Download presentation
Presentation is loading. Please wait.
Published byCharlotte Norman Modified over 9 years ago
1
Copyright © 2010 Pearson Education, Inc.Copyright © 2009 Pearson Education, Inc. Slide 8-1 Chapter 8 Ethical, Social, and Political Issues in E-commerce
2
Copyright © 2006 Pearson Education, Inc. Slide 9-2 Basic Ethical Concepts Ethics -- The study of principles that individuals, organizations, and societies can use to determine right and wrong courses of action. Principles include: 1. Responsibility: As free moral agents, individuals, organizations, and societies are responsible for the actions they take 2. Accountability: Individuals, organizations, and societies should be held accountable to others for the consequences of their actions 3. Liability: Damages can be recovered based upon responsibility and accountability (legal enforcement of penalties for ethical violations)
3
Copyright © 2006 Pearson Education, Inc. Slide 9-3 Ethical Guidelines One or more of the following well-established ethical principles can be used to help you determine your actions when confronted with an ethical dilemma: Golden Rule – do unto others… Collective Utilitarian Principle – do whatever is best for society collectively No Free Lunch – anything created of value is owned by someone and they deserve to be paid for it The New York Times Test – how would you feel if your situation appeared on the front page of the paper?
4
Copyright © 2006 Pearson Education, Inc. Slide 9-4 Understanding Ethical, Social, and Political Issues in E-commerce With each new technology that has emerged (steam power, electricity, phones, TV), there is both social progress and debate over what is ethical and what should be legal. Internet technology and its use in e-commerce is challenging our existing beliefs regarding ethics and legality. One thing is for sure – the internet is not and will not be regarded as “the Wild West” – GREAT quote at bottom of page 498
5
Copyright © 2006 Pearson Education, Inc. Slide 9-5 E-Commerce features and their potential ethical and legal impacts (chart on 495) Ubiquity – surfing, e-mailing or shopping at work Ubiquity – using technology while driving Global Reach – US jobs going oversees Global Reach – erosion of national pride Universal Standards – ease of hacking and viruses Richness – persuasion of children Richness – replacement for reading Information Density – more info = more temptation for false info Personalization – enabling invasion of privacy
6
Copyright © 2006 Pearson Education, Inc. Slide 9-6 Four major categories of issues 1. Information rights – privacy matters 2. Property rights – music, books, movies, etc 3. Governance – who has jurisdiction for laws making/enforcement as well as taxation 4. Public safety and welfare – pornography, gambling, cigarette/pharmaceutical sales
7
Copyright © 2006 Pearson Education, Inc. Slide 9-7 1. Information Rights Privacy - The moral right of individuals to be left alone, free from surveillance or interference from other individuals or organizations Information privacy: Includes both the claim that certain information should not be collected at all, as well as the claim of individuals to control the use of whatever information is collected about them Threats to privacy come from both the private sector (companies collecting/using info) and the public sector (governments collecting/using info)
8
Copyright © 2006 Pearson Education, Inc. Slide 9-8 E-commerce and Privacy Stats: 55% of all companies store/review employee e-mails 40% of all 9-5 company internet surfing is not work- related About 40% of all B2C E-Commerce is done while at work 76% of all US companies monitor employee web activity Q. What do you think is acceptable in terms of companies monitoring employee behavior? Q. Is monitoring web/e-mail activity by employees any different than using video cameras?
9
Copyright © 2006 Pearson Education, Inc. Slide 9-9 Information Collected at E-commerce Sites Personally identifiable information (PII): Data that can be used to identify, locate, or contact an individual. Almost all e-commerce companies collect PII and use cookies to track clickstream behavior Anonymous information: Demographic and behavioral information that does not include any personal identifiers Information is used to profile consumers, both anonymously and personally. And customers are in general NOT aware that they are being “watched” as they click around and sent offers based upon their behavior (often with no consent)
10
Copyright © 2006 Pearson Education, Inc. Slide 9-10 Information Collected by the Government Since 9/11, the USA Patriot Act and Homeland Security Act have strengthened the ability of the government to monitor all of our offline and online activity. Q. How do you feel about that?!
11
Copyright © 2006 Pearson Education, Inc. Slide 9-11 Information Collected at E-commerce Sites Marketers argue that… The more personal data collected, the more precise the targeting of offers that benefit consumers Consumers are willing to give up privacy to reap the rewards of convenience, personalization, and targeted offers Profiling permits targeting of ads which benefits customers (offers they want) and businesses (elimination of waste from marketing to disinterested consumers) Q. How do you feel about these arguments?
12
Copyright © 2006 Pearson Education, Inc. Slide 9-12 Informed Consent Informed Consent – consent given with knowledge of all the material facts needed to make a rational decision. As discussed before, “informed” consent is not always given nor required in E-commerce activities Many U.S. e-commerce firms merely publish information practices as part of privacy policy without providing for any form of informed consent Two models: Opt-in – consumer must check “yes” for info to be collected/distributed Opt-out – info will be collected/distributed unless consumer takes an action to negate it
13
Copyright © 2010 Pearson Education, Inc. FTC’s Fair Information Practice Principles Slide 8-13 Notice/Awareness Sites must disclose information practices before collecting data. Includes identification of collector, uses of data, other recipients of data, nature of collection (active/inactive), voluntary or required, consequences of refusal, and steps taken to protect confidentiality, integrity, and quality of the data Choice/Consent There must be a choice regime in place allowing consumers to choose how their information will be used for secondary purposes other than supporting the transaction, including internal use and transfer to third parties. Opt- in/Opt-out must be available. Access/Participation Consumers should be able to review and contest the accuracy and completeness of data collected about them in a timely, inexpensive process. Security Data collectors must take reasonable steps to assure that consumer information is accurate and secure from unauthorized use. Enforcement There must be in place a mechanism to enforce FIP principles. This can involve self-regulation, legislation giving consumers legal remedies for violations, or federal statutes and regulation. SOURCE: Based on data from Federal Trade Commission, 1998, 2000a.
14
Copyright © 2010 Pearson Education, Inc. FTC Recommendations: Online Profiling PrincipleRecommendation Notice Complete transparency to user by providing disclosure and choice options on the host Web site. “Robust” notice for PII (time/place of collection; before collection begins). Clear and conspicuous notice for non-PII. Choice Opt-in for PII, opt-out for non-PII. No conversion of non-PII to PII without consent. Opt-out from any or all network advertisers from a single page provided by the host Web site. Access Reasonable provisions to allow inspection and correction. Security Reasonable efforts to secure information from loss, misuse, or improper access. Enforcement Done by independent third parties, such as seal programs and accounting firms. Restricted Collection Advertising networks will not collect information about sensitive financial or medical topics, sexual behavior or sexual orientation, or use Social Security numbers for profiling. Slide 8-14
15
Copyright © 2006 Pearson Education, Inc. Slide 9-15 Private Industry Self-Regulation The Online Industry opposes government regulation, preferring to regulate themselves... “Never let the monkeys guard the bananas” To date, self-regulation has been ineffective in terms of profiling, usage of personal data, establishing requirement for opt-in, and any form of enforcing penalties for violations
16
Copyright © 2006 Pearson Education, Inc. Slide 9-16 So what’s driving privacy improvements? “While Internet advertisers have pretty much blocked effective legislature in Washington that would preserve privacy, and while their industry associations have quite clearly failed to bring about meaningful self-regulation, the market has responded by providing consumers with some powerful tools for protecting their own privacy.”
17
Copyright © 2006 Pearson Education, Inc. Slide 9-17 Technological Solutions to Privacy Invasion on the Web Pop-up, Spam, and Spyware blockers Secure E-mail via encryption Cookie managers Platform for Privacy Preferences (P3P): A standard designed to communicate to Internet users a Web site’s privacy policy, and to compare that policy against user’s preferences or to other standards such as FTC’s FIP guidelines or EU’s Data Protection Directive
18
Copyright © 2010 Pearson Education, Inc. How P3P Works Figure 8.2(A), Page 522 Slide 8-18 SOURCE: W3C Platform for Privacy Preferences Initiative, 2003.
19
Copyright © 2006 Pearson Education, Inc. Slide 9-19 Internet Explorer 6.0’s Implement ation of P3P
20
Copyright © 2006 Pearson Education, Inc. Slide 9-20 2. Intellectual Property Rights Intellectual property - Encompasses all tangible and intangible products of the human mind. In the US, the creator is the owner. Compared to books, CD’s, and paintings, anything online is easy and inexpensive to copy, distribute, alter, and use Goal of intellectual property law: Balance two competing interests—public and private Great quote in middle of page 528
21
Copyright © 2010 Pearson Education, Inc. Intellectual Property Protection Three main types of protection: 1. Copyright 2. Patent 3. Trademark law Slide 8-21
22
Copyright © 2006 Pearson Education, Inc. Slide 9-22 Copyright Law Copyright law: Protects original forms of expression (but not ideas) from being copied by others for a period of time of at least 70 years Intent behind the laws is to provide financial incentives and protection to encourage creativity and completion Protection is for whole work and its parts Digital Millennium Copyright Act of 1998 (DMCA): First major effort to adjust copyright laws to Internet age. Made it illegal to make, distribute, or use devices that circumvent technology- based protections of copyrighted materials Doctrine of Fair Use allows exceptions, such as the quotes I’ve taken from the book in this PPT deck
23
Copyright © 2006 Pearson Education, Inc. Slide 9-23 Patents Patent: Grants owner a 20-year exclusive monopoly on ideas behind an invention Intent was to ensure inventors were rewarded and the invention could possibly be used by others Most of early inventions that made Internet and e-commerce possible were not patented by their inventors. With commercial development of Internet, came desire for patents Virtually any software program can be patented provided it is novel and not obvious
24
Copyright © 2006 Pearson Education, Inc. Slide 9-24 Patents Examples of E-Commerce Patents: Amazon.com “One-click purchasing” Priceline.com “Name your price” Google’s search technology
25
Copyright © 2006 Pearson Education, Inc. Slide 9-25 Trademarks Trademark: Mark used to identify and distinguish goods, and indicate their source. Includes words, pictures, shapes, packaging, and colors. Trademarks protect public by ensuring it gets what it pays for/expects to receive; protects trademark owner against piracy and misappropriation Granted for 10 years and can be renewed indefinitely The tests for infringement are market confusion and bad faith
26
Copyright © 2006 Pearson Education, Inc. Slide 9-26 Types of Trademark Abuse on Internet In the early days of the internet, domain names were first come, first served. Names were taken for profit or to benefit from confusion w/ known brand/company names Cybersquatting: Registration of infringing domain name, or other Internet use, of existing trademark, for purpose of extorting payments from legitimate owners Cyberpiracy: Involves same behavior as cybersquatting, but with intent of diverting traffic from legitimate site to infringing site Keywording: Using another’s trademarks as keywords on search engines in a misleading or confusing manner
27
Copyright © 2006 Pearson Education, Inc. Slide 9-27 3. Governance Governance Involves: Who will control the Internet and e-commerce? What elements will be controlled and how? How the controls will be implemented? Currently, there is minimal government regulation with most of the governance coming from self-regulation. Other countries have proven that governments can successful govern the internet, but should they?
28
Copyright © 2006 Pearson Education, Inc. Slide 9-28 Government Oversight of the Internet One additional question… Q. Who should govern internet usage when it crosses borders?
29
Copyright © 2010 Pearson Education, Inc. Net Neutrality Currently, all Internet traffic is treated equally —all activities charged the same rate, no preferential assignment of bandwidth Backbone providers would like to charge differentiated prices and ration bandwidth FCC has indicated it will propose rule in favor of maintaining net neutrality Slide 8-29
30
Copyright © 2006 Pearson Education, Inc. Slide 9-30 Taxation “Cheese may be taxable in one state as a snack food but not taxable in another state (such as Wisconsin), where it is considered a basic food” Beyond that important fact, there’s been virtually no resolution to the question of how to uniformly tax E-commerce transactions.
31
Copyright © 2006 Pearson Education, Inc. Slide 9-31 4. Public Safety and Welfare Major Issues: Protection of Children Pornography Gambling Pharmaceutical and Cigarette Sales
32
Copyright © 2006 Pearson Education, Inc. Slide 9-32 Public Safety and Welfare Protection of children Issues include pedophiles communicating with children, child pornography, and collecting info on minors COPPA – prevents E-commerce sites from collecting info from minors without parental permission CIPA – requires schools and libraries to install filtering software to protect children from pornography Domain Names Act – prevents domain names which may lure children into pornography
33
Copyright © 2006 Pearson Education, Inc. Slide 9-33 Public Safety and Welfare Pornography *70 million people visited porn sites in August of 2005 *There were over 15 Billion pages of content at that time *There are an estimated 1.3 Million porn sites *Estimated revenue for the industry is $5-$10 Billion annually Q. What opinions do you hold regarding entrepreneurship clashing with ethics in this enormous E-commerce industry?
34
Copyright © 2006 Pearson Education, Inc. Slide 9-34 Public Safety and Welfare Gambling There are more than 2,000 gambling sites on the web Annual revenues worldwide exceed $12 Billion, with over 80% coming from US citizens 70% are males 18-34 with average income of $70k Governance – virtually none. The only success has been convincing some large E-commerce companies to avoid advertising and not support financial transactions. That said, have you heard of Fantasy Football or March Madness?!
35
Copyright © 2010 Pearson Education, Inc. The Internet Drug Bazaar (page 554) Class Discussion What’s wrong with buying prescription drugs online, especially if the prices are lower? What are the risks and benefits of online pharmacies? How do online pharmacies challenge the traditional business model of pharmacies and drug firms? What are the challenges in regulating online pharmacies? Who benefits and who loses from online pharmacies? Slide 8-35
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.