Sunday, January 26, 2020

Research Methods Aims And Objectives In Business Business Essay

Research Methods Aims And Objectives In Business Business Essay The purpose of this Chapter is to discuss and justify the methodology used to effectively investigate the phenomenon informing the research title which is; The Impact of a company managed online community on purchase decision and brand loyalty Firstly, this chapter explains the conceptual structure of the research which will describe how the author is going to carry out the research. Then, explains research method types and methods use to retrieve the collected data by primary research. Research methodology explains the overall structure of the study. According to Croswell J (2010) methodology is the analysis of principle methods, rules and evaluation employed by a researcher. The discussion is focused on matters regarding the purpose of research, research philosophy, research approach, research strategy, data collection, data analysis, and quality standards. 3.2 Research aims and objectives The study aims seek the dimensions of an online community hosted by a company and how it affects consumers purchase decision. In addition, this study investigates how an online community can attribute to generate their brand loyalty through its own brand community. These are the objectives: To investigate a company managed online community and characteristics To identify key influencer in online purchase decision To investigate the relationship a company managed online community and consumer purchase decision To find out the relationship between a company managed online community and brand loyalty 3.3. Research Process The research process used to define the approach of the research in the study in exhaustive. In figure 3.1 research process onion describes the issue underlying the choice of data collection methods (Saunders et al. 2009). Below figure shows the overview of the researchers methodology towards this research. Figure 3.1 Research Process Onion. Source: Created by the Author, adopted from Saunders et al (2009:108) Also, figure 3.2 shows the outline of process for this research. Figure 3.2 Process of the authors research Source: Created by the Author(2010) 3.4. Purpose of research There are three different types of research, and Yin (2009) writes that these are exploratory, explanatory, and descriptive. The purpose of the research determined which one of these to use in order to be able to fulfil this purpose. Saunders et al (2009) describe exploratory research as a way to find or look for new insight or to see what is going on. They further state that it is especially good to use if the purpose of research is to increase the understanding of a problem. Gliner et al(2009) complement the characteristics of exploratory research by adding that this type of research calls for flexibility, since new information can change the direction of the research. Gliner et al(2009) conclude that descriptive research is characterized by that the problem is clear and well structured. Saunders et al (2009) writes that it is necessary to have a good picture of the problem before the data collection. The focus of an explanatory study is to find interrelations between the variables in the studied situation or problem (Saunders et al, 2009). Saunders et al (2009) also states that analysis of quantitative data can show correlations between factors which gives the researcher a picture of the relationships involved. The overall purpose of this research was to investigate the area of online communities and its influence on purchase decision and brand loyalty. The goal was to seek out if marketing in these specific media channels are more accepted among consumers, and why this is the case, in order to gain a better understanding of their effectiveness and influence. This led us to use a both exploratory and explanatory approach. In the data collection and in the analysis we explore, and in the findings and conclusions we begin to explain. 3.5 Research Philosophy The research philosophy is determined by the philosophical points of views, as there are different approaches about the way in which the knowledge is urbanized and judged as suitable. Thus, the research philosophy relates to the development of knowledge and the knowledges nature (Saunders et al, 2009). The literature suggests three main approaches in which to conduct a research process and all of them have an important part and role in business and management. These are Positivism, Realism and Phenomenology. 3.5.1 Positivism Positivism is described as the conventional way of research and it acquires a clear quantitative approach to find out phenomena as an alternative of qualitative approach (Croswell, 2009). That is also said that positivism is very important approach in natural science (Remenyi, 2002). The understanding of this idea may not be proven but the philosophy based on positivism is far more powerful than the ideas for reaching targets and achieving goals. Positivism is very important research philosophies for creating new ideas. Thus, positivistic research tries to identify the non-financial motivation techniques provided by Tesco-express. The researcher uses the idealistic approach of positivism while using a questionnaire with a group of people. 3.5.2 Realism Another approach which relates to the positivism is realism (Saunders et al, 2007). According to Kothari, (2005) Realism is the source of many ideas, belief and opinions of human. 3.5.3 Interpretive Interpretive studies presume that people produce and correlate their own subjective and inter subjective meanings as they interact with the world around them. Interpretive researchers thus attempt to understand phenomena through accessing the meanings participants assign to them (Orlikowski and Baroudi 1991). Here researcher has decided to choose a Positivism philosophy, based on the aim of the research. The reason behind choosing this approach is responses does not influence the researchers belief and the knowledge (Proctor 2006). Also Positivism is one of the strongest research philosophies for creating new ideas. In addition to this, according to Gill (2002), the importance of a highly controlled methodology facilitates replication and experimental explanation to statistical analysis. 3.6 Research Approach There are two different types of approach for research. These are deductive and inductive theories(Bryman, 08). Deductive theory represents the commonest view of the nature of the relationship between theory and social research(Bryman, 08). First, theory and the hypothesis come and drive the process of gathering data. On the other hand, inductive process involves observations first and generalise the theory after the observations. This study is a business problem, more specifically how online community hosted by a company influence its consumers. Therefore, the aim of this study is to understand of the consumers who use online communities as a tool of interaction. Therefore, this study needs deductive approach. 3.7 Research Method There are mainly two types of research strategies which we can choose: quantitative and qualitative. These approaches are depending upon the structure and the purpose of the study(Bryman, 2010). Quantitative research can be constructed as a research strategy which collect and analyse quantitative data. Quantitative research requires a deductive approach to the relationship between theory and research, also it has incorporated the practice the natural scientific model and norms of natural scientific model and positivism approach(Bryman, 2010). A quantitative research approach used numbers ask base for the analysis instead of words like a qualitative would do. Blaxter et al(2010) adds to this explanation by describing that quantitative research uses a large-scale set of data. Qualitative research is more exploratory and focuses on smaller numbers and depth data. Qualitative data is mostly collected using conversation, and unstructured and semi-structured interviews. Quantitative data, the corresponding are; structured observations, interviews and surveys, and attitude scaling. By contrast, qualitative research emphasizes words rather than quantification in the collection and analysis of data(Bryman, 2010). Qualitative research data is collected from focus groups, in-depth interviews and observations. Qualitative research can be used to understand more deeply consumers attitudes towards purchase decision. But qualitative research is hard to analyse, and evaluate. Also, small number of target audiences cannot be represented whole population. For this research, a quantitative study is better because of the need for several different views on the questions and to decrease the factor of that different people think differently. 3.8 Research Strategy The decision of which strategy to use can be guided by the form of research question, the degree of control needed of behavioural events and if the focus is on current or historical events (Yin, 2003). The different choices of strategies available are; experiment, survey, case-study, grounded theory, ethnography and action research (Saunders et al, 2000). Experiments are commonly used in natural sciences and psychology, and are characterized by for example the introduction of planned changes on the variables in the experiment, and control of the other variables (Saunders et al, 2000). Surveys allow for the gathering of large quantities of data from a population in an economically efficient way (Saunders et al, 2000). Saunders et al (2000) also describe this method as having the advantage of that the analysis of the data will allow for easy comparison between the respondents. A case study is especially useful for gaining rich and detailed data (Saunders et al, 2000). They also state that case-studies are particularly good to use when asking how, what and why questions (ibid). Grounded theory is based on that a data collection is performed without the previous construction of a theoretical framework (Saunders et al, 2000). The initially gathered data is then used to make predictions that then are tested in the later stages of the data collection (Saunders et al, 2000). Moreover, the purpose of ethnography is defined by Saunders et al (2000) in the following way; The purpose is to interpret the social world the research subjects inhabit in the same way in which they interpret it (Saunders et al, 2000, p.95). They also state that ethnography is not commonly used in business research (ibid). Action research is however dedicated to researching the management of change, and the researcher often must participate in the setting where the change occurs. (Saunders et al, 2000). At first, action research, grounded theory, ethnography and experiments were discarded from the planning because of the mismatch between these methods and the purpose of research. After this, the search for a method with a match between the purpose of research and the characteristics of the method started. In table 2 below, these different criterions for the use of a survey are presented. 3.9 Data Collection Methods Bradley stated that the term primary data can describe information which is collected for a special purpose. On the other hand, secondary data has already collected by someone else for their purposes(Bradley, 2007). 3.9.1 Primary data When executing a quantitative method of data collection, the most common way of collecting data is through the use of questionnaires as it gives greater opportunity to gather information from a large number of respondents without a great amount of resources (Johannessen Tufte, 2007; Saunders, Lewis Thornhill, 2000). For the empirical research a self-completion questionnaire was deemed appropriate. This is because the research was conceptualised around obtaining information from, or about, a defined set of people or population; namely online community users (Easterby-Smith, Thorpe Lowe, 2002). There are generally two ways of conducting a questionnaire: through a self-completion questionnaire or a type of structured interview assisted by the interviewer. A self-completion questionnaire is, as the name suggests, a questionnaire where the respondent answers the questions themselves unassisted. This is in contrast to an interviewer assisting the questionnaire process by, for example reading the questions and marking up the responses as conducted in structured interviews (Christensen et al, 2001). As the research aims to understand online users, the internet was the natural medium in order to reach the desired target group. Therefore it was clear that the questionnaire would be designed as a self-completion questionnaire given that assisting the questionnaire process through structured interviews would be difficult to execute via the internet. 3.9.2 Secondary data Secondary data is formed of paper documents such as books, special reports, government produced records, and internet sources. Secondary data can help to combine it with other facts. Therefore, secondary data it good for enhance understanding of results and to confirm results(Bradley, 2007). Secondary data called as desk research, these can be searched from various sources any time. Therefore, this research can give time and cost beneficial to researchers. On the other hand, secondary research has limitations such as irrelevant to the research. But secondary research can gives general ideas of the research theories and can help save the time. In this research, following secondary data can be used to understand and enhance research. 3.9.1. Books My research is involved consumer behaviour, brand loyalty and online communities. Therefore, theories from literatures those books will be relevant to my study. Also those theories can gives general ideas about this research. Moreover, theories about culture also can be used to understand Korean culture. Books have many advantages, for example, books are easy to access, and easy to get information which is relevant to my study. Meanwhile, printed books are heavy and sometimes only can access old ones. But, nowadays, online books are widely disseminated. Internet technology helped to access those resources without any restriction of place. Internet books are very useful to get information easily. For my research books are important to understand the theories. Books can be found in the libraries and internet. 3.9.2. Journals Previous researches such as online communities, consumer behaviour, cosmetics, and decision making processes can be used as a literature review and as a guideline for my research. These previous researches can be found in the internet journal web sites such as ebsco host. Also, written journals can be found from the libraries. Journals have many advantages; journals include recent researches and recent information. Therefore, journals can give new ideas and new information for my research. On the other hand, some journals are not be accessed easily. Thus, there is a limitation for access. But, journals are useful for research to get recent research finding and applied theories to wide my research. 3.9.3. Online database Internet sources can be categorised as online database. Information search engines such as google, yahoo, or blogs and company web sites will be used for gathering secondary data. These secondary data will help guide my study and enhance understand the research areas. 3.9.4. Statistical database Published government database, government web sites, and the companies figures will be used for secondary data. These data will give a real figures about the industry which I will study and support my research as an evidence. 3.10 Sampling and Questionnaire design 3.10.1 Sampling Sampling is the process of taking parts form a defined population in order to examine these parts, usually with the aim of making judgements about the parts of the population that have not been investigated(Bradley, 2010). Also, it has a major advantages compare with other methods which is that it usually cost saving and time saving because, it investigate small portion of the whole population. On the other hand, the major disadvantage is that the process cannot summarise every characteristic in that given population(Bradley, 2010). This study identifies the target group of respondent which are Beautynet users. Data collected from the designed questionnaires and these questionnaires is sent to the online community users through the internet. However, the sample size of this study is limited 300 users from the online community, because of limited research time and limited analysis time. Returned questionnaire is analysed using statistical methods. Statistical methods are useful to understand the relationship and the users behaviour patterns. Therefore, this method can explain the relationship between the online community and its influence purchase decision, and the relationship between the online community and brand loyalty. 3.10.2 Questionnaire design The questionnaire was designed to collect the demographic information of the respondents covering age. Social class information includes education, occupation and income, (questions number 1, 2, 3, and 4) using multiple choice questions. According to Fisher (2007) this type of questions provides respondents with a choice of three to five options and asks them to choose one. This type of questions giving unambiguous options that is mutually exclusive. Authors also applied multiple choice questions to study the respondents purchasing behavior in questions number 5 to see the frequency of purchasing makeup products, question number 6 to see how much money they spend on buying makeup and question number 7 asking respondents about type of makeup product they buy mostly of. Lastly, Likert scales was applied to ask respondents about their opinions and attitudes and to ask them to choose a position on a five-point scale between strongly agree and strongly disagree (Fisher, 2007, pp.195-196). A Likert scale was applied to question number 8-26 to study the respondents attitude toward brands and their purchase decision. 3.11 Analysis of Data In order to analyze the data collected through the survey, the numbers were first statistically sorted to facilitate the surveys different ways of thinking, and then further analyzed to find possible significant patterns. This process of making sense of the raw data was made with the help of the statistical computer software Excel, from which we could generate different tables and diagrams. The raw data, together with an overview of the results can be found in chapter four. The analysis found in this chapter had two purposes; initially t to help the readers to understand, and secondly help us as researchers. In order to make the gathered data more clear, it was coded with the help of Excel and made fit in a spreadsheet, as suggested by Saunders et al (2009). 3.12 Quality Standards Validity and reliability are the two most important quality standards in research studies which this research aims to uphold a high standard of. Validity is concerned with how accurately a variable fits a concept, that is, through determining how accurately the instrument chosen measures the features intended to be measured (Bouma Atkinson, 1999). According to Easterby-Smith, Thorpe Lowe (2002) there are three ways of estimating validity namely (1) face validity: whether the instrument or its items are plausible; (2) convergent validity: the confirmation from comparing the instrument with other independent measurement procedures; and (3) validation by known groups: which is as suggested, comparing groups otherwise known to differ on the factor in question. The questionnaire was carefully constructed based on the models used in the research in order to achieve, as certain as possible, the intended results from the questions probed. Easterby-Smith, Thorpe Lowe (2002) recommend that tests for validity and reliability should be made at the pilot stage of an investigation, before the main phase of data collection. As such a pilot study has been conducted to ensure that the web-questionnaire is constructed to examine, as closely as possible, what it should examine. This was also initiated in order to secure that the questions would be interpreted correctly by the respondents thereby testing the validity of the questionnaire. In reality, it is not known whether all the questions were interpreted as intended, although a pilot study provides useful indications of problems in advance so that miss-interpretation can be minimised. Reliability is concerned with the stability of the research (Easterby-Smith, Thorpe Lowe, 2002). As stated by Christensen et al (2001) a study should be able to be conducted a second time by other researchers and yield the same results if it has a high reliability. Since this research had been conducted with a social constructionist approach reliability is not particularly relevant to the quality standards. This is because a social constructionist approach is interpreted by the researchers knowledge during the analysis process of the research. The personality of the researcher is also an influencing factor within the results. Therefore the research is limited in its ability to yield the same results if conducted a second time. 3.11 Research Limitations The study is conducted within the limited time. Thus, the population of the target audience is limited to a certain number. Therefore there is a limitation to understand all online community members and their attitudes. Also, this study aims to find out the online community and its impact on purchase decision and brand loyalty. Therefore, this study only focused small parts of consumer behaviour. Thus, future research should be considers include some other areas of consumer behaviour and large numbers of target audience to get more reliable data. 3.12 Conclusion The researcher has chosen the positivism philosophy for the research after given explanation of different kind of philosophy. While this research is about business problem, therefore, deductive theory has chosen to explain previous theories about business matter. Researcher has used quantitative method for the analysis of the data and the reason behind choosing is the population of Beautynet is too big to do qualitative method and quantitative method can be used to understand the target audiences behaviour patterns. Primary data has collected by survey from Beautynet users, and secondary data was collected by using the relevant books, journals, Most appropriate option for conducting the research is the descriptive type of research approach. The data collected for this research is using both questionnaire and the secondary data from the books, journals, online database, and statistical database.

Saturday, January 18, 2020

Business Messages Essay

In a traditional workplace, memos are the usual form of business messages that are sent from officers to employees. With the advent of technology, the issuance of memorandums is often limited to topics of general interest, like organizational meetings or policy changes. If I were a lead engineer in Cards4U, I’d maximize the use of faster and more efficient tools to aid me in communicating with other members of the team, as well as company executives and potential customers.   That means e-mails will be the primary source of communication among the team members, since sending and receiving messages take only a few seconds to a few minutes.   E-mail communications are convenient, does not need to be too formal, and can be accessed anytime, anywhere.   The memos will be utilized to inform the CEO or customers regarding product presentations and updates. Since I’m a lead engineer in a creative design group, presentations using PowerPoint or Flash would be very useful in showcasing latest designs and innovations.   Reports are also necessary to document the progress, activities, and changes in the production department.   Face to face meetings with customers are important to establish rapport and get them to buy your designs, or get their feedback. If face-to-face meeting is not possible, conference calls can also be used.   Meeting the CEO for updates and developments would also require face-to-face encounters.   However, if the chief executive initiated conversation using e-mails, then, I should take his lead and reply using the same medium.   But if the message were sent through the more formal memorandum, then the reply would also be of that kind. More importantly, in any type of business communication that I would send, the messages should be concise, direct to the point, and professional. References Business/Professional Writing.(1995-2004). OWL at Purdue University.   Retrieved December 4, 2007, from:   http://owl.english.purdue.edu/workshops/pp/index.html#business Ramsey, L. (2005). Business E-mail Messages & Professionalism.   Retrieved December 4, 2007, from, http://website101.com/email_e-mail/e-mail_business-etiquette.html Kotelnikov, V. Effective Business Communication. Retrieved December 4, 2007, from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.1000ventures.com/business_guide/crosscuttings/biz_communication_main.html

Thursday, January 9, 2020

Want to Know More About Philosophy Essay Topics?

Want to Know More About Philosophy Essay Topics? You should intend on writing at least three distinct paragraphs for each major point. The essay needs to have a singular idea that's reflected throughout the essay. The introduction as the foremost region of the essay ought to be concise and right to the point. With our custom made essay offer, you can be certain to get any kind of essay help you're looking for. When it has to do with writing the philosophy paper, it is crucial to demonstrate each argument and claim, together with come up with viable supporting information to create the reader believe you. In so doing make certain you experience an interest in the subject and you're well equipped with the appropriate material to source for data. Although as a student, there isn't any need of producing limitation based on what you've learned recently. The structure permits the writer to learn the order where the terms ought to be discussed. Before you begin to compose your paper, you need to be able to state precisely what it is that you're attempting to show. Without the facts, your paper will lose certain elements, and you won't be in a position to find the score you had hoped for. A research paper ought to have a strong thesis that may allow it to be clear to the reader what's the focus point of the paper. In the same way as any other writing assignment, a philosophy paper can be challenging in case you don't understand how to go with this. Philosophy Essay Topics: No Longer a Mystery Philosophy essay writing gives the explanations for why the thesis ought to be accepted. In reality, if you're not finding great Philosophy essay topics to work on, we can recommend you a couple interesting Philosophy essay ideas too. Political essays are vital for the writing of research papers because they are able to give the student with a transparent insight of the area of political science. Philosophy essay writing service gives a vital input to students since they try to compose their papers by supplying essential methods for philosophy essay writing. It is essential for the writer to establish a superior branch of study within philosophy. In the procedure for philosophy essays writing, a writer ought to pay attention to several issues. He should create an essay structure to provide a blueprint of the essay. The first point to consider when selecting the introduction for a philosophy essay is to ascertain how you are going to convince your reader your thesis is accurate. In order to make a great philosophy paper, it's first essential to consider very carefully and clearly about your topic. So as to compose a brilliant academic paper in philosophy, you should earn a deep research and plunge into the subject. The philosophy of life essay examples you will find should help you choose the ideal choice for yourself. Knowledgeable writers can assist you with an assortment of topics in a huge area of studies. Below, you will find a number of the topics our writers can handle for you. Research before you begin writing your paper, you must compose a paper that's well detailed. Writing a Philosophy essay can be hard if you aren't clear concerning the topic. Next, you've got to support your thesis. Students lead busy lives and frequently forget about an approaching deadline.

Wednesday, January 1, 2020

Cyber Security A New Form Of Crime - 1594 Words

Cyber Security is considered to be one of the hot topics in modern era. It is a national security challenge that the United States and other countries face today. Cyber Security is an important factor to be considered if one is to be able to protect oneself from malicious people and software from the internet. While the Internet has been providing immense opportunities to individuals, organizations, and nations in diverse areas, at the same time it has also given birth to a new form of crime – cybercrime. This case study is about an Indian company named Pyramid Cyber Security (P) Ltd, which specializes in digital crime, fraud and forensic solutions and services in India. This company provides solutions for digital forensics and security projects for agencies in law enforcement, the public sector and corporate organizations. However, with more and more organizations moving towards cloud computing for their applications, cyber security throws up a different challenge for Pyramid . This challenge put Pyramid into the dilemma of whether they should focus on their existing business or explore new opportunities in cloud forensics. Additionally, they also in doubts whether to offer pre-incident or post-incident digital network security architecture. Alok Gupta, the founder and managing director of Pyramid Cyber Security (P) Ltd, amazes every time he sees in newspaper that organizations lost money due to cyber-attacks. He believes that organizations are not serious aboutShow MoreRelatedCyber Security Is A Growing Concern For Governments Around The World1296 Words   |  6 PagesGlobal Cooperation for Cyber Security Cyber Security is a growing concern for governments around the world. Cyber-attacks pose a direct threat to the security of the nations’ critical infrastructures and Information Technologies (IT) as a low-cost asymmetric warfare element. Most of these nations are aware of the vulnerability of the information technologies and the significance of protecting critical infrastructures. To counteract the threat of potentially disastrous cyber-attacks, nations’ policyRead MoreCyber Threat, Its Scope And Its Impact On National Security991 Words   |  4 Pageslives. It has become an ideal source for cyber criminals to remain active while preying on victims. Higher the number of cyberspace users’, higher is the opportunities for exploitation. So it is the need of the hour to protect our computers, networks, digital applications and our data from unintended or unauthorized source, change or destruction. This paper proposes a policy directed examination on cyber threat, its scope and its impact on national security. It includes a profile of cooperation amongRead MoreCyber Security Operations Centre ( Csoc ) Investigates And Analysis Cyber Attacks On Uk Networks1212 Words   |  5 PagesCyber Security Operations Centre (CSOC) investigates and analysis cyber-attacks on UK Networks and provide solutions and means to mitigate future attack. Its job is in cyber forensics and incident response while the Government Computer Emergency Response Team (GovCERT) deals with the public sector organisations on issues relating to computer security incidents, warnings, alerts, assistance and advice to prevent, reduce expose and mitigate attacks. The National Crime Agency formed in Oct 2013 toRead MoreShould Government Implement Laws For Cyber Crime?977 Words   |  4 PagesGovernment implement laws to prevent cyber crime† Today is the era of technology and globalisation, as it connects the whole world together but also opens new ways to crime. Cyber crime is the result of negative use of technology. Cyber crime refers to a crime which is committed through internet or computer. Cyber crime is of differenr types like stealing of money or information, piracy, electronic vendalism that is destroying or changing the electronic information. Cyber terrorism which threatens not onlyRead MoreCyber Crime As A Key Risk For Regulated Firm1504 Words   |  7 Pages Cyber-crime as a key risk for regulated firm Delegate ID number : 3733017 November 2014 The term cyber-crime describes criminal activity involving computer and internet in committing a crime. Generally it can be divided to two manners: It can target the machine itself, where the purpose of crime would be to gain access to important data stored on the machine, which could be used to obtain gain. It can also use the machine as a tool to commit other type of crime in more traditional understandingRead MoreOntology Of Information Security In Enterprises. Stephen1483 Words   |  6 PagesOntology of Information Security in Enterprises Stephen Schiavone1, Lalit Garg2 and Kelly Summers3 1University of Liverpool, Fountain Hills, Arizona, USA 2University of Liverpool, University of Malta, Malta 3Medicis Pharmaceutical Corp, Scottsdale, Arizona, USA steve.schiavone@my.ohecampus.com lalit.garg@my.ohecampus.com krsummers@sbcglobal.net Abstract: Today’s global free-market enterprise is reliant on the interconnectedness of social, economic and political ecosystems. Enterprises no longer maintainRead MorePolicing Cybercrime : Police And Armed Forces1174 Words   |  5 Pagespolicing cyber strategy is discussed and will show that the unique organisational structure of the UK police force means that policing cyber strategy varies from county to county in the UK; although each regional force operated with the same objective. Within the UK strategy is the criminalisation of certain cyber activity . with Cyber Security Strategies containing elements of cybercrime control, therefore a Criminal Justice rationale which connects it to the broader spectrum of crime preventionRead MoreCyber Laws in India and their Implications1817 Words   |  7 PagesCyber Laws in India and their Implications Contents Cyber space – Nature of threat 2 Growth of Internet user Population 3 The Legal Framework 4 The US and the UK Approaches for Data Protection and Privacy 4 The US 4 The UK 5 India’s Legal Framework Meets Most Requirements 5 Indian IT Act 2000 5 Indian Copyright Act 5 Indian Penal Code 5 Indian Contract Act, 1872 5 IT Act of India 2000 6 Proposed Amendments to the IT Act 8 Other Government Measures 9 Cyber space – Nature of threat Read MoreThe Involvement Of The Cyber Attack1564 Words   |  7 Pagesrelying on the internet for business transactions. In the early weeks of spring, Estonia was hit by a series of politically motivated cyber-attacks. Numerous parties and organisation suffered different forms of denial of service. The main parties included the Estonian government agencies, schools, banks and Internet Service Providers. The motivation for the cyber attack was due to the fact that the Estonian government made the decision to move a Soviet memorial of World War II from its previousRead MoreCyber Law1506 Words   |  7 PagesCYBER LAW INTRODUCTION: Cyberlaw is a new phenomenon having emerged much after the onset of Internet. Internet grew in a completely unplanned and unregulated manner. Even the inventors of Internet could not have really anticipated the scope and far reaching consequences of cyberspace. The growth rate of cyberspace has been enormous. Internet is growing rapidly and with the population of Internet doubling roughly every 100 days, Cyberspace is becoming the new preferred environment of the