E-Commerce Ch 8 Quiz
Significance of social technology
Creates opportunities for cyberbullying, abusive language, and predation; challenges concepts of privacy, fair use, and consent to use posted information; creates new opportunities for suveillance by authorities and corporations into private lives
Golden Rule
Do unto others as you would have them do unto you
Property rights issue
How can traditional intellectual property rights be enforced in an internet world where everything can be copied and distributed so easily?
Slippery Slope
If an action cannot be taken repeatedly, then it not right to take at all
Universalism
If an action is not right for all situations, then it is not right for any specific situation
Information privacy
Includes both the claim that certain information should not be collected at all, as well as the claim of individuals to control the use of whatever information is collected about them
Ubiquity
Internet/Web technology available everywhere: work, home, and so on, anytime
Governance issue
Should the internet and e-commerce be subject to public laws?
Notice/awareness (core principle)
Sites must disclose their information practices before collecting data. Includes identification of collector, uses, recipients, nature of collection, consequences of refusal, and steps taken to protect confidentiality, integrity, and quality of the data.
Spyware blockers
Technological protection tool that detects and removes spyware, adware, keyloggers, and other malware
Secure e-mail
Technological protection tool that e-mail and document encryption
Ad blockers
Technological protection tool that prevents calls to ad servers; interferes with downloading of ad beacons
Global reach
The technology reaches across national boundaries, around Earth
Interactivity
The technology works through interaction with the user.
Significance of Ubiquity
Work and shopping can invade family life; shopping can distract workers at work, lowering productivity; use of mobile devices can lead to auto and industrial accidents. Presents confusing issues of 'nexus' to taxation authorities.
The Social Contract Rule
Would you like to live in a society where the principle you are supporting would become an organizing principle of the entire society?
Ethics
______ is at the heart of social and political debates about the Internet
Dilemma
a situation in which there are two diametrically opposed actions, each of which supports a desirable outcome
Deep packet inspection
a technology for recording every key stroke at the ISP level
Personal profiles
add a personal e-mail address, postal address, and/or phone number to behavioral data
Cyberlocker
an online file storage service dedicated to sharing copyrighted material illegally
Choice/consent (core principle)
consumers must be able to choose how information is used for secondary purposes other than supporting the transactions. Opt-in/opt-out must be available.
Anonymous information
demographic and behavioral information that does not include any personal identifiers
Anonymous profiles
identify people as belonging to highly specific and targeted groups
Digital wallets
internet information-gathering tool that uses client-side wallets and software that reveal personal information to Web sites verifying the identity of the consumer
Search engines
internet information-gathering tool used to trace user statements and views on newgroups, chat groups, and other public forums on the Web, and profile users' social and political views.
Advertising networks
internet information-gathering tool used to track individuals as they move among thousands of websites
Right to be forgotten
the claim of individuals to be able to edit and delete personal information online
Profiling
the creation of digital images that characterize online individual and group behavior
Private Advocacy Groups
- Epic.org - Privacyinternational.org - Cdt.org - Privacy.org - Privacyrights.org - Privacyalliance.org
Principles of FTC's Privacy Framework
- Scope - Privacy by Design - Simplified Choice - Greater Transparency
Four Basic Ethical Principles
1. Resonsibility 2. Accountability 3. Liability 4. Due process
Dimensions of E-Commerce Technology
1. Ubiquity 2. Global reach 3. Universal standards 4. Richness 5. Interactivity 6. Information density 7. Personaliz./Customiz. 8. Social technology
Safe harbor
A private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement
Restricted collection recommendation
Advertising networks will not collect information about sensitive financial or medical topics, sexual behavior or sexual orientation, or use social security numbers for profiling.
The New York Times Test (Perfect Info Rule)
Assume that the results of your decision on a matter will be the subject of the lead article in the New York Times the next day.
Policy generators
Automates the development of an OECD privacy compliance policy
Linking
Building hypertext links from one site to another site
Moral Dimensions of the Internet
- Information rights - Property rights - Governance - Public safety and welfare
Informed consent
Consent given with knowledge of all facts needed to make a rational decision
Security principle
Data collectors must take reasonable steps to assure that consumer information is accurate and secure from unauthorized use.
Cookie managers
Technological protection tool that prevents client computer from accepting cookies
Personalization/Customization
The technology allows personalized messages to be delivered to individuals as well as groups
Social technology
The technology enables user content generation and social networking
Enforcement Principle
There must be a mechanism to enforce FIP principles in place. This can involve self-regulation, legislation giving consumers legal remedies for violations, or federal statues and regulation
Universal standards
there is one set of technology standards, namely internet standards
Analyzing Ethical Dilemmas
1) identify and describe facts 2) define conflict and identify the higher order values involved 3) identify stakeholders 4) identify options that you can take 5) identify potential consequences of your options
Example Efforts to Preserve Privacy (ranked by popularity)
1. Cleared web history/cookies 2. Refused to provide info 3. Turned off cookies 4. Deleted an online post 5. Used temp name/address 6. Provided false info 7. Refused to use a website 8. Used public computer for anonymity 9. Got personal online info taken down 10. Encrypted communication 11. Used proxy server
Candidate Ethical Principles
1. Golden Rule 2. Universalism 3. Slippery Slope 4. Collective Utilitarian Principle 5. Risk Aversion 6. No Free Lunch 7. The New York Times Test 8. The Social Contract Rule
FTC Online Profiling Recommendations
1. Notice 2. Choice 3. Access 4. Security 5. Enforcement 6. Restricted collection
Significance of richness
A 'screen technology' that reduces use of text and potentially the ability to read by focusing instead of video and audio messages. Potentially very persuasive messages that may reduce reliance on multiple independent source of information.
Copyright law
Protects original forms of expression such as writings, art, drawings, photographs, music, motion pictures, performances, and computer programs from being copied by others for a minimum of 70 years
Security recommendation
Reasonable efforts to secure information from loss, misuse, or improper access
Access recommendation
Reasonable provisions to allow inspection and correction
Significance of Global reach
Reduces cultural diversity in products; weakens local small firms while strengthening large global firms; moves manufacturing production to low-wage areas of the world; weakens the ability of all nations - large and small - to control their information destiny
Pop-up blockers
Technological protection tool that prevents calls to ad servers that push pop-up, pop-under, and leave-behind ads; restricts downloading of images at user request
Anonymous remailers
Technological protection tool that sends e-mails without trace
Net neutrality
The concept that internet service providers should treat all internet traffic equally (or 'neutrally')
dilution
any behavior that would weaken the connection between the trademark and the product
Personally Identifiable Information (PII)
any data that can be used to identify, locate, or contact an individual - name, address, age, etc.
No Free Lunch
assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise
Access/participation principle
consumers must be able to review and contest accuracy and completeness of personal data collected about them in a timely, inexpensive process.
Trusted computing environments
internet information-gathering tool that uses hardware and software that controls the viewing of copyrighted content and requires users' identification
Digital rights management
internet information-gathering tool that uses software that requires users of online media to identify themselves before viewing copyrighted content
Site transaction logs
internet information-gathering tool used to collect and analyze detailed information on page content viewed by users
Shopping carts
internet information-gathering tool used to collect detailed payment and purchase information
Search engine behavioral targeting
internet information-gathering tool used to collection demographic and geographic information to be used for targeted advertising
Social networks
internet information-gathering tool used to gather information on user-provided content such as books, music, and friends.
Web forms
internet information-gathering tool used to gather voluntary information in return for a promised benefit or reward that is linked with clickstream or other behavioral data to create personal profiles
Deep packet inspection
internet information-gathering tool used to install software at the ISP level to track all user clickstream behavior
Third-party cookies (beacons)
internet information-gathering tool used to monitor and track online behavior, searches, and sites visited that belong to an advertising network - helps to display relevant ads
Spyware
internet information-gathering tool used to record keyboard activity such as sites visited or passwords entered - can also help display ads based on behavior
Cookies and Super Cookies
internet information-gathering tool used to track individuals at a single site. Super cookies are nearly impossible to identify or remove
Smartphones and apps
internet information-gathering tool used to track location and share photos, addresses, phone numbers, search, and other behavior to marketers.
Opt-in model
requires an affirmative action by the consumer to allow collection and use of consumer information
Collective Utilitarian Principle
take the action that achieves the greater value for all of society
Risk Aversion
take the action that produces the least harm or the least potential cost
Opt-out model
the default is to collect information unless the consumer takes an affirmative action to prevent the collection of data
Digital Millennium Copyright Act (DMCA)
the first major effor to adjust the copyright laws to the internet age
Ethics
the study of principles that individuals and organizations can use to determine right and wrong courses of action
Information density
the technology works through interaction with the user.
Notice recommendation
Complete transparency to user by providing diclosure and chocie options on the host Web site. 'Robust' notice for PII (time/place of collection; before collection begins). Clear and conspicuous notice for non-PII.
Disk/file erasing programs
Completely erases hard drive and floppy files
*Note: pgs 515-516 have fed and state privacy laws - would be an extra 20ish terms.
Consider adding depending on quizlet length.
Anticybersquatting Consumer Protection Act (ACPA)
Creates civil liabilities for anyone who attempts in bad faith to profit from an existing famous or distinctive trademark by registering an internet domain name that is identical or confusingly similar to, or 'dilutive' of, that trademark
Enforcement recommendation
Done by independent third parties, such as seal programs and accounting firms.
Governance
Has to do with social control: who will control e-commerce, what elements will be controlled and how will the controls be implemented
Significance of universal standards
Increases vulnerability to viruses and hacking attacks worldwide, affecting millions of people at once. Increases the likelihood of 'information' crime, crimes against systems, and deceptions
Deep linking
Involves bypassing the target site's home page, and going directly to a content page
Framing
Involves displaying the content of another Web site inside your own Web site within a frame or window
Cybersquatting
Involves the registration of an infringing domain name, or other internet use of an existing trademark, for the purpose of extorting payments from the legitimate
Cyberpiracy
Involves the same behavior as cybersquatting, but with the intent of diverting traffic from the legitimate site to an infrginging site
Linking
Linking to content pages on other sites, bypassing the home page
FTC's Fair Information Practice Principles
Notice/awareness Choice/consent Access/participation Security Enforcement
Significance of personalization/customization
Opens up the possibility of intensive invasion of privacy for commercial and governmental purposes that is unprecedented
Choice recommendation
Opt-in for PII, opt-out for non-PII. No conversion of non-PII to PII without consent. Opt-out from any or all network advertisers from a single page provided by the host Web site.
Framing
Placing the content of other sites in a frame on the infringer's site
Keywording
Placing trademarked keywords on Web pages, either visible or invisible
Public Key Encryption
Program that encrypts your mail and documents
Privacy
The moral right of individuals to be left alone, free from surveillance or interference from other indiviuals or organizations, including the state.
Significance of interactivity
The nature of interactivity at commercial sites can be shallow and meaningless. Customer e-mails are frequently not read by human beings. Customers do not really 'co-produce' the product as much as they 'co-produce' the sale. The amount of customization of products is minimal, occuring within predefined platforms and plug-ins.
Doctrine of fair use
Under certain circumstances, permits use of copyrighted material without permission
Metatagging
Using trademarked words in a site's metatags
Richness
Video, audio, and text messages are possible
Public safety and welfare issue
What efforts should be undertaken to ensure equitable access to the internet and e-commerce channels? Should internet content be monitored more strictly?
Information rights issue
What rights to their own personal information do individuals have?
Significance of information density
While the total amount of information available to all parties increases, so does the possibility of false and misleading information, unwanted information, and invasion of solitude, Trust, authenticity, accuracy, completeness, and other quality features of information can be degraded. The ability of individuals and organizations to make sense out of this plethora of information is limited.
