Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.

Similar presentations


Presentation on theme: "1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered."— Presentation transcript:

1 1 Law, Ethical Impacts, and Internet Security

2 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered to be right and wrong What is unethical in one culture may be perfectly acceptable in another

3 3 Legal Issues vs. Ethical Issues The Major Ethical and Legal Issues Discussed in this lecture Privacy Intellectual property rights and online piracy Unsolicited electronic ads and spamming Free speech versus censorship Consumer and merchant protection against fraud

4 4 Privacy Privacy — the right to be left alone and the right to be free of unreasonable personal intrusions Two rules have been followed closely in court decisions: The right of privacy is not absolute. Privacy must be balanced against the needs of society The public ’ s right to know is superior to the individual ’ s right of privacy

5 5 Web Site Registration Cookies Spyware and Similar Methods Privacy of Employees Privacy of Patients Collecting Information about Individuals

6 6 Cookies Allows a web site to store data on the user's PC. When the customer returns to the website, the cookies can be used to find what the customer did in the past.

7 7 What is Spyware? Software that gathers user's information without the user's knowledge. Originally designed to allow freeware authors to make money on their products Spyware stays on the user's hard drive and continually tracks the user's actions, periodically sending information on the user's activities to the owner of the spyware and then used for advertising purposes.

8 8 Intellectual Property Rights Intellectual property (IP) — creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs used in commerce © ®

9 9 Unsolicited Electronic Ads: Problems and Solutions E-Mail Spamming unsolicited commercial e-mail (UCE) The use of e-mail to send unwanted ads

10 10 Free Speech Versus Censorship and Other Legal Issues On the Internet, censorship refers to government ’ s attempt to control, in one way or another, the material that is presented.

11 11 EC Fraud -Identity Theft A criminal act in which someone presents himself (herself) as another person and uses that person ’ s social security number, bank account numbers, and so on, to obtain loans, purchase items, sell stocks, etc.

12 12 EC Fraud-Phishing It refers to a person or a group of cyber-criminals who use email, pop- up messages or an imitation or copy of an existing legitimate webpage to trick users into providing sensitive personal information such as credit card numbers, bank account numbers, and passwords.

13 13 Security Issues Hacker He is a person who accesses networks and the computers on the network without authorization. Firewall It is a computer program that protects a computer or network from unauthorized access by hackers. Computer Virus It is a computer program that damages your computer system. Antivirus It is a computer program that protects a computer from viruses. Transactional risks Data can be stolen when exchanged, encryption can be used to protect data while it is transferred Encryption is changing readable data to unreadable data to prevent steal

14 14 Types of Technical Attacks Denial-of-Service attacks an attack on a web site in which an attacker uses specialized software to send a flood of data packets to the target computer with the aim of overloading its resources. Malicious Code: Virus Trojan Horses: a program that appears to have a useful function but that contains a hidden function that presents a security risk.

15 15 Other Security and Privacy Concerns in EC Some of the methods used in market research and for tracking customers: Cookies Spyware Transaction logs: created by a log file and records the used activities at the company's web site (where visitors are coming from, how often they return, how they navigate through a site and data from shopping cart)


Download ppt "1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered."

Similar presentations


Ads by Google