Public Trust Online Michael Crowley N00114946 DL 245 Year 2 Business Entrepreneurship and Management.

Slides:



Advertisements
Similar presentations
The impact of IT Around the world By Eddie Cole. The positive social impacts of IT Social networking sites are huge now, bringing in hundreds of millions.
Advertisements

Safety Internet safety By Daria Morgan And Elin Tuckwood.
Don’t be bullied, or be a bully.
Internet Online Safety How to have FUN and Stay in Control.
Misleading Advertising. The Truth, whole Truth and nothing but the Truth An advertisement must not mislead the public as it may cause harm, for example.
 Identity theft is the taking of one’s personal information and using it for yourself. Usually for illegal reasons. Though its all illegal if you even.
What is identity theft, and how can you protect yourself from it?
Developing a Social Media Strategy Ashley Schaffer Ebe Randeree For Your Organization.
This week is anti-bullying week.
Using internet and cell phones safely
Netiquette Rules.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Dell Rob Rochester. Dell Dell is the industry leader in direct sale of personal computers to consumers. Since its start Dell has looked to over simplify.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
SEARCHING ON THE INTERNET
E-Safety Quiz Keeping safe online! A guide for parents & children.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
What kind of media institution might distribute your media product and why? By Jess Knight Question 3.
Melissa Harrigan. Podcasts Podcasts are mini-broadcasts that can be viewed on the internet or downloaded to MP3 players It’s the new way to watch TV or.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
Social impacts of the use of it By: Mohamed Abdalla.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
PERSONAL FINANCE Unit 3: Financial Responsibility and Money Management.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
PRIVACY BOOTCAMP YpJU.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
ICT Impact on Society By Charlotte Lee 7A2. Introduction The impact on society is very great. With all the new gadgets and devices, the world cant live.
AQA GCSE Business Studies
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Conducting Research on the Web. This presentation will teach you about:  Different types of search engines  How to search on the Internet  How to cite.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
Task 1 Research on any 2 of the following: Online shopping Online banking Web broadcasting Social networking sites Discuss the disadvantages and advantages.
P ERSUASIVE WRITING Advertising. W HAT IS ADVERTISING ? Advertising is a tool used to get people to want to buy something. The main reason ads are created.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Wading Through the Web Conducting Research on the Internet.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Wading Through the Web Conducting Research on the Internet Adapted from presentation on ReadWriteThink.com, developed by Sarah Dennis-Shaw.
ITC Summer I Table of Contents Glossary of terms Glossary of terms Safety Tips Quiz Credits Standards Multimedia Connections Multimedia.
Wading Through the Web Conducting Research on the Internet.
Internet Safety Internet Safety LPM
 Web 2.0 site lets people interact and help each other in in the media dialogue as creators that put the information in the virtual community.
EVALUATION QUESTION 3 What kind of media institution might distribute your media product and why? The Driver Myles Ahwal.
Internet Safety By: Justin, Jack, Mike. Tip #1 Don’t agree to everything you see on the internet. EX- There will be a lot of people that like to sell.
The Impact of Communication Technology CMT 11 Fundamentals.
Dangers of Online Media and Social Networking By: Micah Cochrane Maurice Gamble Shenne Howell Elvyn Morales.
Research and the Internet. Reference Books An Encyclopaedia is good to use When looking for background information on a topic When trying to find key.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Internet Social Networking Etiquette. What is meant by it? Internet social networking network etiquette is a understanding of how it is appropriate to.
New Networking Strategies How to Develop Your Business and Build Sales Through Social Media Shaa Wasmund.
This is Facebook and twitter that you can go on when you are at home but school monitor what you go on in school so they put a ban on it other people can.
WALT use the internet to find information. WILF Use safe internet surfing skills How to narrow a search What to do if your find something inappropriate.
Wading Through the Web Conducting Research on the Internet Adapted on 9/3/09 from:
Wading Through the Web Conducting Research on the Internet.
CHAPTER ONE. SOCIAL MEDIA using it to locate new hires 94% of 18 to 34 year-olds found their last job through a social network 73% over 50% of employers.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Safer Internet Day. What do you use the Internet for? watching TV shows watching online videos playing gamestalking to friends homeworkfinding out things.
YEAR 6’S GUIDE TO STAYING SAFE ON THE INTERNET. CHATTING When you are chatting to people online, try not to give out any personal information about yourself.
The influence of the Internet on our life. Positive  A lot of information  Communication  Education  Entertainment  Shopping Negative  Addiction.
An objective Cashcrate Review. Can I make money with Cashcrate?
Wading Through the Web Conducting Quality Research on the Internet.
Online Shopping: Research Paper Eimear Greene. My Objectives Why People shop online How Online retail has changed What category of product do people shop.
BY CONOR DALY Public Trust Online. What is E-commerce? The buying and selling of products and services by businesses and consumers through an electronic.
Ways To Get More Traffic To Your Wordpress Ecommerce Website.
Wading Through the Web Conducting Research on the Internet
Privacy or Security Are they the same?
Wading Through the Web Conducting Research on the Internet
Presentation transcript:

Public Trust Online Michael Crowley N DL 245 Year 2 Business Entrepreneurship and Management

Company's Perspective  Small companies websites would not be well known enough to trust so they use larger more trusted distributors. E.g. Boots.  large companies such as amazon and eBay have large budgets to spend in online security.  Many solely online companies sell highly specialised products which would not be usually available in department stores.  Larger online companies need better online security systems because they get hacked more often

Publics Perspective  People can be tracked online and this can be used against them as a form of spying..  People may be in the public eye and may have previously said or written something out of context or under the influence used to harm their image.  People may be at danger of online money scams.  There are people who disguise themselves as others online through robbery of photographs to forge false relationships to use to their advantage.

Social Networking  Facebook and other social networking sites link themselves with popular websites by asking people to register with the popular website through Facebook. This allows Facebook to view what you personally do on the other website gathering information about you.  This is dangerous as it would be harmful for any of these websites to get hacked because most peoples online activity is interlinked. This brings to reality the fact that anything put on the internet stays forever and that you must be careful what you write as it could be harmful to your own interests in the future.

Terms and Conditions  Some people do not shop online because there are so many terms and conditions of every purchase that the convenience of it is lost through reading these terms.  Though many people just ignore these and agree anyway which is dangerous because terms and conditions are legal documents and agreeing to them obliges you to follow what they say or you may be penalised.  An example of terms and conditions being used against the interests of the public is when Flickr recently added a creative commons licencing agreement into its terms and conditions which allows it to sell and do what it wants with any of the photos from people who agree to that. This has resulted in tens of millions of photos being made available on yahoo for reuse and reposting by Flickr..

Trusting V.s Risk Taking  Trust is defined as ‘’the willingness of a party to be vulnerable to the actions of another party based on the expectation that the other will perform a particular action important to the trust or, irrespective of the ability to monitor or control the other party’’ (Mayer et al., 1995 p.712).  Trusting behaviour is taking a risk within a relationship. For example I like coca cola products so if they would bring out a new drink I would try it because I trust they know how to make good drinks, whereas  Risk Taking behaviour is the same but without being part of a relationship, so if a company you have never heard before wanted you to buy their new drink you are more likely not to because you have no reason to trust them.

Reasons for People to have trust issues online  When going onto certain websites such as ‘’let me watch this’’ (a popular free movie streaming site) there is a high likelihood of viruses attacking your computer  False misleading advertisements ‘’you are todays winner’’  Not having the product in hand can be a problem as the website may have gotten the size wrong or the list of ingredients wrong and you may be allergic to it or it might not be exactly what you expected.  Websites not telling the full truth about a product and getting away with it because they are technically not telling lies. This lets them make the products out to be better than they are.

Reasons for people to have trust issues online  Reviews about products and services which may conflict with what is advertised. For example a person reviewing a moisturising shampoo and saying it is drying,  and conflicting reviews themselves, so one review saying something is great and another saying the opposite about the same product.  Fake reviews made up by company workers lying and saying how great their products/services are.

Reasons for people to have trust issues online  People may not trust the delivery service which the producers of said product use and they are afraid that the product may get lost or might be broken by the time it gets to them.  People may not trust websites to be 100% up to date. For example they might state something as out of stock when in fact it may have been in stock or vice versa.

Questionnaire Findings  1. Everyone who answered was between the ages of 18 and 24  2. Most people would not buy from a website that gave their computer viruses and rightly so.  3. Everyone who answered had made an online purchase showing it is popular among younger people  4. Most peoples amount of online shopping has increased in the last 5 years  5. Half people believe what they read online and the other half do not because they know anyone could post up lies on Wikipedia  6. Most people read product reviews before purchasing online. This is to get an idea weather what you are buying is truly or falsely advertised

Bibliography  Ruppel, C., Underwood-Queen, L., & Harrington, S. (2003). e-Commerce: The Roles of Trust, Security, and Type of e-Commerce involvement. e-Service journal, Volume 2, pp Retrieved from Project Muse database.  Grabner, S. (2002). The Role of Consumers Trust in Online Shopping. Journal of Business Ethics, Volume 39, Issue 1-2, pp Retrieved from Springer Link Database.  Duhe, S. (2007). New Media and Public Relations. USA:New York: 29 Broadway  Pavoul, P., Gefen, D. (2002). Building effective online marketplaces with Institution-Based Trust. Information on system research, Volume 4. Retrieved from informs.org.  Newser-Read less know more. (2013). Amateur Photos hit the big time online. (2009). Retrieved from the-big-time-online.htmlhttp:// the-big-time-online.html  Survey Monkey. (2013). Public Trust Online Survey. (2013). Retrieved from  Flickr Photos now show up in yahoo image searches, retrieved January 12 th 2013, from guide#Web_documents_and_siteshttp:// guide#Web_documents_and_sites  Argos sign, Amazon customer review photo, Anti wrinkle cream photo, Coca- Cola sign, Photo of glasses on book, Facebook logo, Undercover Detectives, Computer in chains cartoon, (2013), Retrieved from