Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-1 Internet Marketing Intelligence Chapter 12.

Slides:



Advertisements
Similar presentations
Chapter 15 Legal & Ethical Issues
Advertisements

Dubai Conference May 2004 Molengraaff Institute Center for Intellectual Property Law (CIER) 2 WIPO NATIONAL SEMINAR ON INTELLECTUAL PROPERTY FOR FACULTY.
CHAPTER 4 E-ENVIRONMENT
IRMA Anti-Piracy Compliance Programme. What is IRMA? International Recording Media Association IRMA developed the Anti-Piracy Compliance Programme in.
Margie Milam Senior Policy Counselor ICANN 1 ( All views expressed are my own)
Chapter 7 The Environment of Electronic Commerce: International, Legal, Ethical, and Tax Issues.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Creating a Winning E-Business Second Edition
Creating a Winning E-Business Second Edition Operating Your E-Business Chapter 5.
The Cape Town Convention’s International Registry: Decoding the Secrets of Success in Global Electronic Commerce Roksana Moore Soton Oxford University.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Intellectual Property
Internet Piracy and its Effects on Business By Eric Kutcher.
1 Intellectual Property Includes the results of intellectual activities in the arts, sciences, and industry Includes the results of intellectual activities.
Intellectual Property Boston College Law School January 31, 2007 Copyright – Indirect Liability.
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
C4- Social, Legal, and Ethical Issues in the Digital Firm
1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Business Law Chapter 13: Business Law in the Internet Era.
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
Chapter 17 E-Commerce and Digital Law
COMPUTER ETHICS Owda Shaqalih Hussam Hamada Nedal ALshorafa.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Chapter Twelve: Computer Ethics and the Internet Review
Monitoring Employees on Networks: Unethical or Good Business?
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
 Ethics is a broad philosophical concept that goes beyond simple right and wrong, and looks towards "the good life".  Cyber Ethics deals with the philosophy.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Overview: Electronic Commerce Electronic Commerce, Seventh Annual Edition.
Copyrights on the internet vincent yee. Digital Millennium Copyright Act October 28, 1998, President Clinton signed the Act into law.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
Chapter 1 Overview of Electronic Commerce. Learning Objectives 1. Define electronic commerce (EC) and describe its various categories. 2. Describe and.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
ELC 200 Day 21. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 Agenda Assignment #7 ed to you in WebCt –Due April 9 at the beginning.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
The Place of Cyberlaw in the MSIS Curriculum Ramesh Subramanian Bruce White Quinnipiac University.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Chapter 9: Internet Law, Social Media, and Privacy
Date: March. 30, Monday Evening.
Ogletree, Deakins, Nash, Smoak & Stewart PC
Ethical, Social, and Political Issues in E-commerce
Ethical and Legal Issues
This is the prescribed textbook for your course.
Computers: Tools for an Information Age
E-Marketing/6E Chapter 5
E-Commerce: Regulatory, Ethical, and Social Environments
Essentials of the legal environment today, 5e
Chapter 15 Legal & Ethical Issues
Presentation transcript:

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-1 Internet Marketing Intelligence Chapter 12 Ethical Concerns and Legalities

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-2 Objectives Provide understanding of the current debate as to whether information transmitted through the Internet should be controlled. Examine the significance of providing security and protection for data transmitted through the Internet and the strengths and weaknesses of various measures proposed for this purpose. Give an understanding of the magnitude of fraud on the Internet and action proposed to provide protection to consumers and minimise losses to the industry.

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-3 Objectives (cont.) Outline the unique characteristics of digital technology that have caused difficulties in the enforcement of existing copyright laws. Discuss the proposed action to curtail copyright infringements on the Internet. Provide an understanding of defamation on the Internet and legal issues in the enforcement of existing laws. Develop an understanding of the debate over transmission of pornographic and offending material on the Internet and action proposed to keep children away from such material.

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-4 Key Topics Control Security Intellectual property and copyright Consumer protection Corporate protection and ISPs Obscenity Privacy

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-5 Control Slightly different lookconsumer perspective Should the content of the Internet be controlled? Unique features: Rapid growth Multiplicity of communication channels Enormous volume of information Ease of trans-border transactions Early pioneers (churches and jails) Should this new revolution stay unregulated?

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-6 Security Theory is that this is the issue that will limit the effectiveness of the Internet as a commercial medium Hackers abound Perception is that it is unsafe

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-7 Intellectual Property and Copyright Copyright protects intellectual property Copyright automatically belongs to the creator or owner from time of creation Copying intellectual information easier than ever distribution to mass in a few keystrokes Internet allows pseudo-anonymity or anonymity Barriers are difficult to set up and liability harder Estimates: PC uses three software packages half the global market for software is pirated

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-8 Consumer Protection 2000 Top 10 Frauds Online Auctions………………… % General Merchandise Sales… % Internet Access Services…….….…..3% Work-At-Home………………….…....3% Advance Fee Loans…………….…...2% Computer Equipment/Software…….1% Nigerian Money Offers……………...1% Information Adult Services………….1% Credit Card Offers…………………...5% Travel/Vacations……………………..5% Source:

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest 12-9 Corporate Protection Companies with access need to set up policies Uploading of defamatory materials a dismissable offence Include formal copyright notices on Internet Register corporate name and trademarks as addresses Local networks monitored to remove offending material

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest ISPs Responisbility for compliance/enforcement is increasingly falling on ISP Other suggestions are: information providers should be primarily responsible ISPs should be held to a contributory standard ISP liable if they know and have time to remove information can be used for legitimate purposes Use of header-based systems on each up- loaded file or document: permitted use, price for each use, authentication information etc.

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest Obscenity/Pornography Issues Free speech versus child protection Free enterprise versus social good Online pornography huge and growing Are ISPs carriers or providers? (phone company) When is the material published?

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest Privacy Defined as: right not to be disturbed right to be anonymous right not to be monitored right not to have identifying information exploited Industry should adopt (and enforce?) voluntary codes to deal with the privacy concerns of users: marketers should provide a policy statement allow for consumer limit of information responsible use of unsolicited advertisements need to be clearly identified

Copyright 2003 McGraw-Hill Australia Pty Ltd PPTs t/a Internet Marketing Intelligence by Edward Forrest Summary The Internet has raised a myriad of ethical, legal and moral concerns. At the forefront of the debate are such issues as: how to protect freedom of expression while keeping users safe. defining the responsible party or parties when a law is broken. how to enforce legislation in a medium without boundaries