Electronic funds transfer fraud ByIan Hendarson (2001) discussed that despite the unprecedentedgrowth of Internet based E Commerce in recent years, the rate of penetration in developingcountries such as India is lower. Among several factors responsible for this, the poor state of infrastructure and low levels of online trust stand out significantly. Infrastructure issues havecaught the attention of the business and policy makers but not the trust issues. This is largely dueto lack of understanding of the notion of online trust and the challenges in fostering it. We developa framework for building online trust and discuss the manner in which online marketplace fosterstrust.Internet-based business opportunities: buyers beware of scams By Mohsen Attaran (1999)discussed that Most consumer-facing online applications such as banking and e-commerce rely primarily on single- factor authentication schemes to authenticate users. Such schemes, while easyto use, suffer from easily exploitable security vulnerabilities that cost business billions of dollars per year. The risks of doing business with unauthorized or incorrectly identified persons in anInternet banking environment can result in financial loss and reputation damage through fraud,disclosure of customer information, corruption of data, or unenforceable agreements. There are avariety of technologies and methodologies financial institutions can use to authenticate customers.The level of risk protection afforded by each of these techniques varies. The selection and use of authentication technologies and methods should depend upon the results of the financialinstitution’s risk assessment process.
Online transaction logs By Dr Gavin R Davis
(2007) discussed that Governments andother policy makers are concerned with the gap in home Internet usage between people frommetropolitan and rural areas. A survey conducted in Central Queensland, Australia examineddifferences in home Internet usage patterns between young and old, male and female, people inurban and rural areas, married and unmarried, well-educated and less educated, rich and poor, andemployed and unemployed and found significant differences.
Protecting Information Online: Safeguarding Common Interest Transactionsand Communications By New York State Consumer Protection Board (2009)discussed that
Do not give away your personal information on sites that are not secure: Names, including ,Dates and places of birth Addresses, including e-mail addresses, Telephonenumbers Credit card information and Social Security numbers.
Understand the site’s privacy