© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.

Slides:



Advertisements
Similar presentations
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Chapter 11 – Section 4-5.  Techniques use to Access the network  War Driving or access point mapping ▪ Individuals attempt to detect wireless network.
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
BGS Customer Relationship Management Chapter 13 Privacy and Ethics Considerations Chapter 13 Privacy and Ethics Considerations Thomson Publishing 2007.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
How to avoid Viruses and Malware on your Computer Use a firewall Using a firewall is like locking the front door to your house—it helps keep intruders.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Privacy as an International Information Issue MD823 October 18, 2004.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
E-Commerce: Regulatory, Ethical, and Social Environments
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
How It Applies In A Virtual World
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer Programming I
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
INTERNET MARKETING : INTEGRATING ONLINE AND OFFLINE STRATEGIES Chapter 4 The Direct and Database Foundations of Internet Marketing.
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Class Discussion Notes MKT April 10, 2001.
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
WHAT IS E-BUSINESS? Conducting business via the Internet. Capabilities and Benefits of E-Business Global reach, personalization, interactivity, right-time.
INTERNET MARKETING: INTEGRATING ONLINE AND OFFLINE STRATEGIES
© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.
As defined in the Generally Accepted Privacy Principles, “privacy” refers to the rights and obligations of individuals and organizations with respect to.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Computer Ethics Chapter 14 – Computers: Understanding Technology.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Chapter 04 E-Marketing and Customer Relationship Management Part Two Using Technology for Customer Relationships in a Global Environment.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security Keeping you and your computer safe in the digital world.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Managing Windows Security
MGMT 452 Corporate Social Responsibility
Social & Regulatory: Privacy, Security& intellectual Property
Legal and Ethical Issues in E-Commerce
E-Commerce: Regulatory, Ethical, and Social Environments
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Marketing in Today’s Economy
Presentation transcript:

© 2008 Thomson, a part of the Thomson Corporation. Thomson, the Star logo, and Atomic Dog are trademarks used herein under license. All rights reserved.

INTERNET MARKETING : INTEGRATING ONLINE AND OFFLINE STRATEGIES Chapter 12 Social and Regulatory Issues: Data Privacy, Security and Intellectual Property

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 3 -What Are Your Concerns About The Privacy Of Your Personal Data? -What Concerns Do Your Family And Friends Have?

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 4 ATTITUDES/ACTIONS VARY BY COUNTRY SEARCH “TRAFFIC CAMERAS IN AUSTRALIA”

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 5 CONSUMER TRUST

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 6 ALSO NGOs, HOW TO BUILD TRUST

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 7 CONSUMER ACTIONS 65% Have Deleted Cookies 43% Have Used Filters to Block 23% Have Used Software to Block Spyware 17% Have Used Software to Hide Identity

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 8 RECENT DATA – PEW ‘DIGITAL FOOTPRINT info-though-half-of-us-have-googled-ourselves-2777/pew-digital-footprint- what-we-know-about-our-online-infojpg/ Privacy Implications of Fast, Mobile Internet Access 2/14/2008 | Memo | Susannah FoxSusannah Fox

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 9 YOUR PERSONAL BRAND

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 10 BRAND REPUTATION MONITORING  Listen to Your Customers on Site  Solict Feedback/Ratings  Listen to Buzz in Webspace  Google Alerts  Blog Posts > Technorati  Blog Comments > BackType  Discussion Boards > BoardTracker  Twitter > search.twitter.com  Friendfeed (social aggregator)

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 11 A PR REPORT

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 12 “THE TRUST IMPERATIVE” Reduced Customer Acquisition Cost Higher Profit Margins Growth Long-Term Competitive Advantage

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 13 ACCENTURE’S TRUST DIMENSIONS Security of Personal Data Consumer Control over Data Consumer Has Personal Access Provide Benefit to Consumer

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 14 Data Protection and Privacy on the Internet

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 15 CONSUMERS ARE CONCERNED

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 16 HOW MUCH DO USERS KNOW? Many Users Believe Privacy Policy Means Sites Won’t Share Data Are Unclear About The Ways Sites Connect Data For Tracking  When Explained, Would Not Accept Practice, Even From A Trusted Site Few Take Action To Learn About Privacy Practices Or To Protect Their Data

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 17 RESEARCH SUMMARY Consumers Are Concerned BECOMING LESS SO AS MORE FAMILIAR WITY NET? But They Often Lack Accurate Knowledge.

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 18 PRIVACY SEGMENTS Fundamentalists 26% Pragmatists 64% Marginally Concerned/Unconcerned 10%

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 19 BEHAVIORAL ADV CURRENT ISSUE well-aware-of-behavioral-tracking-targeting-dont-like- it-much-4048/truste-consumer-awareness-behavioral- targeting-consider-knowledgeable-of-privacy-risks- threats-onlinejpg/

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 20 BEHAVIORAL ADV CURRENT ISSUE The Harris Poll ® #40, April 10, 2008

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 21 GOOGLE DASHBOARD

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 22 U.S. PRIVACY REGULATION COPPA GLBA HIPPA

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 23 The United States Has A General Preference For Industry Self-Regulation In The Field Of Privacy

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 24 BUSINESS RESPONSE Privacy Policies Information Practices Statements

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 25 INFORMATION PRACTICES STATEMENTS “We Will Not Share Your Name With Anyone, Anytime.” “From Time To Time We Will Share Your Name With Partners Who Have Offers Of Interest.”

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 26 CONCERN ABOUT GOVERNMENT DATA

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 27 FAIR INFORMATION PRACTICES PRINCIPLES (U.S., E.U. and many others) Notice/Awareness Choice/Consent Access/Participation Integrity/Security Enforcement/Redress

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 28 SOME PRIVACY ORGANIZATIONS TRUSTe BBBOnline Online Privacy Alliance Electronic Privacy Information Center Electronic Frontier Foundation Privacy Rights Clearinghouse Privacy Pages Of The DMA/AIM Industry-Specific Recommendations and Templates

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 29 LIST OF DATA BREACHES

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 30 THE E.U. DIRECTIVE ON PROTECTION OF PERSONAL DATA Information for Both Consumers and Business at

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 31 RIGHTS UNDER EU DIRECTIVE Right of Access to Data Right to Knowledge about Where Data Originated Right to Have Inaccurate Data Corrected Right of Recourse in the Event of Ilegal Use Right to Withhold Permission to Use Data in Certain Circumstances Based on FIPP

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 32

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 33 SAFE HARBOR AGREEMENT Department of Commerce Monitors Compliance

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 34 CONSUMER DATA SECURITY

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 35 CONSUMERS ARE CONCERNED 51% Are More Concerned Than They Were a Year Ago 70% Have Installed Additional Security Software A Majority Say They Know What Adware and Spyware Are  53% Said They Had Adware or Spyware on Their Computers  80% Actually Had Adware or Spyware on Their Computers!

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 36

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 37 DEFINITIONS Spyware is Software That Gathers and Sends Data About Internet Activities  Often Without User’s Knowledge  Usually With Their Consent  Pop-ups (Based on Sites User is Visiting)  E.g., Anonymous Profiles for Behavioral Marketing Adware is Software That Allows Advertising to Be Displayed  Contextual Advertising (Based on Keywords Used)

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 38 FRAUDULENT ACTIVITIES Phishing Is The Use of Fraudulent s In An Attempt to Obtain Personal Information Pharming Is The Creation of Fake Sites That Resemble Legitimate Ones In An Attempt to Obtain Personal Information Spoofing Is Any Attempt to Use IP Addresses To Masquerade as Another Web Entity

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 39 HOW DOES IDENTITY THEFT HAPPEN?

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 40 HOW TO PROTECT AGAINST IDENTITY THEFT

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 41 SECURITY THREATS AGAINST BUSINESS

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 42 BUSINESS USES SECURITY TECHNOLOGIES TO STEM LOSSES The Greatest Dollar Losses Caused By  Viruses  Unauthorized Assess to Systems  Theft of Data Security Technologies Used  Firewalls  Anti-Virus Software  And Many others

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 43 Intellectual Property Presents Vexing Problems On the Internet

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 44 CONSUMERS SEEM CONFLICTED ABOUT MUSIC DOWNLOADING

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 45 SEEMS A BIT EXTREME...

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 46 TOYOTA EXPERIENCED TROUBLE

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 47 ATTEMPTS TO DEAL WITH IP IN THE DIGITAL AGE Digital Millennium Copyright Act - US  Prohibits Disabling Anti-Piracy Codes  Libraries Can Make Content Available  And much more... Directive to Protect Copyrights – EU  Forbids Unauthorized Copying  Allows Legitimate Online Distribution of Digital Products

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 48 IF YOU PRODUCE CONTENT

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 49 GREEN IS IN Huge Consumption of Energy Toxic Materials in Products Other?

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 50

Internet Marketing: Integrating Online and Offline StrategiesCopyright 2008 Atomic Dog/Thomson Publishing 51 SUMMARY Trust Essential To Ecommerce Privacy, Security, Intellectual Property Are Issues Children’s, Health, and Financial Information Especially Sensitive Fair Information Practices Principles Generally Accepted Globally Self-Regulation (US) vs. Laws/Regulations (EU and other Countries) Spyware, Adware/Phishing, Pharming, Spoofing Protection Against Data and Identity Theft Regulate Downloading of Music and Other Intellectual Property