SlideShare una empresa de Scribd logo
1 de 16
As the national and international community has increasingly
begun to depend on the Internet and Web for commerce and
information, protecting personal information has become a
greater concern.
Identity theft is a crime of growing proportions that attacks
privacy at its very core, by stealing identities.
• Employee’s Concern- be aware of why your company may
want to monitor employee computer use and what your privacy
rights are.
• Consumer’s Concern - you should know why your company
needs to collect data on its customers
• Privacy is freedom from unauthorized intrusion.
• Privacy is often confused with confidentiality, but privacy is
broader because confidentiality involves protecting already
acquired information from outside intrusion.
• Privacy usually falls under the broader aegis of common law,
meaning that it is considered to be a given right that does not
need to be guaranteed by a constitution.
• Information technology has opened new avenues for
organizations to gather personal data on users. Tremendous
amounts of personal data can be stored on modern database
servers and then matched with data on other databases in a
matter of seconds to create a very complete picture of groups of
consumers or even of individual consumers.
C a t e g o r y D a t a b a s e
Government data Crime databases, immigration records, tax records,
Social Security
records, welfare records, and armed forces records
Public data Marriage and divorce proceedings, bankruptcy filings,
voting registrations, property taxes, land titles, birth
and death records, occupational licenses, hunting and
fishing licenses, and court records
Organizational
data
Company personnel files, including intelligence,
aptitude and personality tests, and supervisor
appraisals Political party and club membership lists
Medical data Hospital stay, doctor visit, and pharmacy records
Psychiatric and mental health records Insurance
records Workers' compensation records
Aspect of
Privacy
Industrial
Economy
Network Economy
Searchabilily Difficult Easy
Protection Little Much
Integration Very little Moderate
Privacy in the networked economy is an evolving issue, with at
least two sides to it.
On the one hand, no one wants to have his or her privacy
intruded upon without permission. On the other hand, a number
of studies have shown that implementing
stringent privacy restrictions would negatively affect both
individuals and the economy as a whole. Examples…
• Information enables retailers to direct their advertising to
likely customers through techniques as customer relationship
management (CRM). Such narrow advertising campaigns are
more cost effective than broad advertising campaigns, with the
customer receiving the benefits
of the cost savings.
• High mortgage rates and fewer loans might result if
lenders had less access to credit information. They
would have to increase their rates to account for failed
loans or refuse more loan applications.
• Without the free flow of information, many of the free
sites might have to charge for their services.
• e-commerce is predicted to grow rapidly over the next
few years. Business and industry constantly strive to create
Web sites that will attract customers and other stakeholders.
One technique involves mass customization (customizing the
Web site to each visitor by learning about the visitor's
preferences.)
They can do so by asking for information about the visitor or
by tracking the visitor's purchases and learning about his or
her buying habits. In either case, an organization must create
profiles of its Web customers.
• Transactional Data :- Data that are created when a transaction
takes place that requires the customer to reveal his or her
identity. This type of event usually involves face-to-face point-
of-sale, telephone, mail, or Web transactions as well as travel,
credit, or communication services.
In addition to transactional data generated by consumer
purchases, data are often collected on employees who handle
telephone purchases or deal with customer service questions. In
this practice, commonly referred to as electronic supervision or
computer monitoring, managers use software on the network
server to monitor the amount of work performed by employees
on networked computers in terms of entering data, making
reservations, dealing with customer questions, and so on.
• Web - Visit Data :- Web-visit data include data that are unique to the
Web, in that a transaction in the traditional sense of the word does not
have to occur. Any visit to a Web site generates a great deal of data
about the user's computer.
• Internet Communications Data :- This data includes e-mail messages,
conversations in chat rooms, postings to bulletin boards, and
messages to newsgroups. These data are unstructured because they
are not organized into database form.
All cultures and economies have developed rules
about whether certain acts are "good" or "bad,"
or "right" or "wrong."These rules, known as
ethics, are inherently value judgments that have
resulted from a consensus in society. Such rules
are often expressed or supported by laws.
1. What trade-offs are associated with more stringent
laws regarding personal privacy? Give an example.
2. What is spyware, and how is it often installed on a
computer?
3. What is a Web bug? How does it collect data?
4. Why do we say that Internet communications data
are unstructured? Does this statement mean they
cannot be searched or integrated with other data?

Más contenido relacionado

La actualidad más candente

organisational development ppt
organisational development pptorganisational development ppt
organisational development ppt
kohlisudeep18
 
Human resource informtion system ppt
Human resource informtion system pptHuman resource informtion system ppt
Human resource informtion system ppt
Ankur Bhadauria
 

La actualidad más candente (20)

BASIC PRINCIPLES OF MANAGEMENT AS PER ANCIENT INDIAN WISDOM
BASIC PRINCIPLES OF MANAGEMENT AS PER ANCIENT INDIAN WISDOMBASIC PRINCIPLES OF MANAGEMENT AS PER ANCIENT INDIAN WISDOM
BASIC PRINCIPLES OF MANAGEMENT AS PER ANCIENT INDIAN WISDOM
 
Human Resource Accounting
Human Resource AccountingHuman Resource Accounting
Human Resource Accounting
 
Development and implementation of hris
Development and implementation of hrisDevelopment and implementation of hris
Development and implementation of hris
 
Virtual organisations
Virtual organisationsVirtual organisations
Virtual organisations
 
organisational development ppt
organisational development pptorganisational development ppt
organisational development ppt
 
Transaction processing system
Transaction processing systemTransaction processing system
Transaction processing system
 
MBA 1s sem Organisational Behaviour Notes
MBA 1s sem Organisational Behaviour NotesMBA 1s sem Organisational Behaviour Notes
MBA 1s sem Organisational Behaviour Notes
 
steps of implementation of HRIS
steps of implementation of HRISsteps of implementation of HRIS
steps of implementation of HRIS
 
Human resource informtion system ppt
Human resource informtion system pptHuman resource informtion system ppt
Human resource informtion system ppt
 
Types o f information systems
Types o f information systemsTypes o f information systems
Types o f information systems
 
Nature of Organisational behaviour
Nature of Organisational behaviourNature of Organisational behaviour
Nature of Organisational behaviour
 
Attitude- Organisational Behaviour
Attitude- Organisational BehaviourAttitude- Organisational Behaviour
Attitude- Organisational Behaviour
 
HR CHALLENGES
HR CHALLENGESHR CHALLENGES
HR CHALLENGES
 
FUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENTFUTURE OF ORGANIZATION DEVELOPMENT
FUTURE OF ORGANIZATION DEVELOPMENT
 
Six box model
Six box modelSix box model
Six box model
 
Organizational Behavior - Attitude
Organizational Behavior - Attitude Organizational Behavior - Attitude
Organizational Behavior - Attitude
 
Assumptions in Organizational Development - Organizational Change and Develo...
Assumptions in Organizational Development -  Organizational Change and Develo...Assumptions in Organizational Development -  Organizational Change and Develo...
Assumptions in Organizational Development - Organizational Change and Develo...
 
Decision Support System - Management Information System
Decision Support System - Management Information SystemDecision Support System - Management Information System
Decision Support System - Management Information System
 
Techniques for Forecasting Human Resources
 Techniques  for Forecasting   Human Resources Techniques  for Forecasting   Human Resources
Techniques for Forecasting Human Resources
 
Components of information system
Components of information systemComponents of information system
Components of information system
 

Destacado

14857929 ebiteps-analysis-
14857929 ebiteps-analysis-14857929 ebiteps-analysis-
14857929 ebiteps-analysis-
loteyhamin
 
Leverage
LeverageLeverage
Leverage
Mickey
 
Job Analysis, Job Design & Job Evaluation
Job Analysis, Job Design & Job EvaluationJob Analysis, Job Design & Job Evaluation
Job Analysis, Job Design & Job Evaluation
Ankita Varma
 

Destacado (15)

Network economy
Network economyNetwork economy
Network economy
 
HIT and Health System Reforms: Collaboration as a “Must Have” in the Network ...
HIT and Health System Reforms: Collaboration as a “Must Have” in the Network ...HIT and Health System Reforms: Collaboration as a “Must Have” in the Network ...
HIT and Health System Reforms: Collaboration as a “Must Have” in the Network ...
 
Welcome to the Networked Economy
Welcome to the Networked EconomyWelcome to the Networked Economy
Welcome to the Networked Economy
 
Healthcare
HealthcareHealthcare
Healthcare
 
Organisational behaviour
Organisational behaviourOrganisational behaviour
Organisational behaviour
 
Job design
Job designJob design
Job design
 
14857929 ebiteps-analysis-
14857929 ebiteps-analysis-14857929 ebiteps-analysis-
14857929 ebiteps-analysis-
 
Ebit ebs analysis
Ebit   ebs analysisEbit   ebs analysis
Ebit ebs analysis
 
Leverages
LeveragesLeverages
Leverages
 
Leverage
LeverageLeverage
Leverage
 
Job design
Job designJob design
Job design
 
Job analysis
Job analysisJob analysis
Job analysis
 
Job Analysis, Job Design & Job Evaluation
Job Analysis, Job Design & Job EvaluationJob Analysis, Job Design & Job Evaluation
Job Analysis, Job Design & Job Evaluation
 
Market entry strategies
Market entry strategiesMarket entry strategies
Market entry strategies
 
Leverage
LeverageLeverage
Leverage
 

Similar a Privacy Issues in Networked Economy

Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 
INTRODUCTION 351consumers are placing their orders online, but.docx
INTRODUCTION 351consumers are placing their orders online, but.docxINTRODUCTION 351consumers are placing their orders online, but.docx
INTRODUCTION 351consumers are placing their orders online, but.docx
mariuse18nolet
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
Mike Kuhn
 

Similar a Privacy Issues in Networked Economy (20)

SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
Privacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital AgePrivacy & Security Challenges Faced By Financial Services In The Digital Age
Privacy & Security Challenges Faced By Financial Services In The Digital Age
 
Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy Piwik PRO The Real Cost of Data Privacy
Piwik PRO The Real Cost of Data Privacy
 
Issues and challenges in e-business
Issues and challenges in e-businessIssues and challenges in e-business
Issues and challenges in e-business
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Digital Transformation of U.S. Private Banking
Digital Transformation of U.S. Private BankingDigital Transformation of U.S. Private Banking
Digital Transformation of U.S. Private Banking
 
1637 copy
1637   copy1637   copy
1637 copy
 
E-Commerce & Digital Marketing -UNIT 1
E-Commerce & Digital Marketing -UNIT 1E-Commerce & Digital Marketing -UNIT 1
E-Commerce & Digital Marketing -UNIT 1
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers The Unseen Enemy - Protecting the Brand, the Assets and the Customers
The Unseen Enemy - Protecting the Brand, the Assets and the Customers
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Effectiveness implementation of e commerce in the developing countries empiri...
Effectiveness implementation of e commerce in the developing countries empiri...Effectiveness implementation of e commerce in the developing countries empiri...
Effectiveness implementation of e commerce in the developing countries empiri...
 
Overview of data mining
Overview of data miningOverview of data mining
Overview of data mining
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Rohan dev
Rohan devRohan dev
Rohan dev
 
INTRODUCTION 351consumers are placing their orders online, but.docx
INTRODUCTION 351consumers are placing their orders online, but.docxINTRODUCTION 351consumers are placing their orders online, but.docx
INTRODUCTION 351consumers are placing their orders online, but.docx
 
Cyber Liability Risk
Cyber Liability RiskCyber Liability Risk
Cyber Liability Risk
 
Govt authentication brief ca v
Govt authentication brief ca vGovt authentication brief ca v
Govt authentication brief ca v
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Último (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 

Privacy Issues in Networked Economy

  • 1.
  • 2. As the national and international community has increasingly begun to depend on the Internet and Web for commerce and information, protecting personal information has become a greater concern. Identity theft is a crime of growing proportions that attacks privacy at its very core, by stealing identities. • Employee’s Concern- be aware of why your company may want to monitor employee computer use and what your privacy rights are. • Consumer’s Concern - you should know why your company needs to collect data on its customers
  • 3. • Privacy is freedom from unauthorized intrusion. • Privacy is often confused with confidentiality, but privacy is broader because confidentiality involves protecting already acquired information from outside intrusion. • Privacy usually falls under the broader aegis of common law, meaning that it is considered to be a given right that does not need to be guaranteed by a constitution. • Information technology has opened new avenues for organizations to gather personal data on users. Tremendous amounts of personal data can be stored on modern database servers and then matched with data on other databases in a matter of seconds to create a very complete picture of groups of consumers or even of individual consumers.
  • 4. C a t e g o r y D a t a b a s e Government data Crime databases, immigration records, tax records, Social Security records, welfare records, and armed forces records Public data Marriage and divorce proceedings, bankruptcy filings, voting registrations, property taxes, land titles, birth and death records, occupational licenses, hunting and fishing licenses, and court records Organizational data Company personnel files, including intelligence, aptitude and personality tests, and supervisor appraisals Political party and club membership lists Medical data Hospital stay, doctor visit, and pharmacy records Psychiatric and mental health records Insurance records Workers' compensation records
  • 5. Aspect of Privacy Industrial Economy Network Economy Searchabilily Difficult Easy Protection Little Much Integration Very little Moderate
  • 6. Privacy in the networked economy is an evolving issue, with at least two sides to it. On the one hand, no one wants to have his or her privacy intruded upon without permission. On the other hand, a number of studies have shown that implementing stringent privacy restrictions would negatively affect both individuals and the economy as a whole. Examples… • Information enables retailers to direct their advertising to likely customers through techniques as customer relationship management (CRM). Such narrow advertising campaigns are more cost effective than broad advertising campaigns, with the customer receiving the benefits of the cost savings.
  • 7. • High mortgage rates and fewer loans might result if lenders had less access to credit information. They would have to increase their rates to account for failed loans or refuse more loan applications. • Without the free flow of information, many of the free sites might have to charge for their services. • e-commerce is predicted to grow rapidly over the next few years. Business and industry constantly strive to create Web sites that will attract customers and other stakeholders. One technique involves mass customization (customizing the Web site to each visitor by learning about the visitor's preferences.) They can do so by asking for information about the visitor or by tracking the visitor's purchases and learning about his or her buying habits. In either case, an organization must create profiles of its Web customers.
  • 8. • Transactional Data :- Data that are created when a transaction takes place that requires the customer to reveal his or her identity. This type of event usually involves face-to-face point- of-sale, telephone, mail, or Web transactions as well as travel, credit, or communication services. In addition to transactional data generated by consumer purchases, data are often collected on employees who handle telephone purchases or deal with customer service questions. In this practice, commonly referred to as electronic supervision or computer monitoring, managers use software on the network server to monitor the amount of work performed by employees on networked computers in terms of entering data, making reservations, dealing with customer questions, and so on.
  • 9.
  • 10. • Web - Visit Data :- Web-visit data include data that are unique to the Web, in that a transaction in the traditional sense of the word does not have to occur. Any visit to a Web site generates a great deal of data about the user's computer. • Internet Communications Data :- This data includes e-mail messages, conversations in chat rooms, postings to bulletin boards, and messages to newsgroups. These data are unstructured because they are not organized into database form.
  • 11.
  • 12.
  • 13.
  • 14. All cultures and economies have developed rules about whether certain acts are "good" or "bad," or "right" or "wrong."These rules, known as ethics, are inherently value judgments that have resulted from a consensus in society. Such rules are often expressed or supported by laws.
  • 15.
  • 16. 1. What trade-offs are associated with more stringent laws regarding personal privacy? Give an example. 2. What is spyware, and how is it often installed on a computer? 3. What is a Web bug? How does it collect data? 4. Why do we say that Internet communications data are unstructured? Does this statement mean they cannot be searched or integrated with other data?