SlideShare a Scribd company logo
1 of 40
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Copyright © 2009 Pearson Education, Inc. Slide 8-1
Chapter 8
Ethical, Social & Political Issues
in E-commerce
Chapter Outline
8.1 Understanding Ethical, Social & Political
Issues in E-commerce
8.2 Privacy & Information Rights
8.3 Intellectual Property Rights
8.4 Governance
8.5 Public Safety & Welfare
Slide 8-2
8.1 Understanding Ethical,
Social & Political Issues in
E-commerce
 Internet technology and its use in
e-commerce disrupts existing social &
business relationships & understandings
 Costs & benefits of technology must be
carefully considered, especially when there
are as yet no clear-cut legal or cultural
guidelines
Slide 8-3
A Model for Organizing the Issues
 Issues raised by Internet and e-commerce can
be viewed at individual, social, and political
levels
 Four major categories of issues:
 Information rights – personal information
 Property rights – protected copies
 Governance – public law
 Public safety and welfare – access to Internet
Slide 8-4
The Moral Dimensions of an Internet Society
Figure 8.1, Page 378
Slide 8-5
Basic Ethical Concepts
 Ethics
o Study of principles used to determine right and wrong courses of
action
 Responsibility
 Accountability
 Liability
o Laws permitting individuals to recover damages
 Due process
o Laws are known, understood
o Ability to appeal to higher authorities to ensure laws applied
correctly
Slide 8-6
Analyzing Ethical Dilemmas
 Process for analyzing ethical dilemmas:
1. Identify and clearly describe the facts.
2. Define the conflict or dilemma and identify the
higher-order values involved.
3. Identify the stakeholders.
4. Identify the options that you can reasonably
take.
5. Identify the potential consequences of your
options.
Slide 8-7
Candidate Ethical Principles
 Well-established ethical principles can be used
to help determine actions when confronted with
an ethical dilemma:
 Golden Rule
 Universalism
 Slippery Slope
 Collective Utilitarian Principle
 Risk Aversion
 No Free Lunch
 The New York Times Test (Perfect Information Rule)
 The Social Contract Rule
Slide 8-8
8.2 Privacy
 Privacy:
o Moral right of individuals to be left alone, free from
surveillance or interference from other individuals
or organizations
 Information privacy:
o Includes both the claim that certain information
should not be collected at all, as well as the claim
of individuals to control the use of whatever
information is collected about them
Slide 8-9
E-commerce & Privacy
 Major ethical issue related to e-commerce
& privacy:
o Under what conditions should we invade privacy of others?
 Major social issue:
o Development of “expectations of privacy” and privacy norms
 Major political issue:
 Development of statutes that govern relations between
recordkeepers and individuals
Slide 8-10
Information Collected at E-commerce
Sites
 Personally identifiable information (PII):
o Data that can be used to identify, locate, or contact an individual
 Anonymous information:
o Demographic and behavioral information that does not include
any personal identifiers
 Almost all e-commerce companies collect PII
and use cookies to track clickstream
behavior
Slide 8-11
Profiling & Behavioral Targeting
 Profiling
o Creation of digital images that characterize online individual and
group behavior
 Anonymous profiles
o Identify people as belonging to very specific and targeted groups
 Personal profiles:
o Add personal identifiers
 Advertising networks can:
o Track consumer behavior and browsing behavior on the Web
o Dynamically adjust what user sees on screen
o Build and refresh high-resolution data images or behavior profiles
of consumers
Slide 8-12
Profiling and Behavioral Targeting (cont’d)
 Deep packet inspection
o Records every keystroke at ISP level of everyone and uses
information to make suggestions, target ads
 Weblining:
o Charging some customers more for products based on profiles
 Network advertising firms:
o Web profiling serves consumers and businesses
 Critics:
o Profiling undermines expectation of anonymity and privacy
 Consumers:
o Significant opposition to unregulated collection of personal
information
Slide 8-13
The Internet & Government Invasions
of Privacy
 Various laws strengthen ability of law
enforcement agencies to monitor Internet users
without knowledge and sometimes without
judicial oversight
o CALEA, PATRIOT Act, Cyber Security Enhancement
Act, Homeland Security Act
 Government agencies are largest users of
private sector commercial data brokers
 Retention by ISPs of user data a concern
Slide 8-14
Legal Protections
 May be explicitly granted or derived from
constitutions (U.S., Canada, Germany)
 May also be found in common law (U.S,
England)
 In U.S, also found in federal and state laws
and regulations
o First amendment – guarantees freedom of
speech and association
o Fourth amendment – protects against
unreasonable search and seizure
o Fourteenth amendment – guarantees due
process
Slide 8-15
Informed Consent
 Consent given with knowledge of all the
material facts needed to make a rational
decision
 Two models:
o Opt-in
o Opt-out
 Many U.S. e-commerce firms merely publish
information practices as part of privacy policy
without providing for any form of informed
consent
Slide 8-16
The FTC’s Fair Information Practices
Principles
 U.S. Federal Trade Commission:
o Conducts research and recommends legislation to
Congress
 FTC Fair Information Practice Principles
(1998):
o Notice/Awareness (Core)
o Choice/Consent (Core)
o Access/Participation
o Security
o Enforcement
 Guidelines, not laws
Slide 8-17
FTC’s Fair Information Practice
Principles
Slide 8-18
Notice/Awareness Sites must disclose information practices before collecting data.
Includes identification of collector, uses of data, other recipients of data,
nature of collection (active/inactive), voluntary or required,
consequences of refusal, and steps taken to protect confidentiality,
integrity, and quality of the data
Choice/Consent There must be a choice regime in place allowing consumers to choose
how their information will be used for secondary purposes other than
supporting the transaction, including internal use and transfer to third
parties. Opt-in/Opt-out must be available.
Access/Participation Consumers should be able to review and contest the accuracy and
completeness of data collected about them in a timely, inexpensive
process.
Security Data collectors must take reasonable steps to assure that consumer
information is accurate and secure from unauthorized use.
Enforcement There must be in place a mechanism to enforce FIP
principles. This can involve self-regulation, legislation giving consumers
legal remedies for violations, or federal statutes and regulation.
FTC Recommendations Regarding
Online Profiling
Slide 8-19
Principle Recommendation
Notice Complete transparency to user by providing disclosure and choice
options on the host Web site. “Robust” notice for PII (time/place
of collection; before collection begins). Clear and conspicuous
notice for non-PII.
Choice Opt-in for PII, opt-out for non-PII. No conversion of non-PII to PII
without consent. Opt-out from any or all network advertisers from
a single page provided by the host Web site.
Access Reasonable provisions to allow inspection and correction.
Security Reasonable efforts to secure information from loss, misuse, or
improper access.
Enforcement Done by independent third parties, such as seal programs and
accounting firms.
Restricted
Collection
Advertising networks will not collect information about sensitive
financial or medical topics, sexual behavior or sexual orientation,
or use Social Security numbers for profiling.
The European Directive on Data
Protection
 Privacy protection much stronger in Europe
than in United States
 European approach: Comprehensive and
regulatory in nature
 European Commission’s Directive on Data
Protection: Standardizes and broadens
privacy protection in European Union
countries
 Department of Commerce safe harbor
program for U.S. firms that wish to comply
with Directive
Slide 8-20
Private Industry Self-Regulation
 Safe harbor:
o Private, self-regulating policy and enforcement
mechanism that meets objectives of government
regulations and legislation, but does not involve
government regulation or enforcement
o e.g. Privacy seal programs (TRUSTe, BBB Reliability
Seal)
 Industry associations include:
o Online Privacy Alliance (OPA)
o Network Advertising Initiative (NAI)
 Privacy advocacy groups
o e.g. Epic.org
Slide 8-21
Technological Solutions to Privacy
Invasion on the Web
 Spyware, cookie, pop-up blockers
 Platform for Privacy Preferences (P3P):
o Comprehensive technological privacy protection effort
sponsored by W3C
o Standard for communicating to users a Web site’s
privacy policy
o Compares site policy to user’s preferences or to
other standards such as FTC’s FIP guidelines or
EU’s Data Protection Directive
o Works through user’s Web browser
Slide 8-22
How P3P Works
Figure 8.2(A), Page 396
Slide 8-23
SOURCE: W3C Platform for Privacy Preferences Initiative, 2003.
Internet
Explorer 7’s
Implementation
of P3P
Figure 8.2(B),
page 397
Slide 8-24
8.3 Intellectual Property Rights
 Intellectual property:
o Encompasses all tangible and intangible products of
human mind
 Major ethical issue:
o How should we treat property that belongs to others?
 Major social issue:
o Is there continued value in protecting intellectual
property in the Internet age?
 Major political issue:
o How can Internet and e-commerce be regulated or
governed to protect intellectual property?
Slide 8-25
Types of Intellectual Property
Protection
 Three main types of intellectual property
protection:
o Copyright
o Patent
o Trademark law
 The goal of intellectual property law is to
balance two competing interests—the public and
the private
 Maintaining this balance of interests is always
challenged by the invention of new technologies
Slide 8-26
Copyright: The Problem of Perfect
Copies and Encryption
 Copyright law: Protects original forms of expression
(but not ideas) from being copied by others for a period
of time
 Look and feel copyright infringement lawsuits involve
distinction between an idea and its expression
 Fair use doctrine: Under certain circumstances, permits
use of copyrighted materials without permission
 Digital Millennium Copyright Act of 1998 (DMCA):
First major effort to adjust copyright laws to Internet age
o DMCA implements WIPO treaty that makes it illegal to make,
distribute, or use devices that circumvent technology-based
protections of copyrighted materials
Slide 8-27
Patents:
Business Methods and Processes
 Patents: Grants owner a 20-year exclusive
monopoly on ideas behind an invention
o Machines, man-made products, compositions of
matter, processing methods
o Invention must be new, non-obvious, novel
 Encourage inventors
 Stifle competition by raising barriers to entry
Slide 8-28
E-commerce Patents
 Business methods patents
o Internet basic infrastructure, software developed via
public programs, not patented
o 1998 Federal court upheld claims to business method
patent
o U.S. Patent Office, European Patent Convention hold
different standards
o Examples:
 Amazon’s One-click purchasing
 DoubleClick’s Dynamic delivery of online advertising
Slide 8-29
Internet & E-commerce Business
Method Patents
Figure 8.3, Page 405
Slide 8-30
SOURCE: United States Patent and Trademark Office, 2008
Patent Reform
 Patent “trolls” – companies that collect patents
and seek to enforce them
 2007 House of Representatives patent reform
bill
o Change patent system from “first to invent” to “first to
file”
o New calculations for damages
o Way to challenge out of court
Slide 8-31
Trademarks:
Online Infringement & Dilution
 Trademark:
o Mark used to identify and distinguish goods, and
indicate their source
o Protects public by ensuring it gets what it pays
for/expects to receive
o Protects trademark owner against piracy and
misappropriation
 Infringement: Use of trademark that
o Creates confusion with existing marks, causes
consumers to make market mistakes, or
o Misrepresents origins of goods
Slide 8-32
Trademarks: Online Infringement &
Dilution (cont’d)
 Dilution: Any behavior that weakens the
connection between trademark and product
 Federal Trademark Dilution Act (1995)
o Extends protection to owners of famous trademarks
against dilution
Slide 8-33
Trademarks & the Internet
 Cybersquatting: Registration of domain name or other
Internet use of existing trademark for purpose of extorting
payments from legitimate owners
 Cyberpiracy: Same behavior as cybersquatting, with
intent of diverting traffic from legitimate site to infringing
site
 Metatagging: Using other’s trademarks as metatags in
misleading or confusing manner
 Keywording: Using other’s trademarks as keywords on
search engines in a misleading or confusing manner
 Deep linking: Bypassing target site’s home page and
linking directly to content page
 Framing: Displaying content of another site within frame or
window Slide 8-34
8.4 Governance
 Involves issue of social control
 Primary questions:
o Who will control Internet and e-commerce?
o What elements will be controlled and how?
 Stages of governance and e-commerce
o Government Control Period (1970–1994)
o Privatization (1995–1998)
o Self-Regulation (1995–present)
o Government Regulation (1998–present)
Slide 8-35
Who Governs E-commerce & the
Internet?
 Currently in a mixed mode policy environment
where self-regulation, through variety of Internet
policy and technical bodies, co-exists with
limited government regulation
 ICANN
 U.S. government vs. ITU
 Not true that Internet cannot be controlled. In
fact, Internet can be very easily controlled,
monitored, and regulated from a central location
(such as done by China, Singapore, etc.)
Slide 8-36
Taxation
 Issue of taxation of e-commerce sales illustrates
complexity of governance and jurisdiction issues
 National and international character of Internet sales
wreaking havoc on traditional taxation schemes in
U.S. based on local commerce and local jurisdictions
 October 2007: Congress extended tax moratorium on
“multiple or discriminatory taxes on electronic
commerce” for an additional seven years
 Unlikely that comprehensive, integrated rational
approach to taxation issue will be determined for
some time to come
Slide 8-37
Net Neutrality
 Currently, all Internet traffic treated equally – all
activities charged the same rate, no preferential
assignment of bandwidth
 Internet backbone providers would like to charge
differentiated prices and ration bandwidth by
pricing or speed (bandwidth controls)
Slide 8-38
8.5 Public Safety and Welfare
 Protection of children and strong
sentiments against pornography
 Passing legislation that will survive court
challenges has proved difficult:
 Communications Decency Act struck down
 Children’s Online Protection Act struck down (but still be
considered by lower courts)
 Children’s Internet Protection Act upheld by Supreme
Court (requires schools and libraries to install technology
protection measures)
 Efforts to control gambling and restrict
sales of drugs and cigarettes
 Currently mostly regulated by state law
 Unlawful Internet Gambling Enforcement Act
Slide 8-39
Slide 8-40

More Related Content

What's hot

What's hot (20)

Chapter 9
Chapter 9Chapter 9
Chapter 9
 
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISINGCHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
CHAPTER 6 E-COMMERCE MARKETING AND ADVERTISING
 
Chapter 1 introduction to e-commerce
Chapter 1   introduction to e-commerceChapter 1   introduction to e-commerce
Chapter 1 introduction to e-commerce
 
Sugar Crm
Sugar CrmSugar Crm
Sugar Crm
 
Turban ec2012 pp_01
Turban ec2012 pp_01Turban ec2012 pp_01
Turban ec2012 pp_01
 
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
03 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps slides
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
Digital Marketing
Digital MarketingDigital Marketing
Digital Marketing
 
Building E-commerce Presence
Building E-commerce PresenceBuilding E-commerce Presence
Building E-commerce Presence
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 1 DIGITAL MARKETING
Chapter 1 DIGITAL MARKETINGChapter 1 DIGITAL MARKETING
Chapter 1 DIGITAL MARKETING
 
Affiliate marketing (English)
Affiliate marketing (English)Affiliate marketing (English)
Affiliate marketing (English)
 
01 Introduction to E-commerce slides
01 Introduction to E-commerce slides01 Introduction to E-commerce slides
01 Introduction to E-commerce slides
 
E-Commerce Infrastructures
E-Commerce InfrastructuresE-Commerce Infrastructures
E-Commerce Infrastructures
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Clow imc8 inppt_01
Clow imc8 inppt_01Clow imc8 inppt_01
Clow imc8 inppt_01
 
The impact of Social Media on Marketing Strategy
The impact of Social Media on Marketing StrategyThe impact of Social Media on Marketing Strategy
The impact of Social Media on Marketing Strategy
 

Similar to C8-Ethical, Social, & Political Issues in Ecommerce.PPT

Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketinggaurav jain
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoJoel A. Gómez Treviño
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-finalDr. Donald Macfarlane
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.pptamreena6
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyDMI
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxwalterl4
 
Data Protection Centre Presentation 300123.pptx
Data Protection Centre Presentation 300123.pptxData Protection Centre Presentation 300123.pptx
Data Protection Centre Presentation 300123.pptxDhananjayBhardwaj13
 

Similar to C8-Ethical, Social, & Political Issues in Ecommerce.PPT (20)

EC358-CH8.ppt
EC358-CH8.pptEC358-CH8.ppt
EC358-CH8.ppt
 
Ethics, Law, and E-commerce
Ethics, Law, and E-commerceEthics, Law, and E-commerce
Ethics, Law, and E-commerce
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
Data protection & security breakfast briefing master slides 28 june-final
Data protection & security breakfast briefing   master slides 28 june-finalData protection & security breakfast briefing   master slides 28 june-final
Data protection & security breakfast briefing master slides 28 june-final
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 
Review questions
Review questionsReview questions
Review questions
 
Privacy Policy Primer
Privacy Policy PrimerPrivacy Policy Primer
Privacy Policy Primer
 
Ethical issues-extra
Ethical issues-extraEthical issues-extra
Ethical issues-extra
 
chapter5F.ppt
chapter5F.pptchapter5F.ppt
chapter5F.ppt
 
5362098
53620985362098
5362098
 
5362098
53620985362098
5362098
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Golden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacyGolden Gekko, 10 burning questions on privacy
Golden Gekko, 10 burning questions on privacy
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
 
Data Protection Centre Presentation 300123.pptx
Data Protection Centre Presentation 300123.pptxData Protection Centre Presentation 300123.pptx
Data Protection Centre Presentation 300123.pptx
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

C8-Ethical, Social, & Political Issues in Ecommerce.PPT

  • 1. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2009 Pearson Education, Inc. Slide 8-1 Chapter 8 Ethical, Social & Political Issues in E-commerce
  • 2. Chapter Outline 8.1 Understanding Ethical, Social & Political Issues in E-commerce 8.2 Privacy & Information Rights 8.3 Intellectual Property Rights 8.4 Governance 8.5 Public Safety & Welfare Slide 8-2
  • 3. 8.1 Understanding Ethical, Social & Political Issues in E-commerce  Internet technology and its use in e-commerce disrupts existing social & business relationships & understandings  Costs & benefits of technology must be carefully considered, especially when there are as yet no clear-cut legal or cultural guidelines Slide 8-3
  • 4. A Model for Organizing the Issues  Issues raised by Internet and e-commerce can be viewed at individual, social, and political levels  Four major categories of issues:  Information rights – personal information  Property rights – protected copies  Governance – public law  Public safety and welfare – access to Internet Slide 8-4
  • 5. The Moral Dimensions of an Internet Society Figure 8.1, Page 378 Slide 8-5
  • 6. Basic Ethical Concepts  Ethics o Study of principles used to determine right and wrong courses of action  Responsibility  Accountability  Liability o Laws permitting individuals to recover damages  Due process o Laws are known, understood o Ability to appeal to higher authorities to ensure laws applied correctly Slide 8-6
  • 7. Analyzing Ethical Dilemmas  Process for analyzing ethical dilemmas: 1. Identify and clearly describe the facts. 2. Define the conflict or dilemma and identify the higher-order values involved. 3. Identify the stakeholders. 4. Identify the options that you can reasonably take. 5. Identify the potential consequences of your options. Slide 8-7
  • 8. Candidate Ethical Principles  Well-established ethical principles can be used to help determine actions when confronted with an ethical dilemma:  Golden Rule  Universalism  Slippery Slope  Collective Utilitarian Principle  Risk Aversion  No Free Lunch  The New York Times Test (Perfect Information Rule)  The Social Contract Rule Slide 8-8
  • 9. 8.2 Privacy  Privacy: o Moral right of individuals to be left alone, free from surveillance or interference from other individuals or organizations  Information privacy: o Includes both the claim that certain information should not be collected at all, as well as the claim of individuals to control the use of whatever information is collected about them Slide 8-9
  • 10. E-commerce & Privacy  Major ethical issue related to e-commerce & privacy: o Under what conditions should we invade privacy of others?  Major social issue: o Development of “expectations of privacy” and privacy norms  Major political issue:  Development of statutes that govern relations between recordkeepers and individuals Slide 8-10
  • 11. Information Collected at E-commerce Sites  Personally identifiable information (PII): o Data that can be used to identify, locate, or contact an individual  Anonymous information: o Demographic and behavioral information that does not include any personal identifiers  Almost all e-commerce companies collect PII and use cookies to track clickstream behavior Slide 8-11
  • 12. Profiling & Behavioral Targeting  Profiling o Creation of digital images that characterize online individual and group behavior  Anonymous profiles o Identify people as belonging to very specific and targeted groups  Personal profiles: o Add personal identifiers  Advertising networks can: o Track consumer behavior and browsing behavior on the Web o Dynamically adjust what user sees on screen o Build and refresh high-resolution data images or behavior profiles of consumers Slide 8-12
  • 13. Profiling and Behavioral Targeting (cont’d)  Deep packet inspection o Records every keystroke at ISP level of everyone and uses information to make suggestions, target ads  Weblining: o Charging some customers more for products based on profiles  Network advertising firms: o Web profiling serves consumers and businesses  Critics: o Profiling undermines expectation of anonymity and privacy  Consumers: o Significant opposition to unregulated collection of personal information Slide 8-13
  • 14. The Internet & Government Invasions of Privacy  Various laws strengthen ability of law enforcement agencies to monitor Internet users without knowledge and sometimes without judicial oversight o CALEA, PATRIOT Act, Cyber Security Enhancement Act, Homeland Security Act  Government agencies are largest users of private sector commercial data brokers  Retention by ISPs of user data a concern Slide 8-14
  • 15. Legal Protections  May be explicitly granted or derived from constitutions (U.S., Canada, Germany)  May also be found in common law (U.S, England)  In U.S, also found in federal and state laws and regulations o First amendment – guarantees freedom of speech and association o Fourth amendment – protects against unreasonable search and seizure o Fourteenth amendment – guarantees due process Slide 8-15
  • 16. Informed Consent  Consent given with knowledge of all the material facts needed to make a rational decision  Two models: o Opt-in o Opt-out  Many U.S. e-commerce firms merely publish information practices as part of privacy policy without providing for any form of informed consent Slide 8-16
  • 17. The FTC’s Fair Information Practices Principles  U.S. Federal Trade Commission: o Conducts research and recommends legislation to Congress  FTC Fair Information Practice Principles (1998): o Notice/Awareness (Core) o Choice/Consent (Core) o Access/Participation o Security o Enforcement  Guidelines, not laws Slide 8-17
  • 18. FTC’s Fair Information Practice Principles Slide 8-18 Notice/Awareness Sites must disclose information practices before collecting data. Includes identification of collector, uses of data, other recipients of data, nature of collection (active/inactive), voluntary or required, consequences of refusal, and steps taken to protect confidentiality, integrity, and quality of the data Choice/Consent There must be a choice regime in place allowing consumers to choose how their information will be used for secondary purposes other than supporting the transaction, including internal use and transfer to third parties. Opt-in/Opt-out must be available. Access/Participation Consumers should be able to review and contest the accuracy and completeness of data collected about them in a timely, inexpensive process. Security Data collectors must take reasonable steps to assure that consumer information is accurate and secure from unauthorized use. Enforcement There must be in place a mechanism to enforce FIP principles. This can involve self-regulation, legislation giving consumers legal remedies for violations, or federal statutes and regulation.
  • 19. FTC Recommendations Regarding Online Profiling Slide 8-19 Principle Recommendation Notice Complete transparency to user by providing disclosure and choice options on the host Web site. “Robust” notice for PII (time/place of collection; before collection begins). Clear and conspicuous notice for non-PII. Choice Opt-in for PII, opt-out for non-PII. No conversion of non-PII to PII without consent. Opt-out from any or all network advertisers from a single page provided by the host Web site. Access Reasonable provisions to allow inspection and correction. Security Reasonable efforts to secure information from loss, misuse, or improper access. Enforcement Done by independent third parties, such as seal programs and accounting firms. Restricted Collection Advertising networks will not collect information about sensitive financial or medical topics, sexual behavior or sexual orientation, or use Social Security numbers for profiling.
  • 20. The European Directive on Data Protection  Privacy protection much stronger in Europe than in United States  European approach: Comprehensive and regulatory in nature  European Commission’s Directive on Data Protection: Standardizes and broadens privacy protection in European Union countries  Department of Commerce safe harbor program for U.S. firms that wish to comply with Directive Slide 8-20
  • 21. Private Industry Self-Regulation  Safe harbor: o Private, self-regulating policy and enforcement mechanism that meets objectives of government regulations and legislation, but does not involve government regulation or enforcement o e.g. Privacy seal programs (TRUSTe, BBB Reliability Seal)  Industry associations include: o Online Privacy Alliance (OPA) o Network Advertising Initiative (NAI)  Privacy advocacy groups o e.g. Epic.org Slide 8-21
  • 22. Technological Solutions to Privacy Invasion on the Web  Spyware, cookie, pop-up blockers  Platform for Privacy Preferences (P3P): o Comprehensive technological privacy protection effort sponsored by W3C o Standard for communicating to users a Web site’s privacy policy o Compares site policy to user’s preferences or to other standards such as FTC’s FIP guidelines or EU’s Data Protection Directive o Works through user’s Web browser Slide 8-22
  • 23. How P3P Works Figure 8.2(A), Page 396 Slide 8-23 SOURCE: W3C Platform for Privacy Preferences Initiative, 2003.
  • 25. 8.3 Intellectual Property Rights  Intellectual property: o Encompasses all tangible and intangible products of human mind  Major ethical issue: o How should we treat property that belongs to others?  Major social issue: o Is there continued value in protecting intellectual property in the Internet age?  Major political issue: o How can Internet and e-commerce be regulated or governed to protect intellectual property? Slide 8-25
  • 26. Types of Intellectual Property Protection  Three main types of intellectual property protection: o Copyright o Patent o Trademark law  The goal of intellectual property law is to balance two competing interests—the public and the private  Maintaining this balance of interests is always challenged by the invention of new technologies Slide 8-26
  • 27. Copyright: The Problem of Perfect Copies and Encryption  Copyright law: Protects original forms of expression (but not ideas) from being copied by others for a period of time  Look and feel copyright infringement lawsuits involve distinction between an idea and its expression  Fair use doctrine: Under certain circumstances, permits use of copyrighted materials without permission  Digital Millennium Copyright Act of 1998 (DMCA): First major effort to adjust copyright laws to Internet age o DMCA implements WIPO treaty that makes it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials Slide 8-27
  • 28. Patents: Business Methods and Processes  Patents: Grants owner a 20-year exclusive monopoly on ideas behind an invention o Machines, man-made products, compositions of matter, processing methods o Invention must be new, non-obvious, novel  Encourage inventors  Stifle competition by raising barriers to entry Slide 8-28
  • 29. E-commerce Patents  Business methods patents o Internet basic infrastructure, software developed via public programs, not patented o 1998 Federal court upheld claims to business method patent o U.S. Patent Office, European Patent Convention hold different standards o Examples:  Amazon’s One-click purchasing  DoubleClick’s Dynamic delivery of online advertising Slide 8-29
  • 30. Internet & E-commerce Business Method Patents Figure 8.3, Page 405 Slide 8-30 SOURCE: United States Patent and Trademark Office, 2008
  • 31. Patent Reform  Patent “trolls” – companies that collect patents and seek to enforce them  2007 House of Representatives patent reform bill o Change patent system from “first to invent” to “first to file” o New calculations for damages o Way to challenge out of court Slide 8-31
  • 32. Trademarks: Online Infringement & Dilution  Trademark: o Mark used to identify and distinguish goods, and indicate their source o Protects public by ensuring it gets what it pays for/expects to receive o Protects trademark owner against piracy and misappropriation  Infringement: Use of trademark that o Creates confusion with existing marks, causes consumers to make market mistakes, or o Misrepresents origins of goods Slide 8-32
  • 33. Trademarks: Online Infringement & Dilution (cont’d)  Dilution: Any behavior that weakens the connection between trademark and product  Federal Trademark Dilution Act (1995) o Extends protection to owners of famous trademarks against dilution Slide 8-33
  • 34. Trademarks & the Internet  Cybersquatting: Registration of domain name or other Internet use of existing trademark for purpose of extorting payments from legitimate owners  Cyberpiracy: Same behavior as cybersquatting, with intent of diverting traffic from legitimate site to infringing site  Metatagging: Using other’s trademarks as metatags in misleading or confusing manner  Keywording: Using other’s trademarks as keywords on search engines in a misleading or confusing manner  Deep linking: Bypassing target site’s home page and linking directly to content page  Framing: Displaying content of another site within frame or window Slide 8-34
  • 35. 8.4 Governance  Involves issue of social control  Primary questions: o Who will control Internet and e-commerce? o What elements will be controlled and how?  Stages of governance and e-commerce o Government Control Period (1970–1994) o Privatization (1995–1998) o Self-Regulation (1995–present) o Government Regulation (1998–present) Slide 8-35
  • 36. Who Governs E-commerce & the Internet?  Currently in a mixed mode policy environment where self-regulation, through variety of Internet policy and technical bodies, co-exists with limited government regulation  ICANN  U.S. government vs. ITU  Not true that Internet cannot be controlled. In fact, Internet can be very easily controlled, monitored, and regulated from a central location (such as done by China, Singapore, etc.) Slide 8-36
  • 37. Taxation  Issue of taxation of e-commerce sales illustrates complexity of governance and jurisdiction issues  National and international character of Internet sales wreaking havoc on traditional taxation schemes in U.S. based on local commerce and local jurisdictions  October 2007: Congress extended tax moratorium on “multiple or discriminatory taxes on electronic commerce” for an additional seven years  Unlikely that comprehensive, integrated rational approach to taxation issue will be determined for some time to come Slide 8-37
  • 38. Net Neutrality  Currently, all Internet traffic treated equally – all activities charged the same rate, no preferential assignment of bandwidth  Internet backbone providers would like to charge differentiated prices and ration bandwidth by pricing or speed (bandwidth controls) Slide 8-38
  • 39. 8.5 Public Safety and Welfare  Protection of children and strong sentiments against pornography  Passing legislation that will survive court challenges has proved difficult:  Communications Decency Act struck down  Children’s Online Protection Act struck down (but still be considered by lower courts)  Children’s Internet Protection Act upheld by Supreme Court (requires schools and libraries to install technology protection measures)  Efforts to control gambling and restrict sales of drugs and cigarettes  Currently mostly regulated by state law  Unlawful Internet Gambling Enforcement Act Slide 8-39