privacy.
3. No physical proximity with items purchased: Inability to physically examine items before
purchase.
E-Business Models:
Various models include storefronts, auctions, online banking, trading/lending, recruiting, news
services, travel services, entertainment, automotive/energy sales, intellectual property sales, art
dealing, e-learning, service providers, online malls, and portals.
Internet Marketing
- Market Segmentation: Dividing customers based on demographics, geography, and
psychographics.
- Geographic, Demographic, Psychographic segmentation explained.
- Market Segmentation on the web: Tailoring online experiences for different customer
segments.
- Behavioral segmentation: Catering to browsing, buying, and shopping modes online.
Marketing Research
- Using interviews, surveys, and online investigations to analyze strengths, weaknesses,
opportunities, and threats.
- Quick access to industry, customer, and competitor information online.
Web Design
- Crucial for customer interaction and retention.
- Considerations: Easy navigation, FAQs, contact info, multimedia use, privacy policy.
E-Commerce (IT430) Short Notes
- Attractive design to retain visitors and compete effectively online.
Lesson 31
E-MAIL MARKETING
E-mail Marketing
E-mail marketing campaigns are a cost-effective way to target potential customers globally. They
provide instant communication, reaching distant areas. Personalized direct e-mails enhance
engagement by catering to specific customer information like names, products of interest, or
special promotions. For global outreach, translation software can personalize messages in different
languages. Data mining improves response rates by tailoring content based on customer
preferences. Outsourcing e-mail campaigns is an option for businesses lacking resources. Effective
use of e-mails can enhance customer service by addressing complaints and updating customers
about order statuses. However, insufficient handling of incoming e-mails can harm a business's
reputation.
Promotions in E-Business
Various promotional methods exist in e-business, including frequent-flyer miles, point-based
rewards, discounts, free trials, free shipping, and coupons. These incentives attract and retain
customers, encouraging purchases and building loyalty.
E-Business Advertising
Advertising in e-business involves one-way mass communication. Creating a unique and
memorable brand is crucial. Banner ads on popular websites generate income for both the host site
and the advertiser. Techniques such as flashing text or pop-ups grab viewers' attention. Different
payment modes for advertising include monthly charges, CPM (cost per thousand impressions),
Pay-Per-Click, Pay-Per-Lead, and Pay-Per-Sale. Monitoring web server logs helps track visitor
traffic from host sites and assesses advertising efficacy.
Web Casting
Web casting allows the internet-based broadcasting of audio and video content. It facilitates two-
way communication between broadcasters and viewers. Marketers need to consider varying
internet speeds to ensure accessibility for all users.
Interactive Advertising
This form of advertising combines rich media with traditional forms to engage customers actively.
For instance, involving customers in the advertising process through interactive content increases
brand recognition and customer interaction.
Lesson 32
CUSTOMER RELATIONSHIP MANAGEMENT (CRM)
CRM encompasses a company's customer service solutions, adapted to online traffic and resources. It
ensures prompt service, includes call handling and sales tracking, and uses tools like log file analysis
and cookies for improved customer service. CRM aims to build lasting customer relationships,
progressing through five stages of loyalty, intensifying until commitment, and then potentially
declining.
Awareness: Customers recognize the company or its products through proper advertising without
prior interaction.
Exploration: Potential customers learn more about the company, possibly by visiting its website and
exchanging information.
Commitment: Satisfactory transactions foster strong loyalty, leading customers to advocate for the
brand. Companies may offer concessions to solidify this stage.
Separation: Changes in conditions lead to dissatisfaction with products or services. Loyalty might
decline, leading to the termination of the relationship. The marketing objective is to swiftly move
customers to the committed stage and maintain their loyalty.
Search Engines
Search engines scan the web for relevant sites based on keywords, helping users find specific
information. Registering your e-commerce site with popular search engines like Google, Altavista, or
Yahoo ensures visibility in search results.
E-Commerce (IT430) Short Notes
Lesson 33
META INFORMATION
1. Meta Information:
- Key details about a webpage used by search engines for ranking.
- Search engines use keywords from Meta tags to match user queries.
- Misusing competitor's Meta info to improve ranking is illegal.
2. Partnerships:
- Strategic alliances between businesses for mutual benefit.
- Providing complementary services/products and exchanging resources or information.
- Can improve customer access to related products/services.
3. Affiliate Programs:
- Agreement between parties for commission based on customer action.
- Temporary arrangement, often seen in banner advertising.
4. Branding:
- Emotional connection between a company and its customers.
- Comprised of Differentiation, Relevance, and Perceived Value.
5. Product Differentiation:
- Essential to establish a unique identity for a product/service.
- Highlights distinct features from competitors.
6. Relevance:
- Focuses on the usefulness of a product/service to potential customers.
- The product/service should easily relate to the target audience.
7. Perceived Value:
- Customers won't buy unless they find value, despite differentiation and relevance.
- Emotional and rational aspects influence perceived value.
9. Global Marketing:
- Considerations for marketing globally, including multilingual content and varied pricing.
- Infrastructure, distribution, and payment compatibility are crucial.
- Tools exist for translation and currency conversion on websites.
E-Commerce (IT430) Short Notes
Lesson 34
DATA MINING
Data mining is the extraction of meaningful patterns from extensive datasets. In a business setting, it
helps identify customer behaviors, allowing targeted marketing. For instance, recognizing
demographics inclined to buy specific products aids in efficient and cost-effective marketing
strategies.
Data Warehouse
A data warehouse is a central storage system for long-term data from diverse sources. It undergoes
cleaning, transformation, and integration processes, enabling clients to access it for tasks like data
mining and pattern evaluation.
Knowledge Discovery
The knowledge discovery process involves sequential steps such as data cleaning, integration,
selection, transformation, data mining, pattern evaluation, and knowledge presentation. Data mining is
a crucial step, but before that, data must undergo cleaning, transformation, selection, and integration.
Cleaning involves handling missing or erroneous values, selection discards problematic rows, and
transformation ensures uniform data format. Integration consolidates data into a warehouse. The
majority of time in this process is spent on preparing data for mining - cleaning, transforming, and
selecting - approximately 80%.
Classification and association are predictive types of data mining while characterization and clustering
represent the descriptive type.
Classification
Classification in data mining involves creating predictive models to assign samples to different
classes. Common representations include if-then rules, decision trees, and neural networks.
Algorithms like ID3 and Bayesian classification are employed. The decision tree visually displays
classification results. Typically, data is divided into training and test sets. Using predictors like age,
education, and income, a model can increase the accuracy of predicting a class (e.g., male or female).
Efficiency is assessed by comparing predicted and actual values in the test data. An efficiency close to
80% is generally considered good, influencing the decision on future model use. Classification mining
aids targeted marketing, improving the probability of reaching the desired audience.
Association
Association analysis discovers frequently co-occurring attribute-value conditions, commonly applied
in market basket analysis. The Apriori algorithm is a notable tool for this purpose, revealing
relationships between items in sales data.
E-Commerce (IT430) Short Notes
Lesson 35
CONFIDENCE AND SUPPORT
Association mining analyzes item relationships using support and confidence. Confidence measures
how often a relationship holds true, while support reflects overall item co-occurrence. High confidence
with low support suggests a strong but rare association. Marketers use association mining results,
depicted with double arrows, to optimize shelf arrangements and create targeted promotions,
enhancing customer service and informing strategic marketing decisions.
Characterization
Characterization involves discovering generalized concepts in data to understand its overall behavior.
In the context of a university database, it helps answer questions like the number of students from a
specific country studying a particular subject. Algorithms like Version Space Search and Attribute-
Oriented Induction are commonly used for characterization, providing concise insights into data
patterns, such as the count of Pakistani students studying arts.
Clustering
Clustering involves grouping similar data objects into clusters, distinct from objects in other clusters.
It is a preprocessing step for algorithms like classification and characterization. The K-means
algorithm is commonly used for clustering. For instance, customers can be clustered based on income
levels, facilitating subsequent analysis and decision-making.
Lesson 36
ELECTRONIC DATA INTERCHANGE (EDI)
EDI streamlines regular business transactions through electronic exchange of documents like purchase
orders and invoices, eliminating paperwork and human intervention. It operates swiftly, typically
within seconds, using specialized software. EDI was prevalent before e-commerce, connecting trading
partners on private electronic networks. Key features include paperless processes and adherence to
standards such as ANSI X12 and EDIFACT.
EDI Example
Before implementing Electronic Data Interchange (EDI), E-Pens, a pen and ballpoint manufacturing
company, manually generated monthly orders in a specific format. After adopting EDI, the production
control system automatically generates orders when reviewing schedule amendments. In the
EDIFACT format, the order includes headers like UNB for the start of interchange, BGM for the
beginning of the message (order), DTM for date and time, NAD for name and address (buyer and
supplier), UNS for section control, LIN for line items, QTY for quantity, UNT for message trailer, and
UNZ for interchange trailer. The EDI system streamlines the ordering process, improving efficiency
and allowing for quick adjustments in the production plan.
Advantages of VAN
Using a Value Added Network (VAN) in EDI offers two major advantages:
1. Time Independence: Users can send and receive messages at their convenience, eliminating
the need for simultaneous connections.
2. Protocol Independence: VANs re-envelop interchanges with the recipient's transmission
protocol, ensuring compatibility between sender and receiver.
Internet-Based EDI
Internet-based EDI utilizes email, extranets, and web-based hosting services to replace traditional
VANs. It allows trading partners to exchange information through web forms corresponding to EDI
fields. Despite potential, further efforts are required for widespread adoption.
Cost Cutting:
EDI transactions are cost-effective, eliminating paper and staff-related expenses. The primary cost is
the EDI software.
E-Commerce (IT430) Short Notes
Elimination of Errors:
Automatic message generation minimizes human-induced typing errors.
Fast Response:
Electronic processing of EDI messages enables quick order fulfillment, especially for suppliers of raw
materials.
Accurate Invoicing:
Invoices generated in EDI standard format are more accurate compared to paper invoices.
EDI Payment:
Standard EDI documents facilitate the electronic provision of financial information for payment
purposes.
Electronic Banking
Electronic banking, or online banking, encompasses various financial activities conducted remotely
from home, business, or while traveling, eliminating the need for a physical bank visit.
Advantages of e-banking
• Get current account balances at any time
• Obtain credit card statements
• Pay utility bills
• Download account information
• Transfer money between accounts
• Send e-mail to your bank
• Manage your own schedule
• Handle your finances from any location
• Apply for loans online
For banks, e-banking represents an inexpensive alternative to branch banking and a chance to enlist
remote customers.
E-Commerce (IT430) Short Notes
Lesson 37
PERSONAL FINANCE ONLINE
Personal finance involves managing individual financial matters through customized approaches. This
includes tasks such as tax calculations and budgeting, often facilitated by software like Quicken, MS
Money, and Money 2003. Online data importation automates transaction registers, allowing for
efficient tax calculations and budget preparation based on downloaded account details.
Value Chain
Michael Porter introduced the concept of value chains in 1985 to help businesses organize and
optimize their activities in electronic commerce (EC). A value chain breaks down a business into
strategic units focused on specific products, distribution channels, and customer types, streamlining
processes from design to support.
Example of Dell
In the 1990s, Dell used SWOT analysis to develop a successful strategy. Recognizing strengths in
direct selling and cost-effective design, it addressed the weakness of lacking ties with local dealers.
Faced with threats from competitors with stronger brands, Dell seized the opportunity of
knowledgeable customers and utilized the internet for marketing. By offering customized computers,
Dell reduced the impact of brand threats, showcasing adaptability within the industry value chain.
E-Commerce (IT430) Short Notes
Lesson 38
SUPPLY CHAIN
The supply chain comprises upstream (supplier-related), internal (manufacturing and packaging), and
downstream (distribution and sale) activities. Using a milk processing unit as an example, upstream
involves milk supply and raw materials for packaging, internal includes processing, packaging, and
labeling, and downstream covers distribution to stores for customer purchase. The supply chain is a
comprehensive process connecting suppliers to end-users through various stages.
Competitive Strategy
Competitive strategy is vital for organizational success, focusing on gaining a market edge over
competitors through effective planning and distinctive advantages. Three basic strategies for
competitive advantage are as under
- Cost Leadership: Sell at a lower price to attract more customers.
- Differentiation: Offer unique qualities that make your product more attractive, even at a
slightly higher price.
E-Commerce (IT430) Short Notes
- Focus: Concentrate efforts on a specific market segment, area, or product type for higher
profitability.
Customization:
By analyzing customer data, EC allows personalized services, aligning with differentiation and focus
strategies.
Lesson 39
PORTER’S MODEL OF COMPETITIVE RIVALRY
2. Threat of Substitution:
- New products providing the same function pose a threat.
- E-commerce can facilitate the rise of substitutes, as seen in the shift from physical music shops to
online distribution channels.
2. Strategy Formulation:
- Develop a competitive business strategy based on internal and external environment analysis.
- Consider cost leadership, product differentiation, or focus strategies.
- Identify IT applications to implement/enforce the chosen strategy.
3. Implementation:
- Build a plan for executing the strategy, involving key individuals from various departments.
- Consider whether to build in-house infrastructure or outsource tasks.
- Pilot projects may precede full-scale implementation.
4. Strategy Assessment:
- Monitor and assess the results of the implementation plan.
- Corrective measures and expansion plans are considered.
- Assess the viability of the strategy in a changing environment.
- Gather feedback through surveys and input from diverse groups.
E-Commerce (IT430) Short Notes
Lesson 40
BARRIERS TO INTERNATIONAL E-COMMERCE
1. Lack of Trust:
- Establishing trust is challenging due to online anonymity.
- Credibility is crucial for success; established brands have an advantage.
- Attention to visitor needs and easy-to-find information contribute to building trust.
- Companies need to address customer concerns, such as refund claims.
2. Language:
- Local language versions of websites are essential for international business.
- Translation software can help convert content into different languages.
- Prioritizing translation for key pages like the homepage, marketing, and product information is
common.
- Different approaches, like browser language detection or explicit language links, are used.
3. Culture:
- Cultural considerations impact business decisions.
- Careful selection of names, icons, and images is crucial.
- Cultural sensitivity extends to symbols, colors, and content choices in web design.
- Some regions have a less welcoming cultural environment for e-commerce.
4. Infrastructure Issues:
- Government control and regulations in some regions limit internet infrastructure growth.
- Low bandwidth in many third-world countries hinders data communication.
- High costs for internet connection in Europe discourage extensive web surfing.
- International transactions involve complex customs monitoring, requiring coordination.
1. Definition of Terms:
Certificate: Confirms authenticity or integrity of electronic documents or signatures.
Cryptography Services: Transformation of document contents to prevent unauthorized
decoding.
Accredited Certification Service Provider: Provider authorized to issue certificates for
cryptography services.
Certification Practice Statement: Provider's statement on certificate issuance practices.
Originator and Addressee: Parties involved in electronic communication.
Information System: Electronic system for creating, processing, and storing information.
Electronic Signature: Letters, numbers, symbols, etc., in electronic form for authentication.
Authenticity and Integrity: Identification of the person or system and the document's
unchanged state.
2. Appropriate Authority:
- Defined authority in relation to federal and provincial legislatures, government functions, and
court matters.
Lesson 41
ELECTRONIC TRANSACTIONS ORDINANCE, 2002 (ETO) (CONTINUED….)
The term "Appropriate authority" in Pakistan encompasses legislative assemblies, federal and
provincial governments, the Supreme Court, High Courts, and statutory bodies related to
governmental functions. Statutory bodies are established under specific laws, such as the Lahore
Development Authority under the Lahore Development Act, 1975. The Constitution of Pakistan is the
supreme law, containing federal and concurrent legislative lists. The Federal list is exclusive to the
federal legislature, while the Concurrent list allows both federal and provincial legislatures to make
laws.
Section 6 of the Electronic Transactions Ordinance (ETO) outlines conditions for validly retaining
electronic documents. It states that retention in electronic form is acceptable if the document remains
accessible, accurately represents its original form, and includes information for identification of origin,
destination, and date/time of generation. Essentially, electronic documents must be accessible, reliable,
and identifiable for valid retention.
Section 10 of the Electronic Transactions Ordinance (ETO) exempts stamp duty for two years
from the ordinance's commencement or until provincial governments establish electronic means for
stamp duty payment and recovery, whichever is later.
Section 11 of the ETO waives attestation/notarization requirements for electronic documents for two
years from the ordinance's commencement or until the appropriate authority implements measures for
attestation and notarization, whichever is later.
Lesson 42
Section 14
Section 14 of the ETO allows an originator to attach a condition to an electronic communication,
stating that it is deemed unsent until the acknowledgment is received. If the originator has not
specified a particular form or method for acknowledgment, the addressee can provide it through any
communication or conduct sufficient to indicate receipt to the originator.
Section 15
Section 15 of the Electronic Transactions Ordinance (ETO) establishes guidelines for the place and
time of dispatch and receipt of electronic communications:
1. Dispatch occurs when an electronic communication enters an information system beyond the
originator's control, unless otherwise agreed.
2. The time of receipt depends on whether the addressee has designated an information system:
- If designated, receipt is when the communication enters the specified system or when retrieved
by the addressee from a different system.
- If not designated, receipt is when the communication enters any information system of the
addressee.
3. The place of dispatch is the originator's usual residence or place of business, and the place of
receipt is the addressee's usual residence or place of business, unless otherwise agreed.
4. For determining the place of dispatch and receipt, considerations are made for multiple places
of business, the absence of a place of business (referring to usual place of residence), and the
definition of "usual place of residence" for a corporate body.
This section is vital for calculating the limitation period for legal actions and determining territorial
jurisdiction in legal matters.
Section 16
Section 16 of the Electronic Transactions Ordinance (ETO) establishes that no individual has a legal
entitlement to insist that an appropriate authority accepts, creates, issues, retains, or engages in
monetary transactions in electronic form. However, when an appropriate authority, according to a law
or procedure, is involved in processes such as document filing, issuance of permits, or payment
transactions, it can independently decide to operate in electronic form. The authority has the discretion
to specify the manner, format, electronic signatures, and other attributes for such electronic documents
or transactions. This provision serves as the legal foundation for e-government practices.
Section 17:
This section emphasizes that the Electronic Transactions Ordinance (ETO) does not prevent
certification service providers from engaging in the business of providing certification services
without accreditation. However, it imposes a restriction on falsely claiming accreditation without
holding a valid certificate issued by the Certification Council.
Section 20: Describes the funding sources for the Certification Council, including government grants,
fees for accreditation certificates, and repository-related fees.
Section 21: Enumerates the functions of the Certification Council, which include granting and
renewing accreditation certificates, monitoring compliance of accredited providers, managing a
repository, conducting research, accrediting foreign providers, promoting standards, providing advice,
and making recommendations to appropriate authorities.
Lesson 43
The Federal Government, after consulting with the provinces, holds the authority, through an official
Gazette notification, to declare whether the entire ETO or specific parts shall apply to the instruments
mentioned in clauses (a) to (e) of sub-Section (1).
The Electronic Transactions Ordinance (ETO) designates session courts in Pakistan for handling
offenses. The legal system is divided into civil and criminal law, with civil courts addressing private
rights and magistrate courts dealing with criminal matters. The court hierarchy allows for appeals to
district, session, high courts, and the Supreme Court.
Despite global trends recognizing electronic documents and signatures, the ETO in Pakistan has
shortcomings. Ambiguities exist in distinguishing electronic and advanced electronic signatures.
Sections on offenses lack clarity, and international aspects of e-commerce are overlooked. The roles of
accredited and non-accredited certification service providers are undefined. Notably, rules and
regulations mandated by the ETO are yet to be established, raising concerns despite the passage of
time since its enforcement.
Let us now examine some major global legal issues of e-commerce. They are listed as follows:
Territorial jurisdiction
Online contracts
Copyright in cyberspace
Domain name and trademark conflicts
Online defamation
Online privacy
Issues of taxation on internet
Cyber crimes
Territorial Jurisdiction
Territorial jurisdiction in legal disputes is traditionally based on geographical boundaries, with courts
in a specific area having competence over cases arising there. However, in cyberspace, where the
internet transcends geographical boundaries, determining jurisdiction becomes complex. Different
countries may be involved, each with its own laws related to internet transactions. This complexity
arises when considering scenarios like an Australian e-commerce firm with a website hosted in
Canada, facing a dispute with a Pakistani customer. In cyberspace, the plaintiff can choose the forum
or country to file the case, a practice known as forum shopping. Courts often consider factors such as
interactivity, commercial nature, and the effects of information exchange to determine territorial
jurisdiction in cyberspace.
Online contracts
Online contracts mirror traditional contracts, requiring three elements: offer, acceptance, and
consideration. Clicking 'I accept' on a web page signifies agreement to terms, forming a legally
binding contract (click wrap agreement). Contracts in cyberspace can be oral, through conduct, or
correspondence. Offers and acceptances occur through various online means such as email, EDI, web
forms, or downloads.
In the online environment, imposter acceptances can pose issues, mitigated by using digital signatures
for identity verification. For significant contracts, parties are encouraged to mandate digital signatures
to confirm authority. Negligence in protecting passwords, leading to imposter acceptance, may render
a company liable for breach of contract, compelling fulfillment or compensation.
Copyright in cyberspace
Cyber copyright concerns arise due to the internet's nature. It grants exclusive rights to creators for
various works, excluding ideas. Web pages, though likely protected, face challenges with copies made
during HTTP requests or caching by ISPs. 'Fair use' in copyright law allows exceptions for specific
purposes. If an author provides a hyperlink to their work, it may imply permission to download or
copy, potentially avoiding copyright issues.
E-Commerce (IT430) Short Notes
Generally, the protection under ‘fair use’ may be sought on the following basis:
'Fair use' protection is determined by factors like educational or non-profit use, the nature of the work,
the extent of copying, and impact on market value. Proper citation is essential to avoid plagiarism
accusations. The 'Napster case' illustrates legal consequences for facilitating copyright infringement,
leading to the platform's shutdown and a significant settlement.
In 1996, the World Intellectual Property Organization proposed international copyright treaties, urging
signatory countries to adopt or amend laws for protecting copyrighted works in the digital era.
E-Commerce (IT430) Short Notes
Lesson 45
GLOBAL LEGAL ISSUES OF E-COMMERCE
Patent infringement
A patent grants exclusive rights to make, use, and sell a unique and useful invention. While patenting
software can be expensive and time-consuming, copyright registration is a more practical option for
software programs. However, e-commerce companies find value in 'business process patents' that
protect specific procedures for conducting business activities. Examples include a unique 1-click
purchasing method and a 'name your own price' system. Some experts argue that these patents may
lead to unfair monopolies, and courts are yet to resolve complex issues related to business process
patents.
Cyber squatting
Cyber-squatting is the intentional registration of domain names containing trademarks/trade names to
later blackmail or demand ransom from companies. It is considered an offense in most countries. For
example, if 'Glory Enterprise' finds that someone unrelated, like Mr. 'A', has registered a domain with
the word 'glory,' they may have to request a transfer. If Mr. 'A' then demands ransom, it is deemed as
cyber-squatting.
Concurrent use
Concurrent use occurs when two organizations legitimately claim the same domain name, but the
uniqueness of domain names creates a conflict. For instance, if a company selling electronic goods and
another selling French fries both want the domain name 'frys,' only one can be assigned the desired
domain due to its uniqueness.
Parasites
Parasite domain names, like 'macrosoft.com' imitating 'Microsoft,' exploit famous names for business
advantage. The issue of xyz.com vs. xyz.org arises from assigning second-level domain names to
multiple top-level domains, leading to potential confusion. The Uniform Dispute Resolution Policy
(UDRP), managed by the International Corporation for Assigned Names and Numbers (ICANN),
allows trademark holders to reclaim domains through arbitration. The World Intellectual Property
Organization (WIPO) in Switzerland is a nominated arbitration service provider under UDRP.
Online Defamation
Online defamation involves false statements damaging a person's or company's reputation. It's
challenging to distinguish justifiable criticism from defamation, especially online where anonymity is
common. Commercial websites and designers should avoid negative statements about others and
carefully review online statements about competitors to prevent defamation. Liability of internet
service providers (ISPs) is linked to their control over content. ISPs with editing control may be held
liable, while those without control can escape liability for online defamation.
Online Privacy
Online privacy concerns evolve with the internet's growth. Websites can collect visitor data, posing a
threat to informational privacy. Countries vary in privacy expectations, with some having privacy laws
like Canada's PIPEDA and the EU directive on personal data protection. The U.S. lacks firm privacy
E-Commerce (IT430) Short Notes
regulations, allowing companies to set their policies, typically opting for opt-out or opt-in approaches.
Opt-out assumes consent unless denied, while opt-in requires explicit consent. Guiding principles for
privacy legislation include using data for customer service, restricting sharing without consent,
informing customers about data use, and allowing data deletion requests.
Internet Taxation
Internet taxation for e-businesses involves compliance with various taxes such as income tax,
transaction taxes (sales tax and custom duties), and property tax. E-businesses, due to their
international reach, may need to adhere to multiple tax laws from different countries. Income tax is
levied on net income, while sales tax is imposed on goods sold. Understanding 'nexus,' the connection
between a business and a government, is crucial for determining tax obligations in different countries.
E-businesses may need to file separate tax returns and pay taxes in each country where they establish
sufficient business activities. To avoid double taxation, U.S. tax law provides credits/refunds for taxes
paid to foreign countries on foreign earnings. Online sellers must be aware of customer locations and
sales tax laws in various jurisdictions to determine tax applicability.
Cyber Crimes
The advent of internet technology has led to emerging crimes, known as cyber crimes, including
online fraud, hate speech, cyber-stalking, online terrorism, and computer-based attacks. Countries
worldwide are adapting or creating laws to address cyber crimes. The challenge lies in determining
territorial jurisdiction, especially when a crime committed by a resident in one country affects another
where the act may not be considered a crime.