Privacy - Dl4a.org

advertisement
Chapter 17
Legal, Ethical, and Social Impacts of EC
Legal Issues Versus Ethical Issues
ethics
The branch of philosophy that deals with what is
considered to be right and wrong
The Major Ethical and Legal Issues Discussed in this
Chapter






Privacy
Intellectual property rights and online piracy
Unsolicited electronic ads and spamming
Free speech versus censorship
Consumer and merchant protection against fraud
Legal Issues Versus Ethical Issues

EC Ethical Issues

Non-Work-Related Use of the Internet



Employees are tempted to use e-mail and the Web for nonwork-related purposes
In some companies, this use is tremendously out of
proportion with its work-related use
The utility of monitoring employee usage can be considered
“one of the most controversial EC issues”
Legal Issues Versus Ethical Issues
Codes of Ethics: Useful guidelines for a corporate Web policy:










Issue written policy guidelines about employee use of the Internet
Make it clear to employees that they cannot use copyrighted
trademarked material without permission
Post disclaimers concerning content, such as sample code, that the
company does not support
Post disclaimers of responsibility concerning content of online forums
and chat sessions
Make sure that Web content and activity comply with the laws in other
countries
Make sure that Web content and activity comply with the laws in other
countries
Make sure that the company’s Web content policy is consistent with
other company policies
Appoint someone to monitor Internet legal and liability issues.
Have attorneys review Web content to make sure that there is nothing
unethical, or illegal, on the company’s Web site
Privacy
privacy
The right to be left alone and the right to be free of
unreasonable personal intrusions
Collecting Information about Individuals







Web Site Registration
Cookies
Spyware and Similar Methods
RFID’s Threat to Privacy
Privacy of Employees
Privacy of Patients
Privacy

Protection of Privacy


Notice/awareness
Choice/consent
opt-out clause
Agreement that requires computer users to take specific steps to
prevent the collection of personal information
opt-in clause
Agreement that requires computer users to take specific steps to
allow the collection of personal information



Access/participation
Integrity/security
Enforcement/redress
Privacy

The USA Patriot Act






E-mail and Internet searches
Nationwide roving wiretaps
Requirement that ISPs hand over more user
information
Expanded scope of surveillance based on new
definitions of terrorism
Government spying on suspected computer
trespassers with no need for court order
Wiretaps for suspected violations of the Computer
Fraud and Abuse Act
Privacy

The USA Patriot Act




Dramatic increases in the scope and penalties of the
Computer Fraud and Abuse Act
General expansion of Foreign Intelligence
Surveillance Act (FISA) authority
Increased information sharing between domestic law
enforcement and intelligence
FISA detours around federal domestic surveillance
limitations; domestic surveillance detours around
FISA limitations
Privacy

Privacy Protection in Other Countries


In 1998, the European Union passed a privacy
directive (EU Data Protection Directive) reaffirming
the principles of personal data protection in the
Internet age
The directive aims to regulate the activities of any
person or company that controls the collection,
storage, processing, or use of personal data on the
Internet
Intellectual Property Rights
intellectual property
Creations of the mind, such as inventions, literary and
artistic works, and symbols, names, images, and
designs, used in commerce
Intellectual Property Rights
copyright
An exclusive grant from the government that allows the owner to
reproduce a work, in whole or in part, and to distribute, perform, or
display it to the public in any form or manner, including over Internet





Literary works
Musical works
Dramatic works
Artistic works
Sound recordings, films, broadcasts, cable programs
Intellectual Property Rights

Copyrights



Piracy of Software, Music, and Other Digitizable
Material
Copyright Protection Approaches
digital watermarks
Unique identifiers embedded in digital content that
make it possible to identify pirated works
Digital Rights Management
Intellectual Property Rights
trademark
A symbol used by businesses to identify their goods and
services; government registration of the trademark
confers exclusive legal right to its use

Domain Name Disputes and Resolutions
cybersquatting
The practice of registering domain names in order to sell
them later at a higher price
Intellectual Property Rights
patent
A document that grants the holder exclusive rights to an
invention for a fixed number of years

Fan and Hate Sites
cyberbashing
The registration of a domain name that criticizes an
organization or person
Unsolicited Electronic Ads:
Problems and Solutions

E-Mail Spamming

unsolicited commercial e-mail (UCE)
The use of e-mail to send unwanted ads or
correspondence
What Drives UCE?
Many spammers are just trying to get people’s financial
information
Unsolicited Electronic Ads:
Problems and Solutions

Why It Is Difficult to Control Spamming



Spammers send millions of e-mails, shifting Internet
accounts to avoid detection
Spammers use different methods to find their victims
Solutions to Spamming



Junk-mail filters
Automatic junk-mail deleters
Blocking certain URLs and e-mail addresses
Exhibit 17.1 How Spam Blockers Work
Unsolicited Electronic Ads:
Problems and Solutions
E-Mail Spamming


Anti-spam Legislation

Do-not-spam lists

Protecting employees
Protecting against Pop-Up Ads


Pop-Up stoppers
Concluding Remarks


The spam situation has not yet been resolved. However, it
seems that both e-mail spamming and pop-ups are not
increasing, and they may even be declining
Free Speech Versus Censorship
and Other Legal Issues



On the Internet, censorship refers to government’s
attempt to control, in one way or another, the material
that is presented
“Donham’s First Law of Censorship.” This semiserious
precept states: “Most citizens are implacably opposed to
censorship in any form—except censorship of whatever
they personally happen to find offensive.”
Children’s Online Protection Act (COPA) exemplifies the
protective approach
Free Speech Versus Censorship
and Other Legal Issues

Electronic Contracts

A legally binding contract requires a few basic elements: an
offer, acceptance, and consideration
These requirements are difficult to establish when the human
element in the processing of the transaction is removed and
the contracting is performed electronically

Intelligent Agents and Contracts

Uniform Computer Information Transactions Act ( 2000), makes
clear that contracts can be formed even when a human is not
directly involved

Taxing Business on the Internet
This issue is extremely important because it is related to global
EC, as well as to fairness in competition when EC competes
with off-line marketing channels, which requires the collection of
taxes
Free Speech Versus Censorship
and Other Legal Issues
The Tax-Exemption Debate




The Internet Tax Freedom Act 1(998) sought to promote ecommerce through tax incentives, by barring any new state or
local sales taxes on Internet transactions until October 2001
The U.S. Congress extended the tax moratorium until 2006,
giving it time to digest the contents of the report and hash out
contentious tax issues
Proposed Taxation in the United States


The National Governors’ Association, the National League of Cities,
and the U.S. Conference of Mayors fought the Tax Free Bill for the
Internet
The U.S. Congress blocked state and local governments from
taxing connections that link consumers to the Internet, at least until
November 2007
EC Fraud and
Consumer and Seller Protection

Fraud on the Internet



Online Auction Fraud
Internet Stock Fraud
Other Financial Fraud
EC Fraud and
Consumer and Seller Protection

Fraud on the Internet

Identity Theft and Phishing
identity theft
A criminal act in which someone presents himself (herself)
as another person and uses that person’s social security
number, bank account numbers, and so on, to obtain
loans, purchase items, make obligations, sell stocks, etc.
EC Fraud and
Consumer and Seller Protection

Consumer Protection


Third-Party Assurance Services
 TRUSTe’s “Trustmark”
 Better Business Bureau
 WHICHonline
 Web Trust Seal and Others
 Online Privacy Alliance
 Evaluation by Consumers
Authentication and Biometric Controls
EC Fraud and
Consumer and Seller Protection

Seller Protection





Customers who deny that they placed an order
Customers who download copyrighted software
and/or knowledge and sell it to others
Customers who give false payment (credit card or
bad checks) information in payment for products and
services provided
Use of their name by others
Use of their unique words and phrases, names, and
slogans and their Web addresses by others
EC Fraud and
Consumer and Seller Protection

What can Sellers Do?



Use intelligent software to identify possibly
questionable customers
Identify warning signals for possibly fraudulent
transactions
Ask customers whose billing address is different from
the shipping address to call their bank and have the
alternate address added to their bank account
Societal Issues
digital divide
The gap between those who have and those who do not
have the ability to access electronic technology in
general, and the Internet and EC in particular

Other Societal Issues



Education
Public safety, criminal justice, and homeland security
Health aspects
Virtual (Internet) Communities
virtual (Internet) community
A group of people with similar interests who interact with
one another using the Internet

Characteristics of Communities
One possibility is to classify members as traders,
players, just friends, enthusiasts, or friends in need
Virtual (Internet) Communities
Commercial Aspects of Communities
1.
2.
3.
4.
5.
Search communities
Trading communities
Education communities
Scheduled events
communities
Subscriber-based
communities
6.
7.
8.
9.
10.
Community consulting firms
E-mail-based communities
Advocacy communities
CRM communities
Mergers and acquisitions
activities
Virtual (Internet) Communities
Types of Virtual Communities





Transaction
Purpose or interest
Relations or practice
Fantasy
Financial Viability of Communities: Revenue model of
communities can be based on:






Sponsorship
Membership fees
Sales commissions
Advertising
Combination of these
Exhibit 17.5 Value Creation in
Electronic Communities
Virtual (Internet) Communities
Eight critical factors for community success:
1.
2.
3.
4.
Increase traffic and participation
in the community
Focus on the needs of the
members; use facilitators and
coordinators
Encourage free sharing of
opinions and information—no
controls
Obtain financial sponsorship.
This factor is a must. Significant
investment is required
5.
6.
7.
8.
Consider the cultural environment
Provide several tools and
activities for member use;
communities are not just
discussion groups
Involve community members in
activities and recruiting
Guide discussions, provoke
controversy, and raise sticky
issues. This keeps interest high
Virtual (Internet) Communities
Key Strategies for Successful Online Communities
1.
2.
3.
4.
5.
6.
Handle member data sensitively
Maintain stability of the Web site with respect to the consistency of
content, services, and types of information offered
Provide fast reaction time of the Web site
Offer up-to-date content
Offer continuous community control with regard to member
satisfaction
Establish codes of behavior (netiquette/guidelines) to contain
conflict potential
The Future of EC

Nontechnological Success Factors








Internet Usage
Opportunities for Buying
M-Commerce
Purchasing Incentives
Increased Security and Trust
Efficient Information Handling
Innovative Organizations
Virtual Communities
The Future of EC

Nontechnological Success Factors









Payment Systems
B2B EC
B2B Exchanges
Auctions
Going Global
E-Government
Intra-business EC
E-Learning
EC Legislation
The Future of EC

EC Technology Trends








Clients
Embedded Clients
Wireless Communications and M-Commerce
Pervasive Computing
Wearable Devices
RFID
Servers and Operating Systems
Networks
The Future of EC

EC Technology Trends








EC Software and Services
Search Engines
Peer-to-Peer Technology
Integration
Web Services
Software Agents
Interactive TV
Tomorrow’s Internet
The Future of EC

EC Technology Trends
utility computing
Computing resources that flow like electricity on demand from
virtual utilities around the globe—always on and highly
available, secure, efficiently metered, priced on a pay-as-youuse basis, dynamically scaled, self-healing, and easy to manage

Grid Computing coordinates the use of a large
number of servers and storage, acting as one
computer
The Future of EC

Integrating the Marketplace with Marketspace



Probably the most noticeable integration of the two
concepts is in the click-and-mortar organization
A major problem with the click-and-mortar approach
is how the two outlets can cooperate in planning,
advertising, logistics, resource allocation, and so on
and how the strategic plans of the marketspace and
marketplace can be aligned
The impact of EC on our lives will be as much as,
and possibly more profound than, that of the
Industrial Revolution
Download