E-Commerce Ch 8 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Significance of social technology

Creates opportunities for cyberbullying, abusive language, and predation; challenges concepts of privacy, fair use, and consent to use posted information; creates new opportunities for suveillance by authorities and corporations into private lives

Golden Rule

Do unto others as you would have them do unto you

Property rights issue

How can traditional intellectual property rights be enforced in an internet world where everything can be copied and distributed so easily?

Slippery Slope

If an action cannot be taken repeatedly, then it not right to take at all

Universalism

If an action is not right for all situations, then it is not right for any specific situation

Information privacy

Includes both the claim that certain information should not be collected at all, as well as the claim of individuals to control the use of whatever information is collected about them

Ubiquity

Internet/Web technology available everywhere: work, home, and so on, anytime

Governance issue

Should the internet and e-commerce be subject to public laws?

Notice/awareness (core principle)

Sites must disclose their information practices before collecting data. Includes identification of collector, uses, recipients, nature of collection, consequences of refusal, and steps taken to protect confidentiality, integrity, and quality of the data.

Spyware blockers

Technological protection tool that detects and removes spyware, adware, keyloggers, and other malware

Secure e-mail

Technological protection tool that e-mail and document encryption

Ad blockers

Technological protection tool that prevents calls to ad servers; interferes with downloading of ad beacons

Global reach

The technology reaches across national boundaries, around Earth

Interactivity

The technology works through interaction with the user.

Significance of Ubiquity

Work and shopping can invade family life; shopping can distract workers at work, lowering productivity; use of mobile devices can lead to auto and industrial accidents. Presents confusing issues of 'nexus' to taxation authorities.

The Social Contract Rule

Would you like to live in a society where the principle you are supporting would become an organizing principle of the entire society?

Ethics

______ is at the heart of social and political debates about the Internet

Dilemma

a situation in which there are two diametrically opposed actions, each of which supports a desirable outcome

Deep packet inspection

a technology for recording every key stroke at the ISP level

Personal profiles

add a personal e-mail address, postal address, and/or phone number to behavioral data

Cyberlocker

an online file storage service dedicated to sharing copyrighted material illegally

Choice/consent (core principle)

consumers must be able to choose how information is used for secondary purposes other than supporting the transactions. Opt-in/opt-out must be available.

Anonymous information

demographic and behavioral information that does not include any personal identifiers

Anonymous profiles

identify people as belonging to highly specific and targeted groups

Digital wallets

internet information-gathering tool that uses client-side wallets and software that reveal personal information to Web sites verifying the identity of the consumer

Search engines

internet information-gathering tool used to trace user statements and views on newgroups, chat groups, and other public forums on the Web, and profile users' social and political views.

Advertising networks

internet information-gathering tool used to track individuals as they move among thousands of websites

Right to be forgotten

the claim of individuals to be able to edit and delete personal information online

Profiling

the creation of digital images that characterize online individual and group behavior

Private Advocacy Groups

- Epic.org - Privacyinternational.org - Cdt.org - Privacy.org - Privacyrights.org - Privacyalliance.org

Principles of FTC's Privacy Framework

- Scope - Privacy by Design - Simplified Choice - Greater Transparency

Four Basic Ethical Principles

1. Resonsibility 2. Accountability 3. Liability 4. Due process

Dimensions of E-Commerce Technology

1. Ubiquity 2. Global reach 3. Universal standards 4. Richness 5. Interactivity 6. Information density 7. Personaliz./Customiz. 8. Social technology

Safe harbor

A private self-regulating policy and enforcement mechanism that meets the objectives of government regulators and legislation but does not involve government regulation or enforcement

Restricted collection recommendation

Advertising networks will not collect information about sensitive financial or medical topics, sexual behavior or sexual orientation, or use social security numbers for profiling.

The New York Times Test (Perfect Info Rule)

Assume that the results of your decision on a matter will be the subject of the lead article in the New York Times the next day.

Policy generators

Automates the development of an OECD privacy compliance policy

Linking

Building hypertext links from one site to another site

Moral Dimensions of the Internet

- Information rights - Property rights - Governance - Public safety and welfare

Informed consent

Consent given with knowledge of all facts needed to make a rational decision

Security principle

Data collectors must take reasonable steps to assure that consumer information is accurate and secure from unauthorized use.

Cookie managers

Technological protection tool that prevents client computer from accepting cookies

Personalization/Customization

The technology allows personalized messages to be delivered to individuals as well as groups

Social technology

The technology enables user content generation and social networking

Enforcement Principle

There must be a mechanism to enforce FIP principles in place. This can involve self-regulation, legislation giving consumers legal remedies for violations, or federal statues and regulation

Universal standards

there is one set of technology standards, namely internet standards

Analyzing Ethical Dilemmas

1) identify and describe facts 2) define conflict and identify the higher order values involved 3) identify stakeholders 4) identify options that you can take 5) identify potential consequences of your options

Example Efforts to Preserve Privacy (ranked by popularity)

1. Cleared web history/cookies 2. Refused to provide info 3. Turned off cookies 4. Deleted an online post 5. Used temp name/address 6. Provided false info 7. Refused to use a website 8. Used public computer for anonymity 9. Got personal online info taken down 10. Encrypted communication 11. Used proxy server

Candidate Ethical Principles

1. Golden Rule 2. Universalism 3. Slippery Slope 4. Collective Utilitarian Principle 5. Risk Aversion 6. No Free Lunch 7. The New York Times Test 8. The Social Contract Rule

FTC Online Profiling Recommendations

1. Notice 2. Choice 3. Access 4. Security 5. Enforcement 6. Restricted collection

Significance of richness

A 'screen technology' that reduces use of text and potentially the ability to read by focusing instead of video and audio messages. Potentially very persuasive messages that may reduce reliance on multiple independent source of information.

Copyright law

Protects original forms of expression such as writings, art, drawings, photographs, music, motion pictures, performances, and computer programs from being copied by others for a minimum of 70 years

Security recommendation

Reasonable efforts to secure information from loss, misuse, or improper access

Access recommendation

Reasonable provisions to allow inspection and correction

Significance of Global reach

Reduces cultural diversity in products; weakens local small firms while strengthening large global firms; moves manufacturing production to low-wage areas of the world; weakens the ability of all nations - large and small - to control their information destiny

Pop-up blockers

Technological protection tool that prevents calls to ad servers that push pop-up, pop-under, and leave-behind ads; restricts downloading of images at user request

Anonymous remailers

Technological protection tool that sends e-mails without trace

Net neutrality

The concept that internet service providers should treat all internet traffic equally (or 'neutrally')

dilution

any behavior that would weaken the connection between the trademark and the product

Personally Identifiable Information (PII)

any data that can be used to identify, locate, or contact an individual - name, address, age, etc.

No Free Lunch

assume that virtually all tangible and intangible objects are owned by someone else unless there is a specific declaration otherwise

Access/participation principle

consumers must be able to review and contest accuracy and completeness of personal data collected about them in a timely, inexpensive process.

Trusted computing environments

internet information-gathering tool that uses hardware and software that controls the viewing of copyrighted content and requires users' identification

Digital rights management

internet information-gathering tool that uses software that requires users of online media to identify themselves before viewing copyrighted content

Site transaction logs

internet information-gathering tool used to collect and analyze detailed information on page content viewed by users

Shopping carts

internet information-gathering tool used to collect detailed payment and purchase information

Search engine behavioral targeting

internet information-gathering tool used to collection demographic and geographic information to be used for targeted advertising

Social networks

internet information-gathering tool used to gather information on user-provided content such as books, music, and friends.

Web forms

internet information-gathering tool used to gather voluntary information in return for a promised benefit or reward that is linked with clickstream or other behavioral data to create personal profiles

Deep packet inspection

internet information-gathering tool used to install software at the ISP level to track all user clickstream behavior

Third-party cookies (beacons)

internet information-gathering tool used to monitor and track online behavior, searches, and sites visited that belong to an advertising network - helps to display relevant ads

Spyware

internet information-gathering tool used to record keyboard activity such as sites visited or passwords entered - can also help display ads based on behavior

Cookies and Super Cookies

internet information-gathering tool used to track individuals at a single site. Super cookies are nearly impossible to identify or remove

Smartphones and apps

internet information-gathering tool used to track location and share photos, addresses, phone numbers, search, and other behavior to marketers.

Opt-in model

requires an affirmative action by the consumer to allow collection and use of consumer information

Collective Utilitarian Principle

take the action that achieves the greater value for all of society

Risk Aversion

take the action that produces the least harm or the least potential cost

Opt-out model

the default is to collect information unless the consumer takes an affirmative action to prevent the collection of data

Digital Millennium Copyright Act (DMCA)

the first major effor to adjust the copyright laws to the internet age

Ethics

the study of principles that individuals and organizations can use to determine right and wrong courses of action

Information density

the technology works through interaction with the user.

Notice recommendation

Complete transparency to user by providing diclosure and chocie options on the host Web site. 'Robust' notice for PII (time/place of collection; before collection begins). Clear and conspicuous notice for non-PII.

Disk/file erasing programs

Completely erases hard drive and floppy files

*Note: pgs 515-516 have fed and state privacy laws - would be an extra 20ish terms.

Consider adding depending on quizlet length.

Anticybersquatting Consumer Protection Act (ACPA)

Creates civil liabilities for anyone who attempts in bad faith to profit from an existing famous or distinctive trademark by registering an internet domain name that is identical or confusingly similar to, or 'dilutive' of, that trademark

Enforcement recommendation

Done by independent third parties, such as seal programs and accounting firms.

Governance

Has to do with social control: who will control e-commerce, what elements will be controlled and how will the controls be implemented

Significance of universal standards

Increases vulnerability to viruses and hacking attacks worldwide, affecting millions of people at once. Increases the likelihood of 'information' crime, crimes against systems, and deceptions

Deep linking

Involves bypassing the target site's home page, and going directly to a content page

Framing

Involves displaying the content of another Web site inside your own Web site within a frame or window

Cybersquatting

Involves the registration of an infringing domain name, or other internet use of an existing trademark, for the purpose of extorting payments from the legitimate

Cyberpiracy

Involves the same behavior as cybersquatting, but with the intent of diverting traffic from the legitimate site to an infrginging site

Linking

Linking to content pages on other sites, bypassing the home page

FTC's Fair Information Practice Principles

Notice/awareness Choice/consent Access/participation Security Enforcement

Significance of personalization/customization

Opens up the possibility of intensive invasion of privacy for commercial and governmental purposes that is unprecedented

Choice recommendation

Opt-in for PII, opt-out for non-PII. No conversion of non-PII to PII without consent. Opt-out from any or all network advertisers from a single page provided by the host Web site.

Framing

Placing the content of other sites in a frame on the infringer's site

Keywording

Placing trademarked keywords on Web pages, either visible or invisible

Public Key Encryption

Program that encrypts your mail and documents

Privacy

The moral right of individuals to be left alone, free from surveillance or interference from other indiviuals or organizations, including the state.

Significance of interactivity

The nature of interactivity at commercial sites can be shallow and meaningless. Customer e-mails are frequently not read by human beings. Customers do not really 'co-produce' the product as much as they 'co-produce' the sale. The amount of customization of products is minimal, occuring within predefined platforms and plug-ins.

Doctrine of fair use

Under certain circumstances, permits use of copyrighted material without permission

Metatagging

Using trademarked words in a site's metatags

Richness

Video, audio, and text messages are possible

Public safety and welfare issue

What efforts should be undertaken to ensure equitable access to the internet and e-commerce channels? Should internet content be monitored more strictly?

Information rights issue

What rights to their own personal information do individuals have?

Significance of information density

While the total amount of information available to all parties increases, so does the possibility of false and misleading information, unwanted information, and invasion of solitude, Trust, authenticity, accuracy, completeness, and other quality features of information can be degraded. The ability of individuals and organizations to make sense out of this plethora of information is limited.


Ensembles d'études connexes

¿Cómo te llamas? + ¡Hola! +¿Cómo estás? + ¿Cuántos años tienes? (Español/Inglés/Imágenes)

View Set

SPC Saint Petersburg College A&P 1 Chapter 1

View Set

Chapter 13&14: Fluid, Electrolytes and Shock

View Set