1 C23 - April 28 2008 Business 54 - Introduction to eCommerce Spring 2008.

Slides:



Advertisements
Similar presentations
A New Framework for Protecting Consumers on the Internet Peter P. Swire Ohio State University & Center for American Progress Center for American Progress.
Advertisements

Back to Table of Contents
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
CptS 401 Adam Carter. Discuss Paper Question 4 Anonymizer.com provides tools and services to A. obtain a new identity. B. send and surf the web.
Legal and Ethical Issues: Privacy and Security Chapter Five.
4-1. Business in a Changing World McGraw-Hill/Irwin Copyright © 2009 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Managing Information.
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
September 2001Chapter 16: Public policy: Regulation1 Chapter 16. Public Policy: Regulation  Questions Answered in this Chapter: –How is the Internet currently.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 12-1© 2007 Prentice-Hall, Inc ELC 200 Day 19.
Chapter 5 Intellectual Property & Internet Law
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.
Chapter 5 E-environment
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Copyright 2007 Thomson South-Western Chapter 5 Banking Procedures.
The New Legal Landscape for Event Industry Social Media Kathryn Carrier, Esq. © 2011 Katy Carrier.
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
C4- Social, Legal, and Ethical Issues in the Digital Firm
4-1 Technology – Impact on Our Lives Information technology– processes and applications that create new methods to solve problems, perform tasks, and manage.
Copyright © 2010 Certification Partners, LLC -- All Rights Reserved E-Commerce Specialist.
1 C6 - February 27, 2008 Business 54 - Introduction to eCommerce Spring 2008 C6 - February 27, 2008.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Class Discussion Notes MKT April 10, 2001.
Chapter 17 Direct and Online Marketing: Building Direct Customer Relationships.
Copyright ©2006 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Cyber Law Its Legal, Ethical, and Global Environment MARIANNE.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
ECT 455/HCI 513 ECT 4 55/HCI 513 E-Commerce Web Site Engineering Legal Issues.
Principles of Marketing
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Its Legal, Ethical & Global Environment 6 th Ed. Its Legal, Ethical & Global Environment 6 th Ed. B U S I N E S S MARIANNE M. JENNINGS Copyright ©2003.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
CHAPTER 5 ETHICS & PRIVACY.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Chapter 9: Internet Law, Social Media, and Privacy
Chapter 10 Cyberlaw, Social Media, and Privacy
Physical Safety Issues
A Project on CYBER SECURITY
E-Commerce: Regulatory, Ethical, and Social Environments
LEGAL TERMS IN DIGITAL MEDIA
Presentation transcript:

1 C23 - April Business 54 - Introduction to eCommerce Spring 2008

2 C23 - April Class Game Plan  Law, Ethics and the Internet.  Question and Answer.  Lab Time.

3 C23 - April  Privacy has been an issue from the start on the Internet  Internet was designed-built to be a secure network!  But it’s always been the Wild, Wild West!  Adult Porn.  Use of ‘Cookies’.  Web Bugs.  Selling Customer Identify & Behavior Information.  Credit Card Fraud.  Today, the primary Internet Privacy-Security concerns are:  Hacking.  Identity Theft.  Spamming.  Copywriting / Legal Use of Content.  Shifting public attitudes have prompted governmental action. Introduction to Privacy

4 C23 - April Identity Theft  Original problem was plain old credit card theft.  Today credit card misuse is less than 1% of all eCommerce transactions:  VeriSign.  Pay Pal.  eWallet.  MSN.Passport.  Basic solutions for individual consumers:  Avoid bogus-scam sites.  Use only one credit card for online purchases.  Read privacy and billing disclosures!  There is still theft out here, but is now the province of organized crime:  Ransom.  Creation of false identifies.  Your site needs to be protected:  Avoid liability by not storing credit card information directly.  Invest in hacker security software.  Invest in policies and procedures.

5 C23 - April  Spamming is the sending of unwanted & unsolicited .  Affects both individuals and web sites.  Growing problem BECAUSE IT WORKS!  Why is it a problem for your web site?  Performance Impacts.  Time Waste.  $$$ cost to stop/block.  Some ways to block Spam:  Simple (Addressor) Blocking.  Algorithm-based Blocking.  Market-based.  Challenge-Response.  Image-based Login’s. Targeted, Direct Online Marketing, aka Spam I e G G 7 F H

6 C23 - April Spamming  Has become an annoyance second only to telemarketing calls during mealtime.  Has become a political issue.  But may not be easy to legislate it out of existence: Many sites are overseas or anonymous. Who is the true owner /operator? May not be subject to US laws and regulations.  Technology solutions are not providing a good answer either.  Some action will be taken unless the Market / Web finds a way to police itself.

7 C23 - April Copyrights / Misuse of Content  Success of your eCommerce business can be dependant upon the uniqueness of your idea and the Look & Feel-Operation of your site.  Need to protect your Intellectual Property (IP):  Copyrighting.  Trade Secrets.  Trademarks / Service Marks.  Napster lessons.  Court Case Precedents.  But you can use Free Content to improve your site:  Rule Of 80% / 8 Bars.  Public Domain Content.  Non-copyrighted / Unmarked Content.  Special Suppliers.

8 C23 - April New Govt Regulations & Activities  States and Federal government have moved to both improve AND control the Internet.  Areas of focus include:  Privacy Rules & Disclosures.  Digital Images.  Libel-Slander.

9 C23 - April Privacy & Disclosures  Abuses in the use and selling of online customer data has prompted Federal action.  Legislation now limits what can be done with customer data:  Can only be used / shared in the aggregate with other companies.  Detailed information and web history CAN be shared with affiliated organizations, regardless if they are online or offline.  Other provisions include:  Must move towards an Opt-in / Double Opt-in option.  Must have a Privacy Policy.  Must disclose uses / sources of data.  Non-Deniability.  Applies also to Credit Card, Financial Institutions and Telephone companies.

10 C23 - April Digital Images  Use of digital likeness for commercial purposes:  John Wayne & Coors beer ads.  Trends towards totally digital movies: Finding Nemo. Final Fantasy. Convergence of video games and Movies (e.g., Mortal Kombat; Laura Croft).  Some entertainers although dead are still earning money:  The estates of James Dean and Marilyn Monroe still earn over $100K a year in royalties!  Tremendous cost and other incentives for studios to migrate towards ‘digital actors’.  The Sonny Bono Law:  Extends copyrights of images effectively forever.  Designed to protect actors and entertainers from studios-producers until long after they are dead.  Has yet to be tested in court. It can be argued that it creates an unreasonable time period of protection.

11 C23 - April Free Speech on the Internet  Can you be held liable for slander or libel on the Internet?  You have limited recourse, either as an individual or an eCommerce company.  Recent court decisions say NO. Free Speech trumps other rights:  Sullivan vs. NY Times precedent holds also on the Internet.  Commercial speech (e.g., defaming competitors) yet to be fully tested.  Lastly, many sites are overseas or anonymous:  Who is the owner /operator?  May not be subject to US laws and regulations.  Best option is to monitor and counter, not sue.  Just another cost of doing business on the Web.

12 C23 - April  Net Neutrality.  Protecting kids.  Cyber-Kiddie Porn. Other Privacy / Ethical Concerns

13 C23 - April C17 - April 7, 2008 Questions…… (and maybe some) Answers

14 C23 - April C17 - April 7, 2008 Lab Time  Visit  Check out a some ‘typical’ Internet frauds and scams.  Think about: Why do so many people fall for internet scams?