Академический Документы
Профессиональный Документы
Культура Документы
Need for Internet security Consumers buying products, trading stocks and banking online Credit-card, social security and confidential business information exchanged Security attacks Data theft and hacker attacks Wireless transmissions easier to intercept Secure transaction fundamentals Privacy: no third party Integrity: information unaltered Authentication: proving identities Non-repudiation: legal proof of message received
Issues in M-commerce
Availability
Network stays in operation continuously and are becoming wireless
Issues in M-commerce
There are number ethical and social issues arise from the growth of mobile computing devices, technologies and systems Privacy and access
Security Reliability
Electronic Commerce Prentice Hall 2006 3
Issues in M-commerce
Privacy and access: The ability to track workers and monitor mobile device users has social and ethical ramifications. Security: Wireless data communication is not as secure as wired data communication. Care and integrity of networked systems is an important principle of mobile systems. Reliability: Mobile systems need to possess the same robust levels of reliability as fixed-wire information systems
Electronic Commerce Prentice Hall 2006 4
Privacy
The right to be left alone and the right to be free of unreasonable personal intrusions Collecting Information about Individuals
Web Site Registration Cookies Spyware and Similar Methods RFIDs Threat to Privacy Privacy of Employees Privacy of Patients
Electronic Commerce
Privacy
Privacy is not the same as security. Wireless information systems contain personalized information like location of user, SIM card details Wireless systems must be built to prevent the deliberate /accidental violation of confidentiality. Cookies one of the greatest violations M-Commerce requires extensive systems knowledge of the movements.
Electronic Commerce Prentice Hall 2006 6
Location-based technology
May facilitate kidnapping and other illegal activities No legislation monitoring use of location-based technology Businesses fear legislation will slow development
World Wide Web Consortiums Platform for Privacy Preferences Project (P3P)
Companies release questionnaire asking user privacy desired
XML applications match user preferences with privacy protocols
Means of avoiding legislation Digital redlining: advertisers limit information seen by basing advertisements on users past behavior
Recording of personal activities is privacy issue
Privacy
Protection of Privacy
Notice/awareness Choice/consent opt-out clause Agreement that requires computer users to take specific steps to prevent the collection of personal information opt-in clause Agreement that requires computer users to take specific steps to allow the collection of personal information
Electronic Commerce Prentice Hall 2006 11
Privacy
Protection of Privacy
Access/participation Integrity/security Enforcement/redress
Electronic Commerce
12
Privacy
The USA Patriot Act
E-mail and Internet searches Nationwide roving wiretaps Requirement that ISPs hand over more user information Expanded scope of surveillance based on new definitions of terrorism Government spying on suspected computer trespassers with no need for court order Wiretaps for suspected violations of the Computer Fraud and Abuse Act
Prentice Hall 2006 13
Electronic Commerce
Privacy
Privacy Protection in Other Countries
In 1998, the European Union passed a privacy directive (EU Data Protection Directive) reaffirming the principles of personal data protection in the Internet age The directive aims to regulate the activities of any person or company that controls the collection, storage, processing, or use of personal data on the Internet
Electronic Commerce
14
Intellectual property Creations of the mind, such as inventions, literary and artistic works, and symbols, names, images, and designs, used in commerce.
Electronic Commerce
15
Electronic Commerce
Electronic Commerce
17
Electronic Commerce
19
Electronic Commerce
Electronic Commerce
21
Electronic Commerce
22
Make sure that Web content and activity comply with the laws in other countries Make sure that Web content and activity comply with the laws in other countries Make sure that the companys Web content policy is consistent with other company policies Appoint someone to monitor Internet legal and liability issues. Have attorneys review Web content to make sure that there is nothing unethical, or illegal, on the companys Web site
23
Electronic Commerce
Electronic Commerce
24
Solutions to Spamming
Electronic Commerce
25
On the Internet, censorship refers to governments attempt to control, in one way or another, the material that is presented Donhams First Law of Censorship. This semiserious precept states: Most citizens are implacably opposed to censorship in any form except censorship of whatever they personally happen to find offensive. Childrens Online Protection Act (COPA) exemplifies the protective approach
Prentice Hall 2006 26
Electronic Commerce
Electronic Commerce
27
Electronic Commerce
28
Electronic Commerce
29
Electronic Commerce
30
Electronic Commerce
31
identity theft A criminal act in which someone presents himself (herself) as another person and uses that persons social security number, bank account numbers, and so on, to obtain loans, purchase items, make obligations, sell stocks, etc.
Electronic Commerce
32
Electronic Commerce
Electronic Commerce
35
Societal Issues
digital divide The gap between those who have and those who do not have the ability to access electronic technology in general, and the Internet and EC in particular Other Societal Issues
Education Public safety, criminal justice, and homeland security Health aspects
Prentice Hall 2006 36
Electronic Commerce
Electronic Commerce
37
6. Community consulting firms 7. E-mail-based communities 8. Advocacy communities 9. CRM communities 10.Mergers and acquisitions activities
38
Electronic Commerce
3.
4.
Electronic Commerce
40