KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Victoria ISD Common Sense Media Grade 6: Scams and schemes
The Internet.
Breaking Trust On The Internet
What is identity theft, and how can you protect yourself from it?
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Marketing in the Internet Age
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets REMINDER: Project 1 due tonight.
Today’s Strategic Imperative: E-Business Jeremy Malley BSAD – 145 Ch February 2002.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Electronic Commerce Systems
Company LOGO Internet Safety A Community Approach.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
How It Applies In A Virtual World
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
E-Commerce Systems Chapter 8
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
CHAPTER 3 Ethics and Privacy. Outline for Today Chapter 3: Ethics and Privacy Tech Guide: Protecting Information Assets.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Security, Social and Legal Issues Regarding Software and Internet.
WHAT IS E-BUSINESS? Conducting business via the Internet. Capabilities and Benefits of E-Business Global reach, personalization, interactivity, right-time.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Optimal Database Marketing Drozdenko & Drake,
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Topic 5: Basic Security.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
CHAPTER 6 Concept of Virtual Store for Marketing Products and Services.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
BY CONOR DALY Public Trust Online. What is E-commerce? The buying and selling of products and services by businesses and consumers through an electronic.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Learn how to protect yourself against common attacks
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Year 10 ICT ECDL/ICDL IT Security.
Cybersecurity Awareness
Big Data Considerations
Computer Security.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses

Introduction E-businesses are electronic business activities and technology that is meant to supplement or improve a company or establishment Examples of e-businesses are any business who use the internet to sell products and conduct transactions such as Amazon, TigerDirect, and EBay It is a beneficial concept but there are many people who take advantage of the anonymity of this vessel and conduct unethical behavior

E-business Growth

Theft Theft is a huge issue concerning e-business and the biggest item that is a target for online thieves is the customer’s personal information When making a purchase online, it is required that you submit your personal information including address and credit card and billing information at least once to complete the transaction A customer’s sensitive data can be visible for others to see; making them a target for skilled hackers to acquire if a business is not up to date on their security software.

Theft (cont’d) Phishing is another consequence of one’s information being visible on the internet. By gaining someone’s , a scam artist can send fraudulent s claiming to be an organization that requires you to send them your password and/or personal and account information due to an “urgent matter”. “the s look and sound official, and often contain graphics stolen from the company or organization from which the message claims to originate” which makes this attack hard to recognize. This explains why some of the employees at Central in module 9 fell for this scam which could’ve been detrimental

Theft (cont’d) The best way to protect yourself from falling prey to this cybercrime is to do proper research on a business before making a purchase and entrusting your personal data to them and do not blindly click on links or s you do not recognize or completely trust.

Poor Service Poor service is another ethical issue that occurs in e- businesses. Due to the anonymity of the internet, some businesses accept a customer’s payment and ship them damaged goods or products that were not agreed upon during the transaction Corrupt businesses get away with this offense because after an online order has been made, they shut down communication with the customer Most businesses even continue to scam other buyers by taking down the site they originally had and creating an entirely new one with new contact information and products.

Lack of Privacy The ethical issue of the lack of consumer privacy is similar to a double edged sword; specifically regarding big data Big data is a term used when businesses monitor patterns and online behavior of users without their knowledge and use the acquired knowledge to tailor their sites and advertisements to the user by only displaying content they think the user would have interest in.

Lack of Privacy (cont’d) Some would say this is just a form of marketing that is beneficial to both the business and consumer Those who do not support this concept would argue that it is still and invasion of privacy whether it has benign intentions behind it or not.

Amazon

Amazon is a largely popular e-business that dominates other businesses as it makes itself transparent to its users, gaining the trust of its customers The company leads by example with its easily understandable privacy statements and efforts to protect users’ information online by having state of the art software and suggestions for users to perform safe practices such as deleting cookies and updating their customer profiles

conclusions electronic business is a great addition to the traditional way of conducting trade and has opened many doors of opportunities in the world today But business online makes a customer is much more likely to be susceptible to identity theft and poor service as well as invasions of privacy A way to protect oneself is to not be naïve when shopping online and do proper research on a company before sharing sensitive information with them and entrusting payment for a product

references “Cyber Crime | Business Identity Theft.” Cyber Crime | Business Identity Theft. ITPA. N.d. Web. 09 Apr PLC Copyright Sophos. Security Threat Report: 2009 (n.d.): n. pag Web. 9. Apr Streissguth, Tom. “The Ethical Problems in E-Business.” Small Business. Houston Chronicle. N.d. Web 09 Apr "Vertical Learning Curve." Vertical Learning Curve. N.p., n.d. Web. 09 Apr Smith, Nicole. "Potentially Abusive or Unethical Situations in E-Commerce." Article Myriad. N.p., 7 Dec Web. 22 Apr Angelova, Jay Yarow and Kamelia. "CHART OF THE DAY: Amazon Runs Away With Retailing Pt. II." Business Insider. Business Insider, Inc, 13 Apr Web. 22 Apr "11 Charts That Reveal How E-Commerce Is Shifting." The Percolate Blog. N.p., 17 Sept Web. 22 Apr