InIndia the number of internet users could be around 49 million.
Of these about40 million are urban users while about 9 million are in the rural category. Theinternet has the potential to increase the productivity by reducing the cost ofmany of the transactions and also by bringing down the cost of distribution.Thebroadening of marketers could lead to a certain pressure on suppliers to usetechniques, which could reduce saving and thereby improving the efficiency ofsupply chain management (4.book, P15)Duringthe last few years the financial service industry in India has taken giantstrides in making internet facilities available to their clients (p 17). Largeorganizations are very often reluctant to make radical changes from the roadtravelled successfully. And not ready to adapt new developments, which appearto be risky. This is because new technology could end up cannibalizing theirmarkets and destroying their divisions (p 27).
Corporate customers are themajor users of internet. ICICI bank now allows customers to pay municipal taxeson internet. “A development, which has not attracted much attention is thedevelopment of internet platforms to trade and pledge electronic warehousereceipts. This may reduce the need for government to purchase commodities forstock piling. Letters of credit, bills of lading and other documents associatedwith trade funds are also gradually being taken over under the e-financeumbrella”.
(p32). Cyber CrimesElectronic systemrisks can be classified into two groups: risks which can lead to disabling thesystem from functioning and risks relating to data tampering and misuse. Hackingcan be included in the first category. The second category misuse is related tofraudulent data misuse and illegal access to information for some personal gain(94). As an unregulated medley of corporations, individuals, governments andeducational institutions that have agreed to use a standard set ofcommunication protocols, the internet wide open to explorations. The criticalissue that we face right now can be divided into two.
The first one is the denialof service attacks aimed at creating damage to the system by hacking, crackingand sending malicious viruses or to the computer network. The second category,the computer is the target of attacks (111). Computer crimes take several formslike, sabotage, revenge, vandalisms, theft eavesdropping and data diddling,credit card frauds, counterfeiting, bank embezzlement and theft of secretdocuments.