+ All Categories
Home > Documents > 8 Bbc Privacy Chapter08

8 Bbc Privacy Chapter08

Date post: 26-Oct-2014
Category:
Upload: jamshed-afzal
View: 115 times
Download: 1 times
Share this document with a friend
Popular Tags:
25
Copyright © 2006 Pearson Education, Inc. Slide 8-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Fourth Edition
Transcript
Page 1: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-1

E-commerce

Kenneth C. Laudon

Carol Guercio Traver

business. technology. society.Fourth Edition

Page 2: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-2

Chapter 8

After Mid TERM

Ethical, Social, and Political Issues in E-commerce

Page 3: 8 Bbc Privacy Chapter08

Objectives Whats –Why & Hows Understand why e-commerce raises ethical,

social & political issues Understand basic concepts related to

privacy Identify practices of Firms threatening

privacy Describe different Methods to protect

Privacy Identify major public safety & welfare issues

raised by E-commerceCopyright © 2006 Pearson Education, Inc.

Page 4: 8 Bbc Privacy Chapter08

- Case Studies to be Read & Assignment

Copyright © 2006 Pearson Education, Inc.

S #

Page What -Topic Why :Context

1 502 The very understanding of CPO’s Duties & responsibilities would thus emerge from in-depth study of subsequent case-studies

Societal system Vs E-commerce Harmony of Ethics –Norms- Customs & to understand the Political impacts to US . This very understanding of these contextual issues would make us US.

2 147 Political : Govt. Regulations of Internet & Great Fire Wall of China (Will be covered in class)

3 176 /477 491 vs 510

Social : 2nd life & Chatter-bots meets Avatars (Partially Will be covered in class)Web lining & digital divide vs doctrine of fair use

4 T-8.3 pp 488 /518 / /517

Privacy: Cyber Privacy ,Cyber squatting & /Patented Business Models

5 BBC Documentary & 543

Google safe search filters (partially Will be covered in class) &IE privacy options end of Chapter Q1- (To be Submitted next week)

6 530288

Protecting Children & Email security (To be Submitted next week)

Page 5: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-5

Understanding Ethical, Social, and Political Issues in E-commerce

Internet technology and its use in e-commerce disrupts existing social and business relationships and understandings

Costs and benefits of technology must be carefully considered, especially when there are as yet no clear-cut legal or cultural guidelines

Page 6: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-6

A Model for Organizing the Issues

Issues raised by Internet and e-commerce can be viewed at individual, social, and political levels

Four major categories of issues: Governance Information rights Property rights Public safety and welfare

Page 7: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-7

The Moral Dimensions of an Internet Society

Page 8: 8 Bbc Privacy Chapter08

Political aspects Of E-commerceGovt. Regulations of Internet & Great Fire Wall

of ChinaPage :147

Copyright © 2006 Pearson Education, Inc.

Page 9: 8 Bbc Privacy Chapter08

Social : aspects Of E-commerce Web lining & Digital divide vs Doctrine of fair

use Social : 2nd life & Chatter-bots meets Avatars

(Partially- will be covered in class)

Copyright © 2006 Pearson Education, Inc.

Page 10: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-10

Second Life Gets a Life: Discovering Law and Ethics in Virtual Worlds

Class Discussion

Page 11: 8 Bbc Privacy Chapter08

Privacy: Aspects Of E-commerce

Copyright © 2006 Pearson Education, Inc.

Page 12: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-13

The Concept of Privacy

Privacy: Moral right of individuals to be left alone, free from surveillance or interference from other individuals or organizations

Information privacy: Includes both the claim that certain information should not be collected at all, as well as the claim of individuals to control the use of whatever information is collected about them

Page 13: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-14

Information Collected at E-commerce Sites

Personally identifiable information (PII): Data that can be used to identify, locate, or contact an individual

Anonymous information: Demographic and behavioral information that does not include any personal identifiers

Almost all e-commerce companies collect PII and use cookies to track clickstream behavior

Page 14: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-15

Profiling and Behavioral Targeting Profiling: Creation of digital images that characterize

online individual and group behavior Personal profiles: Add personal identifiers Advertising networks can:

Track both consumer behavior and browsing behavior on the Web

Dynamically adjust what the user sees on screen Build and refresh high-resolution data images or behavior

profiles of consumers

Page 15: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-16

Insight on Business: Chief Privacy OfficersClass Discussion

What does a Chief Privacy Officers do? Why do corporations need a CPO? What is a “privacy audit?” Why did ChoicePoint hire a CPO? How do federal laws like Graham-Leach

Bliley and HIPPA influence corporate privacy practices?

What is a “legalistic” approach to privacy as opposed to a “pro-consumer” approach?

Page 16: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-17

Technological Solutions to Privacy Invasion on the Web

Many privacy-enhancing technologies being developed emphasize security

Platform for Privacy Preferences (P3P): Comprehensive technological privacy protection effort sponsored by W3C Standard designed to communicate to Internet

users --a Web site’s privacy policy, and to compare that policy against user’s preferences or to other standards such ----EU’s Data Protection Directive

Page 17: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-18

How P3P WorksFigure 8.2(A), Page 504

SOURCE: W3C Platform for Privacy Preferences Initiative, 2003.

Page 18: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-19

Internet Explorer 7’s Implementation of P3PFigure 8.2(B), Page 505

Page 19: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-20

Trademarks: Online Infringement and Dilution

Trademark: Mark used to identify and distinguish goods, and indicate their source

Trademarks protect public by ensuring it gets what it pays for/expects to receive; protects trademark owner against piracy and misappropriation

Infringement: Use of trademark that creates confusion with existing marks, causes consumers to make market mistakes or misrepresents origins of goods

Anticybersquatting Consumer Protection Act (ACPA): Creates civil liabilities for anyone who attempts in bad faith to profit from an existing famous or distinctive trademark by registering an Internet domain name that is identical or confusingly similar

Page 20: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-21

Types of Trademark Abuse on Internet Cybersquatting: Registration of infringing

domain name, or other Internet use, of existing trademark, for purpose of extorting payments from legitimate owners

Cyberpiracy: Involves same behavior as cybersquatting, but with intent of diverting traffic from legitimate site to infringing site

Page 21: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-22

Governance Involves issue of social control Primary questions:

Who will control Internet and e-commerce What elements will be controlled and how

Stages of governance and e-commerce Government Control Period (1970–1994) Privatization (1995–1998) Self-Regulation (1995–present) Government Regulation (1998–present)

Page 22: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-23

Who Governs E-commerce and the Internet?

Currently in a mixed mode policy environment where self-regulation, through variety of Internet policy and technical bodies, co-exists with limited government regulation

Not true that Internet cannot be controlled. In fact, Internet can be very easily controlled, monitored, and regulated from a central location (such as done by China, Singapore, etc.)

Page 23: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-24

Legal Protections for Privacy : Regulations

May be explicitly granted or derived from constitutions (U.S., Canada, Germany)

May also be found in common law (U.S, England)

In U.S, also found in federal and state laws and regulations

Page 24: 8 Bbc Privacy Chapter08

Copyright © 2006 Pearson Education, Inc. Slide 8-25

Public Safety and Welfare Protection of children and strong sentiments

against pornography Passing legislation that will survive court

challenges has proved difficult: Communications Decency Act struck down Children’s Online Protection Act struck down (but still be

considered by lower courts) Children’s Internet Protection Act upheld by Supreme

Court (requires schools and libraries to install technology protection measures)

Efforts to control gambling and restrict sales of drugs and cigarettes Currently mostly regulated by state law

Page 25: 8 Bbc Privacy Chapter08

How to Protect http://www.microsoft.com/en-gb/security/famil

y-safety/childsafety-age.aspx http://websearch.about.com/od/dailywebsearc

htips/qt/dnt0809.htm Malwarebytes Anti-Malware PRO Configure Browser against –Adware-Clean

Cookies, PoP-ups.

Copyright © 2006 Pearson Education, Inc.


Recommended