Ch17 06 28 05


Published on

Published in: Sports, Business
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Ch17 06 28 05

  1. 1. Chapter 17 Legal, Ethical, and Social Impacts of EC
  2. 2. Learning Objectives <ul><li>Describe the differences between legal and ethical issues in EC. </li></ul><ul><li>Understand the difficulties of protecting privacy in EC. </li></ul><ul><li>Discuss issues of intellectual property rights in EC. </li></ul><ul><li>Describe unsolicited ad problems and remedies. </li></ul><ul><li>Understand the conflict between free speech and censorship on the Internet. </li></ul>
  3. 3. Learning Objectives <ul><li>Describe major legal issues in EC. </li></ul><ul><li>Describe the types of fraud on the Internet and how to protect against them. </li></ul><ul><li>Describe representative societal issues in EC. </li></ul><ul><li>Describe the role and impact of virtual communities on EC. </li></ul><ul><li>Describe the future of EC. </li></ul>
  4. 4. Legal Issues Versus Ethical Issues <ul><li>ethics </li></ul><ul><li>The branch of philosophy that deals with what is considered to be right and wrong </li></ul>
  5. 5. Legal Issues Versus Ethical Issues <ul><li>The Major Ethical and Legal Issues Discussed in this Chapter </li></ul><ul><ul><li>Privacy </li></ul></ul><ul><ul><li>Intellectual property rights and online piracy </li></ul></ul><ul><ul><li>Unsolicited electronic ads and spamming </li></ul></ul><ul><ul><li>Free speech versus censorship </li></ul></ul><ul><ul><li>Consumer and merchant protection against fraud </li></ul></ul>
  6. 6. Legal Issues Versus Ethical Issues <ul><li>EC Ethical Issues </li></ul><ul><ul><li>Non-Work-Related Use of the Internet </li></ul></ul><ul><ul><ul><li>Employees are tempted to use e-mail and the Web for non-work-related purposes </li></ul></ul></ul><ul><ul><ul><li>In some companies, this use is tremendously out of proportion with its work-related use </li></ul></ul></ul><ul><ul><ul><li>The utility of monitoring employee usage can be considered “one of the most controversial EC issues” </li></ul></ul></ul>
  7. 7. Legal Issues Versus Ethical Issues <ul><ul><li>Codes of Ethics: Useful guidelines for a corporate Web policy: </li></ul></ul><ul><ul><ul><li>Issue written policy guidelines about employee use of the Internet </li></ul></ul></ul><ul><ul><ul><li>Make it clear to employees that they cannot use copyrighted trademarked material without permission </li></ul></ul></ul><ul><ul><ul><li>Post disclaimers concerning content, such as sample code, that the company does not support </li></ul></ul></ul><ul><ul><ul><li>Post disclaimers of responsibility concerning content of online forums and chat sessions </li></ul></ul></ul>
  8. 8. Legal Issues Versus Ethical Issues <ul><li>Codes of Ethics: Useful guidelines for a corporate Web policy: </li></ul><ul><ul><li>Make sure that Web content and activity comply with the laws in other countries </li></ul></ul><ul><ul><li>Make sure that Web content and activity comply with the laws in other countries </li></ul></ul><ul><ul><li>Make sure that the company’s Web content policy is consistent with other company policies </li></ul></ul><ul><ul><li>Appoint someone to monitor Internet legal and liability issues. </li></ul></ul><ul><ul><li>Have attorneys review Web content to make sure that there is nothing unethical, or illegal, on the company’s Web site </li></ul></ul>
  9. 9. Privacy <ul><li>privacy </li></ul><ul><li>The right to be left alone and the right to be free of unreasonable personal intrusions </li></ul><ul><li>Collecting Information about Individuals </li></ul><ul><ul><li>Web Site Registration </li></ul></ul><ul><ul><li>Cookies </li></ul></ul><ul><ul><li>Spyware and Similar Methods </li></ul></ul><ul><ul><li>RFID’s Threat to Privacy </li></ul></ul><ul><ul><li>Privacy of Employees </li></ul></ul><ul><ul><li>Privacy of Patients </li></ul></ul>
  10. 10. <ul><li>Protection of Privacy </li></ul><ul><ul><li>Notice/awareness </li></ul></ul><ul><ul><li>Choice/consent </li></ul></ul><ul><ul><li>opt-out clause </li></ul></ul><ul><ul><li>Agreement that requires computer users to take specific steps to prevent the collection of personal information </li></ul></ul><ul><ul><li>opt-in clause </li></ul></ul><ul><ul><li>Agreement that requires computer users to take specific steps to allow the collection of personal information </li></ul></ul>
  11. 11. Privacy <ul><li>Protection of Privacy </li></ul><ul><ul><li>Access/participation </li></ul></ul><ul><ul><li>Integrity/security </li></ul></ul><ul><ul><li>Enforcement/redress </li></ul></ul>
  12. 12. Privacy <ul><li>The USA Patriot Act </li></ul><ul><ul><li>E-mail and Internet searches </li></ul></ul><ul><ul><li>Nationwide roving wiretaps </li></ul></ul><ul><ul><li>Requirement that ISPs hand over more user information </li></ul></ul><ul><ul><li>Expanded scope of surveillance based on new definitions of terrorism </li></ul></ul><ul><ul><li>Government spying on suspected computer trespassers with no need for court order </li></ul></ul><ul><ul><li>Wiretaps for suspected violations of the Computer Fraud and Abuse Act </li></ul></ul>
  13. 13. Privacy <ul><li>The USA Patriot Act </li></ul><ul><ul><li>Dramatic increases in the scope and penalties of the Computer Fraud and Abuse Act </li></ul></ul><ul><ul><li>General expansion of Foreign Intelligence Surveillance Act (FISA) authority </li></ul></ul><ul><ul><li>Increased information sharing between domestic law enforcement and intelligence </li></ul></ul><ul><ul><li>FISA detours around federal domestic surveillance limitations; domestic surveillance detours around FISA limitations </li></ul></ul>
  14. 14. Privacy <ul><li>Privacy Protection in Other Countries </li></ul><ul><ul><li>In 1998, the European Union passed a privacy directive (EU Data Protection Directive) reaffirming the principles of personal data protection in the Internet age </li></ul></ul><ul><ul><li>The directive aims to regulate the activities of any person or company that controls the collection, storage, processing, or use of personal data on the Internet </li></ul></ul>
  15. 15. Intellectual Property Rights <ul><li>intellectual property </li></ul><ul><li>Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce </li></ul>
  16. 16. Intellectual Property Rights <ul><li>copyright </li></ul><ul><li>An exclusive grant from the government that allows the owner to reproduce a work, in whole or in part, and to distribute, perform, or display it to the public in any form or manner, including over Internet </li></ul><ul><ul><ul><li>Literary works </li></ul></ul></ul><ul><ul><ul><li>Musical works </li></ul></ul></ul><ul><ul><ul><li>Dramatic works </li></ul></ul></ul><ul><ul><ul><li>Artistic works </li></ul></ul></ul><ul><ul><ul><li>Sound recordings, films, broadcasts, cable programs </li></ul></ul></ul>
  17. 17. Intellectual Property Rights <ul><li>Copyrights </li></ul><ul><ul><li>Piracy of Software, Music, and Other Digitizable Material </li></ul></ul><ul><ul><li>Copyright Protection Approaches </li></ul></ul><ul><ul><ul><li>digital watermarks </li></ul></ul></ul><ul><ul><ul><li>Unique identifiers embedded in digital content that make it possible to identify pirated works </li></ul></ul></ul><ul><ul><li>Digital Rights Management </li></ul></ul>
  18. 18. Intellectual Property Rights <ul><li>trademark </li></ul><ul><li>A symbol used by businesses to identify their goods and services; government registration of the trademark confers exclusive legal right to its use </li></ul><ul><ul><li>Domain Name Disputes and Resolutions </li></ul></ul><ul><ul><ul><li>cybersquatting </li></ul></ul></ul><ul><ul><ul><li>The practice of registering domain names in order to sell them later at a higher price </li></ul></ul></ul>
  19. 19. Intellectual Property Rights <ul><li>patent </li></ul><ul><li>A document that grants the holder exclusive rights to an invention for a fixed number of years </li></ul><ul><li>Fan and Hate Sites </li></ul><ul><ul><li>cyberbashing </li></ul></ul><ul><ul><li>The registration of a domain name that criticizes an organization or person </li></ul></ul>
  20. 20. Unsolicited Electronic Ads: Problems and Solutions <ul><li>E-Mail Spamming </li></ul><ul><ul><li>unsolicited commercial e-mail (UCE) </li></ul></ul><ul><ul><li>The use of e-mail to send unwanted ads or correspondence </li></ul></ul><ul><ul><li>What Drives UCE? </li></ul></ul><ul><ul><ul><li>Many spammers are just trying to get people’s financial information </li></ul></ul></ul>
  21. 21. Unsolicited Electronic Ads: Problems and Solutions <ul><ul><li>Why It Is Difficult to Control Spamming </li></ul></ul><ul><ul><ul><li>Spammers send millions of e-mails, shifting Internet accounts to avoid detection </li></ul></ul></ul><ul><ul><ul><li>Spammers use different methods to find their victims </li></ul></ul></ul><ul><ul><li>Solutions to Spamming </li></ul></ul><ul><ul><ul><li>Junk-mail filters </li></ul></ul></ul><ul><ul><ul><li>Automatic junk-mail deleters </li></ul></ul></ul><ul><ul><ul><li>Blocking certain URLs and e-mail addresses </li></ul></ul></ul>
  22. 22. Exhibit 17.1 How Spam Blockers Work
  23. 23. Unsolicited Electronic Ads: Problems and Solutions <ul><li>E-Mail Spamming </li></ul><ul><ul><li>Anti-spam Legislation </li></ul></ul><ul><ul><ul><li>Do-not-spam lists </li></ul></ul></ul><ul><ul><ul><li>Protecting employees </li></ul></ul></ul>
  24. 24. Unsolicited Electronic Ads: Problems and Solutions <ul><li>Protecting against Pop-Up Ads </li></ul><ul><ul><li>Pop-Up stoppers </li></ul></ul><ul><li>Concluding Remarks </li></ul><ul><ul><li>The spam situation has not yet been resolved. However, it seems that both e-mail spamming and pop-ups are not increasing, and they may even be declining </li></ul></ul>
  25. 25. Free Speech Versus Censorship and Other Legal Issues <ul><li>On the Internet, censorship refers to government’s attempt to control, in one way or another, the material that is presented </li></ul><ul><li>“ Donham’s First Law of Censorship.” This semiserious precept states: “Most citizens are implacably opposed to censorship in any form—except censorship of whatever they personally happen to find offensive.” </li></ul><ul><li>Children’s Online Protection Act (COPA) exemplifies the protective approach </li></ul>
  26. 26. Free Speech Versus Censorship and Other Legal Issues <ul><ul><li>Other Legal Issues </li></ul></ul><ul><ul><li>Electronic Contracts </li></ul></ul><ul><ul><ul><li>A legally binding contract requires a few basic elements: an offer, acceptance, and consideration </li></ul></ul></ul><ul><ul><ul><li>These requirements are difficult to establish when the human element in the processing of the transaction is removed and the contracting is performed electronically </li></ul></ul></ul><ul><ul><ul><li>Intelligent Agents and Contracts </li></ul></ul></ul><ul><ul><ul><ul><li>Uniform Computer Information Transactions Act ( 2000), makes clear that contracts can be formed even when a human is not directly involved </li></ul></ul></ul></ul>
  27. 27. Free Speech Versus Censorship and Other Legal Issues <ul><li>Taxing Business on the Internet </li></ul><ul><ul><li>This issue is extremely important because it is related to global EC, as well as to fairness in competition when EC competes with off-line marketing channels, which requires the collection of taxes </li></ul></ul>
  28. 28. Free Speech Versus Censorship and Other Legal Issues <ul><li>The Tax-Exemption Debate </li></ul><ul><ul><li>The Internet Tax Freedom Act 1(998) sought to promote e-commerce through tax incentives, by barring any new state or local sales taxes on Internet transactions until October 2001 </li></ul></ul><ul><ul><li>The U.S. Congress extended the tax moratorium until 2006, giving it time to digest the contents of the report and hash out contentious tax issues </li></ul></ul>
  29. 29. Free Speech Versus Censorship and Other Legal Issues <ul><li>The Tax-Exemption Debate </li></ul><ul><ul><li>Proposed Taxation in the United States </li></ul></ul><ul><ul><ul><li>The National Governors’ Association, the National League of Cities, and the U.S. Conference of Mayors fought the Tax Free Bill for the Internet </li></ul></ul></ul><ul><ul><ul><li>The U.S. Congress blocked state and local governments from taxing connections that link consumers to the Internet, at least until November 2007 </li></ul></ul></ul>
  30. 30. EC Fraud and Consumer and Seller Protection <ul><li>Fraud on the Internet </li></ul><ul><ul><li>Online Auction Fraud </li></ul></ul><ul><ul><li>Internet Stock Fraud </li></ul></ul><ul><ul><li>Other Financial Fraud </li></ul></ul>
  31. 31. EC Fraud and Consumer and Seller Protection <ul><li>Fraud on the Internet </li></ul><ul><ul><li>Identity Theft and Phishing </li></ul></ul><ul><ul><ul><li>identity theft </li></ul></ul></ul><ul><ul><ul><li>A criminal act in which someone presents himself (herself) as another person and uses that person’s social security number, bank account numbers, and so on, to obtain loans, purchase items, make obligations, sell stocks, etc. </li></ul></ul></ul>
  32. 32. EC Fraud and Consumer and Seller Protection <ul><li>Consumer Protection </li></ul><ul><ul><li>Third-Party Assurance Services </li></ul></ul><ul><ul><ul><li>TRUSTe’s “Trustmark” </li></ul></ul></ul><ul><ul><ul><li>Better Business Bureau </li></ul></ul></ul><ul><ul><ul><li>WHICHonline </li></ul></ul></ul><ul><ul><ul><li>Web Trust Seal and Others </li></ul></ul></ul><ul><ul><ul><li>Online Privacy Alliance </li></ul></ul></ul><ul><ul><ul><li>Evaluation by Consumers </li></ul></ul></ul><ul><ul><li>Authentication and Biometric Controls </li></ul></ul>
  33. 33. EC Fraud and Consumer and Seller Protection <ul><li>Seller Protection </li></ul><ul><ul><li>Customers who deny that they placed an order </li></ul></ul><ul><ul><li>Customers who download copyrighted software and/or knowledge and sell it to others </li></ul></ul><ul><ul><li>Customers who give false payment (credit card or bad checks) information in payment for products and services provided </li></ul></ul><ul><ul><li>Use of their name by others </li></ul></ul><ul><ul><li>Use of their unique words and phrases, names, and slogans and their Web addresses by others </li></ul></ul>
  34. 34. EC Fraud and Consumer and Seller Protection <ul><li>What can Sellers Do? </li></ul><ul><ul><li>Use intelligent software to identify possibly questionable customers </li></ul></ul><ul><ul><li>Identify warning signals for possibly fraudulent transactions </li></ul></ul><ul><ul><li>Ask customers whose billing address is different from the shipping address to call their bank and have the alternate address added to their bank account </li></ul></ul>
  35. 35. Societal Issues <ul><li>digital divide </li></ul><ul><li>The gap between those who have and those who do not have the ability to access electronic technology in general, and the Internet and EC in particular </li></ul><ul><li>Other Societal Issues </li></ul><ul><ul><li>Education </li></ul></ul><ul><ul><li>Public safety, criminal justice, and homeland security </li></ul></ul><ul><ul><li>Health aspects </li></ul></ul>
  36. 36. Virtual (Internet) Communities <ul><li>virtual (Internet) community </li></ul><ul><li>A group of people with similar interests who interact with one another using the Internet </li></ul><ul><li>Characteristics of Communities </li></ul><ul><ul><li>One possibility is to classify members as traders , players , just friends , enthusiasts , or friends in need </li></ul></ul>
  37. 37. Virtual (Internet) Communities <ul><li>Search communities </li></ul><ul><li>Trading communities </li></ul><ul><li>Education communities </li></ul><ul><li>Scheduled events communities </li></ul><ul><li>Subscriber-based communities </li></ul><ul><li>Community consulting firms </li></ul><ul><li>E-mail-based communities </li></ul><ul><li>Advocacy communities </li></ul><ul><li>CRM communities </li></ul><ul><li>Mergers and acquisitions activities </li></ul>Commercial Aspects of Communities
  38. 38. Virtual (Internet) Communities <ul><li>Types of Virtual Communities </li></ul><ul><ul><li>Transaction </li></ul></ul><ul><ul><li>Purpose or interest </li></ul></ul><ul><ul><li>Relations or practice </li></ul></ul><ul><ul><li>Fantasy </li></ul></ul><ul><li>Financial Viability of Communities: Revenue model of communities can be based on: </li></ul><ul><ul><li>Sponsorship </li></ul></ul><ul><ul><li>Membership fees </li></ul></ul><ul><ul><li>Sales commissions </li></ul></ul><ul><ul><li>Advertising </li></ul></ul><ul><ul><li>Combination of these </li></ul></ul>
  39. 39. Exhibit 17.5 Value Creation in Electronic Communities
  40. 40. Virtual (Internet) Communities <ul><li>Increase traffic and participation in the community </li></ul><ul><li>Focus on the needs of the members; use facilitators and coordinators </li></ul><ul><li>Encourage free sharing of opinions and information—no controls </li></ul><ul><li>Obtain financial sponsorship. This factor is a must. Significant investment is required </li></ul><ul><li>Consider the cultural environment </li></ul><ul><li>Provide several tools and activities for member use; communities are not just discussion groups </li></ul><ul><li>Involve community members in activities and recruiting </li></ul><ul><li>Guide discussions, provoke controversy, and raise sticky issues. This keeps interest high </li></ul>Eight critical factors for community success:
  41. 41. Virtual (Internet) Communities <ul><li>Key Strategies for Successful Online Communities </li></ul><ul><li>Handle member data sensitively </li></ul><ul><li>Maintain stability of the Web site with respect to the consistency of content, services, and types of information offered </li></ul><ul><li>Provide fast reaction time of the Web site </li></ul><ul><li>Offer up-to-date content </li></ul><ul><li>Offer continuous community control with regard to member satisfaction </li></ul><ul><li>Establish codes of behavior (netiquette/guidelines) to contain conflict potential </li></ul>
  42. 42. The Future of EC <ul><li>Nontechnological Success Factors </li></ul><ul><ul><li>Internet Usage </li></ul></ul><ul><ul><li>Opportunities for Buying </li></ul></ul><ul><ul><li>M-Commerce </li></ul></ul><ul><ul><li>Purchasing Incentives </li></ul></ul><ul><ul><li>Increased Security and Trust </li></ul></ul><ul><ul><li>Efficient Information Handling </li></ul></ul><ul><ul><li>Innovative Organizations </li></ul></ul><ul><ul><li>Virtual Communities </li></ul></ul>
  43. 43. The Future of EC <ul><li>Nontechnological Success Factors </li></ul><ul><ul><li>Payment Systems </li></ul></ul><ul><ul><li>B2B EC </li></ul></ul><ul><ul><li>B2B Exchanges </li></ul></ul><ul><ul><li>Auctions </li></ul></ul><ul><ul><li>Going Global </li></ul></ul><ul><ul><li>E-Government </li></ul></ul><ul><ul><li>Intra-business EC </li></ul></ul><ul><ul><li>E-Learning </li></ul></ul><ul><ul><li>EC Legislation </li></ul></ul>
  44. 44. The Future of EC <ul><li>EC Technology Trends </li></ul><ul><ul><li>Clients </li></ul></ul><ul><ul><li>Embedded Clients </li></ul></ul><ul><ul><li>Wireless Communications and M-Commerce </li></ul></ul><ul><ul><li>Pervasive Computing </li></ul></ul><ul><ul><li>Wearable Devices </li></ul></ul><ul><ul><li>RFID </li></ul></ul><ul><ul><li>Servers and Operating Systems </li></ul></ul><ul><ul><li>Networks </li></ul></ul>
  45. 45. The Future of EC <ul><li>EC Technology Trends </li></ul><ul><ul><li>EC Software and Services </li></ul></ul><ul><ul><li>Search Engines </li></ul></ul><ul><ul><li>Peer-to-Peer Technology </li></ul></ul><ul><ul><li>Integration </li></ul></ul><ul><ul><li>Web Services </li></ul></ul><ul><ul><li>Software Agents </li></ul></ul><ul><ul><li>Interactive TV </li></ul></ul><ul><ul><li>Tomorrow’s Internet </li></ul></ul>
  46. 46. The Future of EC <ul><li>EC Technology Trends </li></ul><ul><ul><li>utility computing </li></ul></ul><ul><ul><li>Computing resources that flow like electricity on demand from virtual utilities around the globe—always on and highly available, secure, efficiently metered, priced on a pay-as-you-use basis, dynamically scaled, self-healing, and easy to manage </li></ul></ul><ul><ul><li>Grid Computing coordinates the use of a large number of servers and storage, acting as one computer </li></ul></ul>
  47. 47. The Future of EC <ul><li>Integrating the Marketplace with Marketspace </li></ul><ul><ul><li>Probably the most noticeable integration of the two concepts is in the click-and-mortar organization </li></ul></ul><ul><ul><li>A major problem with the click-and-mortar approach is how the two outlets can cooperate in planning, advertising, logistics, resource allocation, and so on and how the strategic plans of the marketspace and marketplace can be aligned </li></ul></ul><ul><ul><li>The impact of EC on our lives will be as much as, and possibly more profound than, that of the Industrial Revolution </li></ul></ul>
  48. 48. Managerial Issues <ul><li>What sorts of legal and ethical issues should be of major concern to an EC enterprise? </li></ul><ul><li>What are the most critical ethical issues? </li></ul><ul><li>Should we obtain patents? </li></ul><ul><li>What impacts on business is EC expected to make? </li></ul><ul><li>Do we have a community? </li></ul>
  49. 49. Summary <ul><li>Differences between legal and ethical issues. </li></ul><ul><li>Protecting privacy in EC. </li></ul><ul><li>Intellectual property rights in EC. </li></ul><ul><li>Unsolicited ads and spamming. </li></ul><ul><li>Conflict between free speech and censorship. </li></ul>
  50. 50. Summary <ul><li>Legal issues. </li></ul><ul><li>Protecting buyers and sellers online. </li></ul><ul><li>Societal issues and EC. </li></ul><ul><li>The role of virtual communities. </li></ul><ul><li>The future of EC. </li></ul>