Copyright © 2015 Springer Education 1 Lecture 10 ReF: CH15 E-C OMMERCE : R EGULATORY, E THICAL, AND S OCIAL E NVIRONMENTS.

Slides:



Advertisements
Similar presentations
Tradition innovation Online Branding Kate Legg Solicitor.
Advertisements

BUSINESS B2 Ethics.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
Research Development for Android Coopman Tom. What is Android?  Smartphone operating system  Google  Popular  ‘Easy to develop’  Open-Source  Linux.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Business Plug-In B7 Ethics.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 0.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
INTERNET and CODE OF CONDUCT
COMPUTER APPLICATIONS TO BUSINESS ||
E-Commerce: Regulatory, Ethical, and Social Environments
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
E-business & E-Commerce chapter 5
E-commerce E-commerce is defined "as the process of buying, selling, or exchanging products, services, or information via computer networks, including.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Standards and Guidelines for Web Page Publishing December 9, 2009.
Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.
Chapter Two Ethical & Legal Issues.
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Regulatory, Ethical, and Compliance Issues in EC.
Learning Objectives Understand the foundations for legal and ethical issues in EC. Describe civil, intellectual property, and common law. Understand legal.
Characteristics of a Market Economy
C4- Social, Legal, and Ethical Issues in the Digital Firm
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
Computer Ethics for Computer Users
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Intellectual Property Laws and Fair Use Guidelines for Educational Multimedia.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Presented by: Jody and Kenneth1 Copyright and Other Legal Issues in Distance Education Presented by Jody & Kenneth.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
Legal, Ethical, and Social Impacts of EC.  Ethics: The branch of philosophy that deals with what is considered to be right and wrong  What is unethical.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Ethical and Legal Issues in Educational Technology Professional Educator Diploma Graduate School of Education – American University in Cairo (AUC) Spring.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Essentials Of Business Law Chapter 27 Conducting Business In Cyberspace McGraw-Hill/Irwin Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
 Legal Issues-copyright and fair use, privacy, software piracy, acceptable use  Social Issues- digital divide, cyber bullying, online interaction 
Overview of Electronic Commerce. Learning Objectives 1. Define electronic commerce (EC) and describe its various categories. 2. Describe and discuss the.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
11-1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Responsibility of businesses to do the right thing.
1 EXPANDING E-BUSINESS OPPORTUNITIES FOR VIETNAM Presented by Russell Pipe Director of E-Government Programs Kenan Institute Asia – Bangkok at the VIETNAM.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Social Ethical and Legal Issues Web Design. 3.4 Social, Ethical, and Legal Issues Focus on Reading Main Ideas Ethical, social, and legal guidelines govern.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Open Source Software Practices
Legal and Ethical Issues in E-Commerce
E-Commerce: Regulatory, Ethical, and Social Environments
Learning Area 1 Information And Communication Technology and Society
Intellectual Property Rights
Intellectual Property
IP and legal issues Super-project.eu.
Presentation transcript:

Copyright © 2015 Springer Education 1 Lecture 10 ReF: CH15 E-C OMMERCE : R EGULATORY, E THICAL, AND S OCIAL E NVIRONMENTS

L EARNING O BJECTIVES 1. Understand the foundations for legal and ethical issues in EC. 2. Describe and understand intellectual property law, copy rights and patent. 3. Explain privacy and practices for implementing a successful privacy project. 4. Describe the needs and methods of protecting both buyers and sellers. 5. Describe other legal issues. 6. Describe the future of e-commerce. 4-2 Copyright © 2015 Springer Education

15.1 ETHICAL CHALLENGES AND GUIDELINES Copyright © 2015 Springer Education 3

15.1 ETHICAL CHALLENGES AND GUIDELINES Ethics A set of moral principles or rules of how people are expected to conduct themselves.  It specifies what is considered by society to be right or wrong.  Issues of privacy, ownership, control, and security must be confronted in implementing and understanding the ethical challenges of EC. 4-4 Copyright © 2015 Springer Education

15.1 ETHICAL CHALLENGES AND GUIDELINES Ethical Principles and Guidelines Public law embodies ethical principles, but the two are not the same. Acts that generally are considered unethical may not be illegal. Lying to someone may be unethical, but it is not illegal. Conversely, the law is not a collection of ethical norms, and not all ethical codes are incorporated into public law. 4-5 Copyright © 2015 Springer Education

15.1 ETHICAL CHALLENGES AND GUIDELINES Business Ethics (enterprise ethics) A code of values, behaviors, and rules, written or unwritten, for how people should behave in the business world.  These ethics dictate the operations of organizations. EC Ethical and Legal Issues Intellectual property rights. Privacy. Free speech versus censorship. Consumer and merchant protection against fraud. 4-6 Copyright © 2015 Springer Education

15.1 ETHICAL CHALLENGES AND GUIDELINES Internet Use that Is Not Work-Related A majority of employees use and surf the Web for purposes not related to work. The use of company property (i.e., computers, networks) for and Internet use may create risk and waste time.  The degree of risk depends on the extent to which the company has implemented policies and procedures to prevent and detect illegal uses.  For example, companies may be held liable for their employees’ use of to harass other employees, participate in illegal gambling, or distribute child pornography. 4-7 Copyright © 2015 Springer Education

15.1 ETHICAL CHALLENGES AND GUIDELINES Code of Ethics A practical and necessary approach to limiting Internet surfing that is not work-related is an Internet Acceptable Use Policy (AUP) to which all employees must conform.  It includes EC, social networks, and any IT- related topics.  Without a formal AUP, it is much more difficult to enforce acceptable and eliminate unacceptable behaviors and reprimand violators. 4-8 Copyright © 2015 Springer Education

15.2 INTELLECTUAL PROPERTY LAW AND COPYRIGHT INFRINGEMENT Copyright © 2015 Springer Education 9

15.2 INTELLECTUAL PROPERTY LAW AND COPYRIGHT INFRINGEMENT Intellectual Property (IP) Property that derives from the creative work of an individual, such as literary or artistic work.  Intellectual property can be viewed as the ownership of intangible assets, such as inventions, ideas, and creative work.  It is a legal concept protected by patents, copyrights, trademarks, and trade secret law Copyright © 2015 Springer Education

15.2 INTELLECTUAL PROPERTY LAW AND COPYRIGHT INFRINGEMENT 4-11 Copyright © 2015 Springer Education

15.2 INTELLECTUAL PROPERTY LAW AND COPYRIGHT INFRINGEMENT 4-12 Copyright © 2015 Springer Education C opyright An exclusive legal right of an author or creator of intellectual property to publish, sell, license, distribute, or use such work in any desired way.  A copyright does not last forever; it is good for a set number of years after the death of the author or creator (e.g., 50 years in the United Kingdom).  After the copyright expires, the work reverts to the public domain (or becomes publicly available).  In many cases, corporations own copyrights. Copyright Infringement The legal term for the use of a work without permission or contracting for payment of a royalty.

15.2 INTELLECTUAL PROPERTY LAW AND COPYRIGHT INFRINGEMENT 4-13 Copyright © 2015 Springer Education Digital Rights Management (DRM) A system of protecting the copyrights of data circulated over the Internet or digital media.  These arrangements are technology-based protection measures (via encryption or using watermarks).  Typically, sellers own the rights to their digital content. Patent An exclusive right to a particular invention.  Patents are granted by states or governments to the creator of an invention, or to someone who has been designated by them to accept the rights over the invention.  The holder of the patent has sole rights over the invention for a specified period of time.

15.3 PRIVACY RIGHTSAND PROTECTION Copyright © 2015 Springer Education 14

15.3 PRIVACY RIGHTS ANDPROTECTION 4-15 Copyright © 2015 Springer Education Privacy The state of not being disturbed by others, being free from others’ attention, and having the right to be left alone and not to be intruded upon.  Privacy has long been a legal, ethical, and social issue in most countries.  The reasons for privacy concerns stems from the fact that in using the Internet: Users are asked to provide some personal data in exchange for access to information (such as getting coupons, other downloads, etc.). Data and Web mining companies receive and gather the collected data. As a result, users’ privacy may be violated.

15.3 PRIVACY RIGHTS ANDPROTECTION 4-16 Copyright © 2015 Springer Education One way to manage privacy issue is the opt-in and opt-out system. They generally used by direct marketing companies. Opt-out A method that gives consumers the choice to refuse to share information about themselves, or to avoid receiving unsolicited information.  Offering the choice to opt-out is good customer practice, but it is difficult to opt-out in some industries, either because consumer demand for opting out is low or the value of the customer information is high.

15.3 PRIVACY RIGHTS AND PROTECTION 4-17 Copyright © 2015 Springer Education Opt-in Based on the principle that consumers must approve in advance what information they receive from a company, or allow a company to share their information with third parties. That is, information sharing should not occur unless customers affirmatively allow or request it.

15.3 PRIVACY RIGHTS AND PROTECTION 4-18 Copyright © 2015 Springer Education Practices for implementing a successful privacy project are: 1. Get organized This can be done by creating a cross-functional privacy team for guidance. 2. Define the privacy protection needs Decide what needs to be protected. 3. Conduct inventory of data List and analyze all data that need protection. 4. Select solution(s) Choose and implement a solution that protects privacy. 5. Test a prototype system Create a prototype of the system and test it under different conditions. 6. Expand the project scope Expand the project to encompass other applications.

15.3 PRIVACY RIGHTS AND PROTECTION 4-19 Copyright © 2015 Springer Education Monitoring Employees There are several issues concerning Internet use at work and employee privacy.  In addition to wasting time online, employees may disclose trade secrets and possibly make employers liable for defamation based on their actions on the corporate website.  In response to these concerns, many companies monitor their employees’ and Web surfing activities.  One tool that enables companies to monitor their employees is Google Location, which works in combination with a compatible device.

15.4 OTHER EC LEGAL ISSUES Copyright © 2015 Springer Education 20

15.4 OTHER EC LEGAL ISSUES 4-21 Copyright © 2015 Springer Education The legal and regulatory environment related to EC is very broad. E-discovery and cyberbullying are two described issues. Electronic discovery (e-discovery) The process of finding any type of electronic data (e.g., text, images, videos) by using computerized systems.  A major application of e-discovery is its use of finding evidence in legal cases.

15.4 OTHER EC LEGAL ISSUES 4-22 Copyright © 2015 Springer Education Cyberbullying Bullying that takes place using electronic technology.  Electronic technology includes devices and equipment such as cell phones, computers and tablets as well as communication tools including social media sites, text messages, chat, and websites.”

15.5 CONSUMER AND SELLER PROTECTION FROM ONLINE FRAUD Copyright © 2015 Springer Education 23

15.5 CONSUMER AND SELLER PROTECTION FROM ONLINE FRAUD 4-24 Copyright © 2015 Springer Education Consumer (Buyer) Protection Users should make sure that they enter the real website of well-known companies, by going directly to the site, rather than through a link. Check any unfamiliar site for an address and telephone and fax numbers. Call and quiz a salesperson about the company and the products. Investigate sellers with the local chamber of commerce. Investigate how secure the seller’s site is and how well it is organized. Examine the money-back guarantees, warranties, and service agreements before making a purchase.

15.5 CONSUMER AND SELLER PROTECTION FROM ONLINE FRAUD 4-25 Copyright © 2015 Springer Education Consumer (Buyer) Protection Compare prices online with those in regular stores. Ask friends what they know about the websites. Find out what remedy is available in case of a dispute. Consult the National Consumers League Fraud Center ( fraud.org). Check the resources available at consumerworld.org. Amazon.com provides comprehensive protection.

15.5 CONSUMER AND SELLER PROTECTION FROM ONLINE FRAUD 4-26 Copyright © 2015 Springer Education Sellers must be protected against Customers who deny that they placed an order. Customers who download copyrighted software and sell it to others. Customers who give fraudulent payment information (false credit card or a bad check) for products and services that they buy. Imposters – sellers using the name of another seller. Other sellers using the original seller’s names, trademarks, and other unique features, and even their Web addresses. Payment fraud by consumers and by criminals.

15.8 THE FUTURE OF E- COMMERCE Copyright © 2015 Springer Education 27

15.8 THE FUTURE OF E-COMMERCE Generally speaking, the consensus is that the future of EC is positive. EC will become an increasingly important method of trading, reaching customers, providing services, and improving organizations’ operations. EC facilitates collaboration, innovation, and people-to people interactions. Analysts differ in their predictions for the anticipated growth rate of EC and the length of time it will become a substantial portion of the economy. There is also disagreement about the identification of industry segments that will grow the fastest. A consensus about the direction of the field: full speed ahead! Companies such as Amazon.com, eBay and Alibaba. 28 Copyright © 2010 Pearson Education