SlideShare una empresa de Scribd logo
1 de 44
Chapter 10
Public Policy: From Legal
Issues to Policy

1
Legal and Ethical Issues
Privacy
Intellectual Property
Difficult to protect since it is easy and
inexpensive to copy and disseminate digitized
information

Free Speech
Internet provides the largest opportunity for free
speech; but, some postings are offensive to
people

Taxation
Illegal to impose new sales taxes on Internet
business at the present time (U.S. and2 some
Legal and Ethical Issues (cont.)
Computer crimes
Usually refers to computer fraud and
computer abuse

Consumer Protection
Many legal issues are related to electronic
trade

Other legal issues

Validity of contracts, legality of public key
encryption infrastructures, jurisdiction over
trades, encryption policies
3
Ethical Issues
What is considered to be right and wrong?
What is unethical is not necessarily illegal.
Whether these actions are considered
unethical depends on the organization,
country, and the specific circumstances
surrounding the scenarios.

4
Ethical Issues (cont.)
Code of Ethics
A collection of principles intended as a
guide for its members
Many companies and professional
organizations develop their own codes
of ethics
A guide for members of a company or
an association
5
A Framework for Ethical Issues
Privacy—regarding information about
individuals
Collection
Storage
Dissemination

Property
Ownership and value of information and
intellectual property
6
A Framework for Ethical Issues (cont.)
Accuracy of:
Authenticity
Fidelity
Information collected and processed

Accessibility
Right to access information
Payment of fees for the access

7
Protecting Privacy
Privacy
The right to be left alone and the right to be free
of unreasonable personal intrusions

Information Privacy
The “claim of individuals, groups, or institutions to
determine for themselves when, and to what
extent, information about them is communicated
to others”
8
Protecting Privacy (cont.)
Two basic rules
The right of privacy is not absolute. Privacy
must be balanced against the needs of
society
The public's right to know is superior to the
individual’s right of privacy

9
How is Private Information Collected?
Reading your newsgroups’ postings
Finding you in the Internet Directory
Making your browser record information
about you
Recording what your browsers say about you
Reading your e-mail
10
Protecting Your Privacy
Think before you give
out personal information
on a site
Track the use of your
name and information
Keep your newsgroups’
posts out of archives
Use the Anonymizer
when browsing
Live without cookies

Use anonymous
remailers
Use encryption
Reroute your mail
away from your
office
Ask your ISP or
employer about a
privacy policy

11
Legislation
The Consumer Internet Privacy Act
The Federal Internet Privacy Protection Act
The Communications Privacy and Consumer
Empowerment Act
The Data Privacy Act

12
Personal Information in Databases
Databases of:
Banks and financial institutions
Cable TV
Telephones
Employers
Schools
Insurance companies
Online vendors
13
Personal Information
in Databases (cont.)
Concerns
Data collection
Data accuracy
Data confidentiality

14
Protecting Intellectual Property
Copyright
A statutory grant that provides the creators of
intellectual property with ownership of it for 28
years

Trade Secret
Intellectual work such as a business plan, which
is a company secret and is not based on public
information

Patent
A document that grants the holder exclusive
rights on an invention for 17 years (U.S.)

15
Copyrights
Protects original expression of ideas

Literary works
Musical works
Dramatic works
Artistic works
Sound recordings, films, broadcasts, cable
programs
Published editions of literary and musical
works
16
Copyright Protection Techniques
Digital watermarks
Embedding of invisible marks
Can be represented by bits in digital
content
Hidden in the source data, becoming
inseparable from such data

17
International Aspects of
Intellectual Property
The World Intellectual Property Organization
More than 60 member countries come up with an
international treaty
Part of the agreement is called the “database
treaty”
Its aim is to protect the investment of firms that
collect and arrange information

18
Patents
Patent—a document that grants the holder

exclusive rights on an invention for 17 years

Satisfy following legal criteria
Novel—does not already exist as part of the
public domain
Involves sufficiently “inventive step”
Capable of individual application (be put to
practical use)
19
Trademarks
Trademarks—graphical sign used by
businesses to identify their goods and
services
Gives exclusive rights to:
Use trademark on goods and services
registered to that sign
Take legal action to prevent anyone from
using trademark without consent
20
Domain Names
Domain name refers to the upper category
of Internet address (URL)
Three controversies

Whether top-level domain names (similar to
com, org and gov) should be added
The use of trademark names by companies for
domain names that belong to other companies
If companies in different countries have the
same name, who can use it as the domain
name?
21
Defining Freedom of Speech
The Bill of Rights First Amendment to the
Constitution of the U.S. of America reads:
“Congress shall make no law respecting an
establishment of religion, or prohibiting the free
exercise thereof; or abridging the freedom of
speech, or of the press; or the right of the people
peaceably to assemble, and to petition the
government for a redress of grievances.”

22
The Debate About
Free Speech on the Internet
Free speech debate
“Most citizens are implacably opposed to
censorship in any form — except censorship of
whatever they personally happen to find
offensive.”
The debate: what restrictions, if any, should there
be on Internet content, and how should it be
monitored?

23
The Debate About
Free Speech on the Internet (cont.)
What are the boundaries, and how should they be
enforced?
Governments protective of their role in society
Parents concerned about exposing their children to
inappropriate Web pages and chat rooms
Federal agencies attempting to deal with illegal actions
Citizen action groups desiring to protect every ounce of
their freedom to speak
Individuals concerned about their right to information on
the Internet
Organizations seeking to empower the citizens of the earth

24
Protecting Children
3 approaches (regarding the protection of children
from inappropriate material on the Internet)
No information should be held back and parents
should be responsible for monitoring their own
children
The government is the only one who can truly
protect children from this material
To hold the Internet providers responsible for all
the material and information they provide, or
enable access to it
25
Protecting Children (cont.)

Parents governing their own children
Government protecting the children
Responsibility of the Internet providers
Forcing Internet providers to be accountable,
or enable access to information

26
Legal Perspectives in the USA

Child Online Protection Act
Internet Tax Freedom Act
Family Friendly Internet Access Act
Internet Protection Act
Internet School Filtering Act

27
Controlling Spamming
What is spamming, why is it bad?
Spamming
“The practice of indiscriminate distribution of
messages (for example junk mail) without
permission of the receiver and without
consideration for the messages’
appropriateness”

Spam comprised 30% of all mail sent on America
Online (in the past, now less than 10%)
Slows the internet in general
Shuts ISPs down completely

28
Controlling Spamming (cont.)
Legislation, Legal
The Electronic Mailbox Protection Act
The Unsolicited Commercial Electronic Mail
Act
The Netizens Protection Act
The Telephone Consumer Protection Act

29
Controlling Spamming (cont.)
How to cut spamming
Tell users not to validate their addresses by
answering spam requests for replies if they
want to be taken off mailing lists
Disable the relay feature on SMTP (mail)
servers so mail cannot be bounced off the
server
Delete spam and forget it— it’s a fact of life
and not worth wasting time over
Use software packages, e.g. getlost.com and
junkbusters.com
30
Other Legal Issues
What are the rules of electronic contracting, and
whose jurisdiction prevails when buyers, brokers,
and sellers are in different states and/or
countries?
How can gambling be controlled on the Internet?
Gambling is legal in Nevada and other states.
How can the winner’s tax be collected? By
whom?
When are electronic documents admissible
evidence in the courts of law? What do you do if
they are not?
31
Other Legal Issues (cont.)
Time and place can carry different dates for the buyers
and sellers when they are across the ocean. Which
time should be considered?
Is a digital signature legal?
The use of multiple networks and trading partners
makes the documentation of responsibility difficult.
How is such a problem overcome?

32
Electronic Contracts
Uniform Electronic Transactions Act
Uniform Commercial Code (UCC)
Shrink-wrap agreements (or box-top
licenses)
The user is bound to the license by opening the
package

33
Computer Crimes
Computer crimes refers to computer fraud
and/or computer abuse
Computer fraud committed by:
Alteration of input
Alteration of computer data
Alteration/misuse of programs
Destruction/suppression/misappropriation of
output
34
Computer Crimes (cont.)
Computer abuse committed by:
Misuse of company computer
service/resources by performing unauthorized
private work or playing games by employees
Compromise of system integrity by:
Altering company data
Introducing viruses
Hacking into the system
35
Computer Crimes (cont.)
Characteristics of computer crime

Chronic underreporting of abuse
Security not introduced until abuse has occurred
Organizational size unrelated to severity of
punishment
Abuses by high-level employees less likely to be
prosecuted
Programmers most difficult to identify
Publicity discourages abuse
Security efforts reduce abuse
36
Computer Crimes (cont.)
Effective measures in deterring computer
crime
Make computer security visible
Define and communicate company’s policy
regularly
Make staff aware of penalties
Report cases to police
Publicize successful prosecution
Deploy security technologies extensively
37
Fraud on the Internet
Internet Stocks Fraud
SEC brought charges against 44 companies and
individuals who illegally promoted stocks on
computer bulletin boards, online newsletters and
investment Web sites

Other Financial Fraud
Selling bogus investments, phantom business
opportunities, and other fraud schemes

38
Fraud on the Internet (cont.)
Other Fraud in EC
Customers may:
Receive poor quality products and
services
Not get products in time
Be asked to pay for things they assume
will be paid for by sellers

39
Authentication
If authentication online can be verified
Students will be able to take exams online from
home
Fraud of recipients of government entitlements
and other payments will be reduced to a bare
minimum
Buyers will be assured who the sellers are and
sellers will know who the buyers are with a very
high degree of confidence
40
Biometric Controls
Matching against a template:

Photo of face
Fingerprints
Hand geometry
Blood vessel pattern in the retina of a person’s
eye
Voice
Signature
Keystroke dynamics
y.
Iris
ath
C

41
What Can Vendors Do?
Use intelligent software that signals
questionable customers
Develop a list of warning signals for possibly
fraudulent transactions
Ask customers to have shipping address
added to their bank account if different from
billing address
42
Managerial Issues
Multinational corporations face different
cultures in the different countries in which they
are doing business
Issues of privacy, ethics, and so on may seem
to be tangential to running a business, but
ignoring them may hinder the operation of
many organizations
43
Managerial Issues (cont.)
The impact of EC and the Internet can be
so strong that the entire manner in which
companies do business will be changed,
with significant impacts on:
Procedures
People
Organizational structure
Management
Business processes

44

Más contenido relacionado

La actualidad más candente

E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethicsXophia Montawal
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
E Commerce: Its role and development
E Commerce: Its role and developmentE Commerce: Its role and development
E Commerce: Its role and developmentAnubha Rastogi
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n itamitmitkar
 
Electronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceElectronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceHem Pokhrel
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital AgeJane Prusakova
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...Rishav Gupta
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructureRaj vardhan
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 

La actualidad más candente (20)

Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethics
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
E Commerce: Its role and development
E Commerce: Its role and developmentE Commerce: Its role and development
E Commerce: Its role and development
 
Ethics in e commerce n it
Ethics in e commerce n itEthics in e commerce n it
Ethics in e commerce n it
 
Electronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceElectronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-Commerce
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital Age
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
E - Commerce
E - CommerceE - Commerce
E - Commerce
 
protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
E commerce business model
E commerce business modelE commerce business model
E commerce business model
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructure
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
E gov lecture1
E gov lecture1E gov lecture1
E gov lecture1
 
E - Commerce
E - CommerceE - Commerce
E - Commerce
 

Similar a E-Commerce 10

Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docxhyacinthshackley2629
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commercewelcometofacebook
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.pptamreena6
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policyEngr Razaque
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergradAzmawati Lazim
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Chapter2
Chapter2Chapter2
Chapter2Pibi Lu
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketinggaurav jain
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 

Similar a E-Commerce 10 (20)

Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx1ITC358ICT Management and Information SecurityChapter 12.docx
1ITC358ICT Management and Information SecurityChapter 12.docx
 
Ppt by
Ppt by Ppt by
Ppt by
 
Chapter3.ppt
Chapter3.pptChapter3.ppt
Chapter3.ppt
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
 
Cyber law
Cyber lawCyber law
Cyber law
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
whitman_ch04.ppt
whitman_ch04.pptwhitman_ch04.ppt
whitman_ch04.ppt
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyber law and introduction for undergrad
Cyber law and introduction for undergradCyber law and introduction for undergrad
Cyber law and introduction for undergrad
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Chapter2
Chapter2Chapter2
Chapter2
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 

Más de Zarrar Siddiqui (13)

General Entry
General EntryGeneral Entry
General Entry
 
Imp
ImpImp
Imp
 
E-Commerce 13
E-Commerce 13E-Commerce 13
E-Commerce 13
 
E-Commerce 12
E-Commerce 12E-Commerce 12
E-Commerce 12
 
E-Commerce 11
E-Commerce 11E-Commerce 11
E-Commerce 11
 
E-Commerce 09
E-Commerce 09E-Commerce 09
E-Commerce 09
 
E-Commerce 08
E-Commerce 08E-Commerce 08
E-Commerce 08
 
E-Commerce 07
E-Commerce 07E-Commerce 07
E-Commerce 07
 
E-Commerce 06
E-Commerce 06E-Commerce 06
E-Commerce 06
 
E-Commerce 04
E-Commerce 04E-Commerce 04
E-Commerce 04
 
E-Commerce 03
E-Commerce 03E-Commerce 03
E-Commerce 03
 
E-Commerce 02
E-Commerce 02E-Commerce 02
E-Commerce 02
 
E-Commerce 01
E-Commerce 01E-Commerce 01
E-Commerce 01
 

Último

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 

Último (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 

E-Commerce 10

  • 1. Chapter 10 Public Policy: From Legal Issues to Policy 1
  • 2. Legal and Ethical Issues Privacy Intellectual Property Difficult to protect since it is easy and inexpensive to copy and disseminate digitized information Free Speech Internet provides the largest opportunity for free speech; but, some postings are offensive to people Taxation Illegal to impose new sales taxes on Internet business at the present time (U.S. and2 some
  • 3. Legal and Ethical Issues (cont.) Computer crimes Usually refers to computer fraud and computer abuse Consumer Protection Many legal issues are related to electronic trade Other legal issues Validity of contracts, legality of public key encryption infrastructures, jurisdiction over trades, encryption policies 3
  • 4. Ethical Issues What is considered to be right and wrong? What is unethical is not necessarily illegal. Whether these actions are considered unethical depends on the organization, country, and the specific circumstances surrounding the scenarios. 4
  • 5. Ethical Issues (cont.) Code of Ethics A collection of principles intended as a guide for its members Many companies and professional organizations develop their own codes of ethics A guide for members of a company or an association 5
  • 6. A Framework for Ethical Issues Privacy—regarding information about individuals Collection Storage Dissemination Property Ownership and value of information and intellectual property 6
  • 7. A Framework for Ethical Issues (cont.) Accuracy of: Authenticity Fidelity Information collected and processed Accessibility Right to access information Payment of fees for the access 7
  • 8. Protecting Privacy Privacy The right to be left alone and the right to be free of unreasonable personal intrusions Information Privacy The “claim of individuals, groups, or institutions to determine for themselves when, and to what extent, information about them is communicated to others” 8
  • 9. Protecting Privacy (cont.) Two basic rules The right of privacy is not absolute. Privacy must be balanced against the needs of society The public's right to know is superior to the individual’s right of privacy 9
  • 10. How is Private Information Collected? Reading your newsgroups’ postings Finding you in the Internet Directory Making your browser record information about you Recording what your browsers say about you Reading your e-mail 10
  • 11. Protecting Your Privacy Think before you give out personal information on a site Track the use of your name and information Keep your newsgroups’ posts out of archives Use the Anonymizer when browsing Live without cookies Use anonymous remailers Use encryption Reroute your mail away from your office Ask your ISP or employer about a privacy policy 11
  • 12. Legislation The Consumer Internet Privacy Act The Federal Internet Privacy Protection Act The Communications Privacy and Consumer Empowerment Act The Data Privacy Act 12
  • 13. Personal Information in Databases Databases of: Banks and financial institutions Cable TV Telephones Employers Schools Insurance companies Online vendors 13
  • 14. Personal Information in Databases (cont.) Concerns Data collection Data accuracy Data confidentiality 14
  • 15. Protecting Intellectual Property Copyright A statutory grant that provides the creators of intellectual property with ownership of it for 28 years Trade Secret Intellectual work such as a business plan, which is a company secret and is not based on public information Patent A document that grants the holder exclusive rights on an invention for 17 years (U.S.) 15
  • 16. Copyrights Protects original expression of ideas Literary works Musical works Dramatic works Artistic works Sound recordings, films, broadcasts, cable programs Published editions of literary and musical works 16
  • 17. Copyright Protection Techniques Digital watermarks Embedding of invisible marks Can be represented by bits in digital content Hidden in the source data, becoming inseparable from such data 17
  • 18. International Aspects of Intellectual Property The World Intellectual Property Organization More than 60 member countries come up with an international treaty Part of the agreement is called the “database treaty” Its aim is to protect the investment of firms that collect and arrange information 18
  • 19. Patents Patent—a document that grants the holder exclusive rights on an invention for 17 years Satisfy following legal criteria Novel—does not already exist as part of the public domain Involves sufficiently “inventive step” Capable of individual application (be put to practical use) 19
  • 20. Trademarks Trademarks—graphical sign used by businesses to identify their goods and services Gives exclusive rights to: Use trademark on goods and services registered to that sign Take legal action to prevent anyone from using trademark without consent 20
  • 21. Domain Names Domain name refers to the upper category of Internet address (URL) Three controversies Whether top-level domain names (similar to com, org and gov) should be added The use of trademark names by companies for domain names that belong to other companies If companies in different countries have the same name, who can use it as the domain name? 21
  • 22. Defining Freedom of Speech The Bill of Rights First Amendment to the Constitution of the U.S. of America reads: “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.” 22
  • 23. The Debate About Free Speech on the Internet Free speech debate “Most citizens are implacably opposed to censorship in any form — except censorship of whatever they personally happen to find offensive.” The debate: what restrictions, if any, should there be on Internet content, and how should it be monitored? 23
  • 24. The Debate About Free Speech on the Internet (cont.) What are the boundaries, and how should they be enforced? Governments protective of their role in society Parents concerned about exposing their children to inappropriate Web pages and chat rooms Federal agencies attempting to deal with illegal actions Citizen action groups desiring to protect every ounce of their freedom to speak Individuals concerned about their right to information on the Internet Organizations seeking to empower the citizens of the earth 24
  • 25. Protecting Children 3 approaches (regarding the protection of children from inappropriate material on the Internet) No information should be held back and parents should be responsible for monitoring their own children The government is the only one who can truly protect children from this material To hold the Internet providers responsible for all the material and information they provide, or enable access to it 25
  • 26. Protecting Children (cont.) Parents governing their own children Government protecting the children Responsibility of the Internet providers Forcing Internet providers to be accountable, or enable access to information 26
  • 27. Legal Perspectives in the USA Child Online Protection Act Internet Tax Freedom Act Family Friendly Internet Access Act Internet Protection Act Internet School Filtering Act 27
  • 28. Controlling Spamming What is spamming, why is it bad? Spamming “The practice of indiscriminate distribution of messages (for example junk mail) without permission of the receiver and without consideration for the messages’ appropriateness” Spam comprised 30% of all mail sent on America Online (in the past, now less than 10%) Slows the internet in general Shuts ISPs down completely 28
  • 29. Controlling Spamming (cont.) Legislation, Legal The Electronic Mailbox Protection Act The Unsolicited Commercial Electronic Mail Act The Netizens Protection Act The Telephone Consumer Protection Act 29
  • 30. Controlling Spamming (cont.) How to cut spamming Tell users not to validate their addresses by answering spam requests for replies if they want to be taken off mailing lists Disable the relay feature on SMTP (mail) servers so mail cannot be bounced off the server Delete spam and forget it— it’s a fact of life and not worth wasting time over Use software packages, e.g. getlost.com and junkbusters.com 30
  • 31. Other Legal Issues What are the rules of electronic contracting, and whose jurisdiction prevails when buyers, brokers, and sellers are in different states and/or countries? How can gambling be controlled on the Internet? Gambling is legal in Nevada and other states. How can the winner’s tax be collected? By whom? When are electronic documents admissible evidence in the courts of law? What do you do if they are not? 31
  • 32. Other Legal Issues (cont.) Time and place can carry different dates for the buyers and sellers when they are across the ocean. Which time should be considered? Is a digital signature legal? The use of multiple networks and trading partners makes the documentation of responsibility difficult. How is such a problem overcome? 32
  • 33. Electronic Contracts Uniform Electronic Transactions Act Uniform Commercial Code (UCC) Shrink-wrap agreements (or box-top licenses) The user is bound to the license by opening the package 33
  • 34. Computer Crimes Computer crimes refers to computer fraud and/or computer abuse Computer fraud committed by: Alteration of input Alteration of computer data Alteration/misuse of programs Destruction/suppression/misappropriation of output 34
  • 35. Computer Crimes (cont.) Computer abuse committed by: Misuse of company computer service/resources by performing unauthorized private work or playing games by employees Compromise of system integrity by: Altering company data Introducing viruses Hacking into the system 35
  • 36. Computer Crimes (cont.) Characteristics of computer crime Chronic underreporting of abuse Security not introduced until abuse has occurred Organizational size unrelated to severity of punishment Abuses by high-level employees less likely to be prosecuted Programmers most difficult to identify Publicity discourages abuse Security efforts reduce abuse 36
  • 37. Computer Crimes (cont.) Effective measures in deterring computer crime Make computer security visible Define and communicate company’s policy regularly Make staff aware of penalties Report cases to police Publicize successful prosecution Deploy security technologies extensively 37
  • 38. Fraud on the Internet Internet Stocks Fraud SEC brought charges against 44 companies and individuals who illegally promoted stocks on computer bulletin boards, online newsletters and investment Web sites Other Financial Fraud Selling bogus investments, phantom business opportunities, and other fraud schemes 38
  • 39. Fraud on the Internet (cont.) Other Fraud in EC Customers may: Receive poor quality products and services Not get products in time Be asked to pay for things they assume will be paid for by sellers 39
  • 40. Authentication If authentication online can be verified Students will be able to take exams online from home Fraud of recipients of government entitlements and other payments will be reduced to a bare minimum Buyers will be assured who the sellers are and sellers will know who the buyers are with a very high degree of confidence 40
  • 41. Biometric Controls Matching against a template: Photo of face Fingerprints Hand geometry Blood vessel pattern in the retina of a person’s eye Voice Signature Keystroke dynamics y. Iris ath C 41
  • 42. What Can Vendors Do? Use intelligent software that signals questionable customers Develop a list of warning signals for possibly fraudulent transactions Ask customers to have shipping address added to their bank account if different from billing address 42
  • 43. Managerial Issues Multinational corporations face different cultures in the different countries in which they are doing business Issues of privacy, ethics, and so on may seem to be tangential to running a business, but ignoring them may hinder the operation of many organizations 43
  • 44. Managerial Issues (cont.) The impact of EC and the Internet can be so strong that the entire manner in which companies do business will be changed, with significant impacts on: Procedures People Organizational structure Management Business processes 44