Chapter 17 Legal, Ethical, and Social Impacts of EC.

Slides:



Advertisements
Similar presentations
Legal, Ethical, and Social Impacts of EC
Advertisements

Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Learning Objectives Understand the foundations for legal and ethical issues in EC. Describe intellectual property law and understand its adjudication.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 17 Legal, Ethical, and Compliance Issues in EC.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 7 The environment of electronic commerce: legal, ethical, and tax issues Joseph Mitchum and TsunSheng, Tao.
3 Ethics and Privacy.
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.
Intellectual Property
Technology Ethics, Computer Crime, Cybercrime, Hacking Tactics, Cyber Theft, Internet Abuses in the Workplace, Software Piracy, Theft of Intellectual Property,
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Chapter 5 Objectives After reading Chapter 5, you will be able to:
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 10 Intellectual Property Rights and the Internet Twomey Jennings.
Regulatory, Ethical, and Compliance Issues in EC.
Learning Objectives Understand the foundations for legal and ethical issues in EC. Describe civil, intellectual property, and common law. Understand legal.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
11/13/2012ISC329 Isabelle Bichindaritz1 Professional, Legal, and Ethical Concerns in Data Management.
Computer Legislation The need for computer laws Go to Contents.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Class Discussion Notes MKT April 10, 2001.
Chapter 17 E-Commerce and Digital Law
Copyright Basics. Intellectual Property Intellectual Property is a unique product or idea created by an individual or organization. Common types of protection.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 10 Intellectual.
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
E-Marketing/7E Chapter 5
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Copyright and Fair Use. Topics Intellectual Property What is Copyright? What is Fair Use? Common Violations Guidelines TEACH Act 2002.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
Copyright © 2015 Springer Education 1 Lecture 10 ReF: CH15 E-C OMMERCE : R EGULATORY, E THICAL, AND S OCIAL E NVIRONMENTS.
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
Legal, Ethical, and Social Impacts of EC.  Ethics: The branch of philosophy that deals with what is considered to be right and wrong  What is unethical.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
11-1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Software piracy and software patents
CHAPTER FOUR OVERVIEW SECTION ETHICS
Ethical, Social, and Political Issues in E-commerce
Ethical and Legal Issues
Legal and Ethical Issues in E-Commerce
E-Marketing/6E Chapter 5
E-Commerce: Regulatory, Ethical, and Social Environments
Learning Area 1 Information And Communication Technology and Society
Computers and the Internet
LEGAL TERMS IN DIGITAL MEDIA
Ethical Use of Computers
CHAPTER FOUR OVERVIEW SECTION ETHICS
Presentation transcript:

Chapter 17 Legal, Ethical, and Social Impacts of EC

Electronic CommercePrentice Hall © Learning Objectives 1.Describe the differences between legal and ethical issues in EC. 2.Understand the difficulties of protecting privacy in EC. 3.Discuss issues of intellectual property rights in EC. 4.Describe unsolicited ad problems and remedies.

Electronic CommercePrentice Hall © Learning Objectives 5.Describe major legal issues in EC. Describe the types of fraud on the Internet and how to protect against them. Describe representative societal issues in EC.

Electronic CommercePrentice Hall © Legal Issues Versus Ethical Issues ethics The branch of philosophy that deals with what is considered to be right and wrong

Electronic CommercePrentice Hall © Legal Issues Versus Ethical Issues The Major Ethical and Legal Issues Discussed in this Chapter –Privacy –Intellectual property rights and online piracy –Unsolicited electronic ads and spamming --Consumer and merchant protection against fraud

Electronic CommercePrentice Hall © Legal Issues Versus Ethical Issues EC Ethical Issues –Non-Work-Related Use of the Internet Employees are tempted to use and the Web for non-work-related purposes In some companies, this use is tremendously out of proportion with its work-related use The utility of monitoring employee usage can be considered “one of the most controversial EC issues”

Electronic CommercePrentice Hall © Legal Issues Versus Ethical Issues –Codes of Ethics: Useful guidelines for a corporate Web policy: Issue written policy guidelines about employee use of the Internet Make it clear to employees that they cannot use copyrighted trademarked material without permission Post disclaimers concerning content, such as sample code, that the company does not support Post disclaimers of responsibility concerning content of online forums and chat sessions

Electronic CommercePrentice Hall © Legal Issues Versus Ethical Issues Codes of Ethics: Useful guidelines for a corporate Web policy: –Make sure that Web content and activity comply with the laws in other countries –Make sure that the company’s Web content policy is consistent with other company policies –Appoint someone to monitor Internet legal and liability issues. –Have attorneys review Web content to make sure that there is nothing unethical, or illegal, on the company’s Web site

Electronic CommercePrentice Hall © Privacy privacy The right to be left alone and the right to be free of unreasonable personal intrusions Collecting Information about Individuals –Web Site Registration –Cookies –Spyware and Similar Methods –RFID’s Threat to Privacy –Privacy of Employees –Privacy of Patients

Electronic CommercePrentice Hall © Protection of Privacy –Notice/awareness –Choice/consent opt-out clause Agreement that requires computer users to take specific steps to prevent the collection of personal information opt-in clause Agreement that requires computer users to take specific steps to allow the collection of personal information

Electronic CommercePrentice Hall © Privacy Protection of Privacy –Access/participation –Integrity/security –Enforcement/redress

Electronic CommercePrentice Hall © Privacy The USA Patriot Act – and Internet searches –Nationwide roving wiretaps –Requirement that ISPs hand over more user information –Expanded scope of surveillance based on new definitions of terrorism –Government spying on suspected computer trespassers with no need for court order –Wiretaps for suspected violations of the Computer Fraud and Abuse Act

Electronic CommercePrentice Hall © Privacy The USA Patriot Act –Dramatic increases in the scope and penalties of the Computer Fraud and Abuse Act –General expansion of Foreign Intelligence Surveillance Act (FISA) authority –Increased information sharing between domestic law enforcement and intelligence –FISA detours around federal domestic surveillance limitations; domestic surveillance detours around FISA limitations

Electronic CommercePrentice Hall © Privacy Privacy Protection in Other Countries –In 1998, the European Union passed a privacy directive (EU Data Protection Directive) reaffirming the principles of personal data protection in the Internet age –The directive aims to regulate the activities of any person or company that controls the collection, storage, processing, or use of personal data on the Internet

Electronic CommercePrentice Hall © Intellectual Property Rights intellectual property Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce

Electronic CommercePrentice Hall © Intellectual Property Rights copyright An exclusive grant from the government that allows the owner to reproduce a work, in whole or in part, and to distribute, perform, or display it to the public in any form or manner, including over Internet Literary works Musical works Dramatic works Artistic works Sound recordings, films, broadcasts, cable programs

Electronic CommercePrentice Hall © Intellectual Property Rights Copyrights –Piracy of Software, Music, and Other Digitizable Material –Copyright Protection Approaches digital watermarks Unique identifiers embedded in digital content that make it possible to identify pirated works –Digital Rights Management

Electronic CommercePrentice Hall © Intellectual Property Rights trademark A symbol used by businesses to identify their goods and services; government registration of the trademark confers exclusive legal right to its use –Domain Name Disputes and Resolutions cybersquatting The practice of registering domain names in order to sell them later at a higher price

Electronic CommercePrentice Hall © Intellectual Property Rights patent A document that grants the holder exclusive rights to an invention for a fixed number of years Fan and Hate Sites cyberbashing The registration of a domain name that criticizes an organization or person

Electronic CommercePrentice Hall © Unsolicited Electronic Ads: Problems and Solutions Spamming unsolicited commercial (UCE) The use of to send unwanted ads or correspondence –What Drives UCE? Many spammers are just trying to get people’s financial information

Electronic CommercePrentice Hall © Unsolicited Electronic Ads: Problems and Solutions –Why It Is Difficult to Control Spamming Spammers send millions of s, shifting Internet accounts to avoid detection Spammers use different methods to find their victims –Solutions to Spamming Junk-mail filters Automatic junk-mail deleters Blocking certain URLs and addresses

Electronic CommercePrentice Hall © Exhibit 17.1 How Spam Blockers Work

Electronic CommercePrentice Hall © Unsolicited Electronic Ads: Problems and Solutions Spamming –Anti-spam Legislation Do-not-spam lists Protecting employees

Electronic CommercePrentice Hall © Unsolicited Electronic Ads: Problems and Solutions Protecting against Pop-Up Ads –Pop-Up stoppers Concluding Remarks –The spam situation has not yet been resolved. However, it seems that both spamming and pop-ups are not increasing, and they may even be declining

Electronic CommercePrentice Hall © EC Fraud and Consumer and Seller Protection Fraud on the Internet –Online Auction Fraud –Internet Stock Fraud –Other Financial Fraud

Electronic CommercePrentice Hall © EC Fraud and Consumer and Seller Protection Fraud on the Internet –Identity Theft and Phishing identity theft A criminal act in which someone presents himself (herself) as another person and uses that person’s social security number, bank account numbers, and so on, to obtain loans, purchase items, make obligations, sell stocks, etc.

Electronic CommercePrentice Hall © EC Fraud and Consumer and Seller Protection Consumer Protection –Third-Party Assurance Services TRUSTe’s “Trustmark” Better Business Bureau WHICHonline Web Trust Seal and Others Online Privacy Alliance Evaluation by Consumers –Authentication and Biometric Controls

Electronic CommercePrentice Hall © EC Fraud and Consumer and Seller Protection Seller Protection –Customers who deny that they placed an order –Customers who download copyrighted software and/or knowledge and sell it to others –Customers who give false payment (credit card or bad checks) information in payment for products and services provided –Use of their name by others –Use of their unique words and phrases, names, and slogans and their Web addresses by others

Electronic CommercePrentice Hall © EC Fraud and Consumer and Seller Protection What can Sellers Do? –Use intelligent software to identify possibly questionable customers –Identify warning signals for possibly fraudulent transactions –Ask customers whose billing address is different from the shipping address to call their bank and have the alternate address added to their bank account

Electronic CommercePrentice Hall © Societal Issues digital divide The gap between those who have and those who do not have the ability to access electronic technology in general, and the Internet and EC in particular Other Societal Issues –Education –Public safety, criminal justice, and homeland security –Health aspects