Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1.

Slides:



Advertisements
Similar presentations
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Advertisements

Intellectual Property Basics for Business Owners David M. Knasel, Esq. Dominion Business Law PLC Tysons Corner | Leesburg, VA
Legal and Ethical Issues: Privacy and Security Chapter Five.
Learning Objectives Understand the foundations for legal and ethical issues in EC. Describe intellectual property law and understand its adjudication.
Chapter 17 Legal, Ethical, and Social Impacts of EC.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
© 2008 Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al. Chapter 17 Legal, Ethical, and Compliance Issues in EC.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
9 - 1 © 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 17: E-Contracts and Licensing.
E-Commerce: Regulatory, Ethical, and Social Environments
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Intellectual Property
1 Copyright & Other Legal Issues. 2 WHAT IS COPYRIGHT? Copyright is the form of protection provided by the laws of the United States to authors of “original.
MIS 2000 Chapter 4 Social, Legal and Ethical Issues.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Regulatory, Ethical, and Compliance Issues in EC.
Learning Objectives Understand the foundations for legal and ethical issues in EC. Describe civil, intellectual property, and common law. Understand legal.
E-Commerce Strategy, Justification, and Global Implementation
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 17.3 Regulating the Internet. Internet Speech ► Free speech is a key democratic right. The Internet promotes free speech by giving all users a.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Class Discussion Notes MKT April 10, 2001.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Digital Citizenship Created By: Kelli Stinson June 2011.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Legal Issues.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
Copyright © 2015 Springer Education 1 Lecture 10 ReF: CH15 E-C OMMERCE : R EGULATORY, E THICAL, AND S OCIAL E NVIRONMENTS.
The Ethics of Electronic Marketing. “ Marketers must accept responsibility for the consequences of their activities and make every effort to ensure that.
Legal, Ethical, and Social Impacts of EC.  Ethics: The branch of philosophy that deals with what is considered to be right and wrong  What is unethical.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Legal Issues Now that we have looked at ethics, some of these issues are also dealt by the law. We will consider laws in the following catagories: Intellectual.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Lecture 9 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS (continued) © Prentice Hall
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Creative Commons terms and definitions By Chelsey Maton.
11-1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 EXPANDING E-BUSINESS OPPORTUNITIES FOR VIETNAM Presented by Russell Pipe Director of E-Government Programs Kenan Institute Asia – Bangkok at the VIETNAM.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Intellectual Property Basics for Business Owners David M. Knasel, Esq. Dominion Business Law PLC Tysons Corner | Leesburg, VA
TECHNOLOGY IN ACTION. Chapter 3 Using the Internet: Making the Most of the Web’s Resources.
Acceptable Use Policy (Draft)
CHAPTER FOUR OVERVIEW SECTION ETHICS
Legal and Ethical Issues in E-Commerce
E-Commerce: Regulatory, Ethical, and Social Environments
Learning Area 1 Information And Communication Technology and Society
– Communication Technology in a Changing World
CHAPTER FOUR OVERVIEW SECTION ETHICS
Ethical and Social Issues in Information Systems
IP and legal issues Super-project.eu.
Presentation transcript:

Lecture 5 ref: Chapter 16 Regulatory, Ethical, and Compliance Issues in EC PREPARED BY L. Nouf Almujally 1

Copyright © 2010 Pearson Education, Inc. Learning Objectives 1. Understand the foundations for legal and ethical issues in EC. 2. Describe civil, intellectual property, and common law. 3. Understand legal and ethical challenges and how to contain them. 4. Describe the needs and methods to protect sellers. 5. Describe EC-related societal issues. 6. Describe Green EC and IT. 16-2

Copyright © 2010 Pearson Education, Inc The Complexity of Legal and Regulatory Issues  intellectual property Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce  Why are laws subject to interpretation Most laws and regulations are broadly written and, therefore, only provide outlines to guide public policy. 16-3

Copyright © 2010 Pearson Education, Inc.  intellectual property law Area of the law that includes patent *1 law, copyright law, trademark law, trade secret law, and other branches of the law such as licensing and unfair competition _________________________________ 1 * براءة الاختراع Civil Law, Intellectual Property Law, Common Law, and EC Legal Issues

Copyright © 2010 Pearson Education, Inc.  copyright An exclusive right of the author or creator of a book, movie, musical composition, or other artistic property to print, copy, sell, license, distribute, transform to another medium, translate, record, perform, or otherwise use  infringement Use of the work without permission or contracting for payment of a royalty Civil Law, Intellectual Property Law, Common Law, and EC Legal Issues

Copyright © 2010 Pearson Education, Inc.  digital rights management (DRM) An umbrella term for any of several arrangements that allow a vendor of content in electronic form to control the material and restrict its usage  fair use The legal use of copyrighted material for noncommercial purposes without paying royalties or getting permission Civil Law, Intellectual Property Law, Common Law, and EC Legal Issues

Copyright © 2010 Pearson Education, Inc.  patent A document that grants the holder exclusive rights to an invention for a fixed number of years  trademark A symbol used by businesses to identify their goods and services; government registration of the trademark confers exclusive legal right to its use Civil Law, Intellectual Property Law, Common Law, and EC Legal Issues

Copyright © 2010 Pearson Education, Inc.  COMMON LAW IN E-COMMERCE common law (case law) Law created by judges in court decisions  FAN AND HATE SITES Independent websites that express strong opinions about their like or dislike of products, services and individuals. – cyberbashing Domain name that criticizes an organization or person Civil Law, Intellectual Property Law, Common Law, and EC Legal Issues

9 Copyright © 2010 Pearson Education, Inc.

16.3 Ethical Challenges and Guidelines  ethics The branch of philosophy that deals with what is considered to be right and wrong  privacy The right to be left alone and free of unreasonable personal intrusions  business ethics A form of applied ethics that examines ethical principles and moral or ethical problems that arise in a business environment 16-10

Copyright © 2010 Pearson Education, Inc.  EC ETHICAL ISSUES Non–Work-Related Use of the Internet Most employee use and surf on the web for non-work-related purpose Codes of Ethics A practical and necessary approach to limiting non-work-related Internet surfing is an Internet acceptable use policy (AUP) to which all employees must conform Ethical Challenges and Guidelines

Copyright © 2010 Pearson Education, Inc Privacy Rights, Protection, and Free Speech  PRIVACY RIGHTS AND PROTECTION opt-out Business practice that gives consumers the opportunity to refuse sharing information about themselves opt-in Agreement that requires computer users to take specific steps to allow the collection of personal information 16-12

Copyright © 2010 Pearson Education, Inc.  HOW INFORMATION ABOUT INDIVIDUALS IS COLLECTED 1. Web Site Registration By filling registration forms ( name, telephone#, , …etc.) 2. Cookies 3. spyware All unwanted software programs designed to steal proprietary information, or that target data stores containing confidential information Privacy Rights, Protection, and Free Speech

Copyright © 2010 Pearson Education, Inc. 4. Site transaction logs The usage patterns of how people surfing the internet 5. EC ordering systems and shopping carts Let people know what you ordered, when, from whom, and how much you paid 6. Search engines Collect information about your search, chatting and blogging 7. Behavioral targeting Uses tools for collaborative filtering and analysis of user data 8. Payment information and e-wallets Privacy Rights, Protection, and Free Speech

Copyright © 2010 Pearson Education, Inc.  PRIVACY PROTECTION BY INFORMATION TECHNOLOGIES Encryption : software for encrypting s, and other documents. Spam blocking : built into browsers and ; blocking pop- up and unwanted mails Spyware blocking : detect and remove spyware and adware Cookie managers : prevent the computer from accepting cookies  PRIVACY ISSUES IN WEB 2.0 TOOLS AND SOCIAL NETWORKS Presence, Location, and Privacy Privacy Rights, Protection, and Free Speech

Copyright © 2010 Pearson Education, Inc Consumer and Seller Protection from Online Fraud CONSUMER (BUYER) PROTECTION  Representative Tips and Sources for Your Protection User should make sure that they enter the real Web site of well-known company by going directly to the site rather than through a link. Examine the money-back guarantees, warranties, and service agreements before making a purchase Compare prices online with those in regular stores Ask friends what they know 16-16

Copyright © 2010 Pearson Education, Inc Consumer and Seller Protection from Online Fraud  Third-Party Assurance Services Several public organizations and private companies attempt to protect consumers. Ex. Better Business Bureau (BBB)  Computer Fraud and Abuse Act (CFAA) Major computer crime law to protect government computers and other Internet-connected computers 16-17

Copyright © 2010 Pearson Education, Inc. SELLER PROTECTION What Can Sellers Do? Sellers should follow best practices including: 1. verifying credit card information 2. watching for warning signals 3. ensuring delivery to approved addresses Consumer and Seller Protection from Online Fraud

Copyright © 2010 Pearson Education, Inc. PROTECTING BUYERS AND SELLERS: ELECTRONIC AND DIGITAL SIGNATURES o electronic signature A generic, technology-neutral term that refers to the various methods by which one can “sign” an electronic record types : the image of a signature, PIN number, Code, Digital signature, fingerprint Consumer and Seller Protection from Online Fraud

Copyright © 2010 Pearson Education, Inc. o Authentication and Biometric Controls - Authentication is the process through which you can confirm with whom you are communicating. - Biometric controls provide access procedures that match every valid user with a unique user identifier (UID). They also provide an authentication method that verifies that users requesting access to the computer system are really who they claim to be Consumer and Seller Protection from Online Fraud

Copyright © 2010 Pearson Education, Inc.  How EC can improve education. EC technologies can give access to information that was difficult or expensive to access in the past.  How EC can improve Public safety and security. EC technologies can allow for better monitoring of individuals and property. Ex. E-922, e-procurement, e-government  How EC can improve health services. EC technologies allow for the better filing and cross- referencing of records. Ex. Delivery of health care from distance Societal Issues and Green EC

22 Copyright © 2010 Pearson Education, Inc.