AWARENESS OF THE REGULATORY FRAMEWORK SUPPORTING E-COMMERCE: AN EMPIRICAL ANALYSIS

Authors

  • Satinder Kumar
  • Shallu Sehgal HPU

DOI:

https://doi.org/10.47701/icohetech.v3i1.2153

Keywords:

Regulatory framework, Awareness level, E-Commerce, Spamming, Privacy, Spyware

Abstract

The world is changing at a remarkable pace and so does the world of marketing. The limited options to communicate with the target audience have been widening. Even technology has profoundly changed the way consumers process communication. In the last few years, the internet has played a significant role in many fields of the economy as it is commonly defined as a global media. The internet has been largely used in commerce and management. Electronic commerce, typically written as e-commerce or E-Commerce, is the trading or facilitation of trading in products or services using computer networks, such as the Internet. The rapid adoption of the Internet as a commercial medium has caused firms to experiment with innovative ways of commerce thus changing the pattern of commerce strategies.

The primary motive of the study was to investigate the awareness level of respondents regarding the regulatory framework of E-Commerce. The present study was exploratory research by means of primary data analysis wherein an attempt was made to identify the awareness level of respondents regarding the regulatory framework of e-commerce with the help of a self-structured questionnaire. The questionnaire was based on the five-point Likert scale ranging from not at all aware to completely aware and convenience sampling was used to collect the data from respondents (250) residence of Punjab and Union Territory of Chandigarh. Further, the chi-square technique was used to test the null hypothesis as to whether there was a significant relationship between regulatory framework, gender and monthly income attributes. It was observed that female respondents were more aware as compared to male respondents regarding the regulatory framework of e-commerce. On the basis of monthly income attribute, 15000-30000 income group’s respondents were not aware of the regulatory framework of e-commerce but in the next income group ranging from 50000-75000 were aware of the regulatory framework of the e-commerce.

Keywords: Regulatory framework, Awareness level, E-Commerce, Spamming, Privacy, Spyware etc.

References

Alicia Aldridge, Michele White and Karen Forcht (1997), “Security considerations of doing business via the Internet: Cautions to be Consideredâ€, Journal of Internet Research, Vol. 7(1), PP: 9-15

Anuradha Reddy (2012), “A study on consumer perceptions on Security, Privacy and Trust on E-Commerce Portalsâ€, International Journal of Multidisciplinary Management Studies, Vol. 2(3), PP. 1-15

Attaran Mohsen and Vanlaar llja (1999), “Privacy and Security on the Internet: How to Secure your Personal Information and Company Dataâ€, Journal of Information Management and Company Security, Vol. 7(5), PP: 241-247

Bette Ann Stead and Jackie Gilbert (2001), “Ethical Issues in Electronic Commerceâ€, Journal of Business Ethics, Vol. 34(2), PP: 75-85

France Belanger, Janine S. Hiller and Wanda J. Smith (2002), “Trustworthiness in E-Commerce: The Role of Security and Site Attributesâ€, Journal of Strategic Information System, Vol. 11(3), PP: 245-270

Niranjana Murthy M, Dr. Dharmendra Chahar (2013), “The Study of E-Commerce Security Issues and Solutionsâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2(7), PP: 1-12

Sami Alsmadi (2002), “Consumer attitudes towards Online Shopping in Jordan: Opportunities and Challengesâ€, International Journal of Management, Vol. 13(2) PP: 131-144

Samia L Massoud (2002), “Ethical and Legal issues in E-Commerceâ€, Business Economics Associations, Issue. 2002, PP.235-237

Sunnykutty Thomas (2004), “Security issues in E-Commerceâ€, Yojana, Vol. 48, Issue 2004, PP: 40-43

Udo J. Godwin (2001), “Privacy and Security concerns as a major barriers for E-Commerce: A Survey Studyâ€, Journal of Information Management and Computer Security, Vol. 9(4), PP: 165-174

Downloads

Published

2022-09-17