Cyber Security Issues on E-Commerce



Similar documents
Introduction to Information Management IIM, NCKU

Intellectual Property

Ethical and Social Issues in Information Systems

Legal and Ethical Aspects. IT 4823 Information Security Administration. Cybercrime / Computer Crime. Law Enforcement Challenges.

Syllabus E-Business and E-commerce

Protecting Your Ideas: An Introduction to Intellectual Property Rights. By Sasha G. Rao and Andrew J. Koning

ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.

Law & Ethics, Policies & Guidelines, and Security Awareness

Misappropriation of Trademarks on the Internet

E-Commerce Strategy. Electronic Commerce

UDRP extension beyond the domain name

Legal and Ethical Issues in Computer Security

LEGAL UPDATE THIRD PARTY POP-UP ADVERTISEMENTS: U-HAUL INT L, INC. V. WHENU.COM. Andrew J. Sinclair

Acceptable Use Policy

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Third Edition. Copyright 2007 Pearson Education, Inc.

Social and Legal Issues in Informatics

E-commerce Kenneth C. Laudon Carol Guercio Traver. business. technology. society. tenth edition

Intellectual Property. Litigation and. Enforcement PATENT, TRADEMARK COPYRIGHT. 360 IPR Management and IPR Audit

Wowprime Corporation Ethical Corporate Management Best Practice Principles

CYBER SECURITY STRATEGY AN OVERVIEW

PROTECT YOUR INTELLECTUAL PROPERTY

Research Topics in the National Cyber Security Research Agenda

Intellectual Property How to Protect Your Discovery. Technology Transfer Office

Intellectual Property

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

NATIONAL BOARD FOR CERTIFIED COUNSELORS (NBCC) CODE OF ETHICS

Marketers must: The Political, Legal, and Regulatory Environments of Global Marketing. Nation-States and Sovereignty. The Political Environment

Inventec Corporation Ethical Corporate Management Best Practice Principles

ELECTRONIC COMMERCE IN TOURISM

Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)

(Internet) for students, staff and, if requested, members of the Board of Education. All computer

Draft WGIG Issues Paper on E-Commerce

TEACHING OF INFORMATION ETHICS IN KENYA

Intellectual Property and Technology Law

Cablelynx Acceptable Use Policy

Web development, intellectual property, e-commerce & legal issues. Presented By: Lisa Abe

UNLV Intellectual Property Policy

PIRATES OF THE DIGITAL MILLENNIUM

Chapter One: Our Laws. Lessons: 1-1 Our Laws & Legal System 1-2 Types of Laws

Cyber Security Recommendations October 29, 2002

Open Source Software: Recent Developments and Public Policy Implications. World Information Technology and Services Alliance

RECOMMENDATION CONCERNING THE PROMOTION AND USE OF MULTILINGUALISM AND UNIVERSAL ACCESS TO CYBERSPACE

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

ACE Insurance Limited Co. Regn No H 600 North Bridge Road #08-01 Parkview Square Singapore

Overview. E-business. What is e-commerce. The difference between E-commerce and E-business. Why IT is not enough

The AppNexus audit evaluates creatives against the standards below.

Chapter 1 Introduction

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES

Act XLVIII of 2008 on Essential Conditions of and Certain Limitations to Business Advertising Activity

AGREEMENT AND TERMS OF USE

GUIDELINES FOR THE CUSTOMIZATION OF THE PATENT GUIDE INVENTING THE FUTURE - AN INTRODUCTION TO PATENTS FOR SMALL AND MEDIUM-SIZED ENTERPRISES

Maine Cernota & Rardin, Registered Patent Attorneys 547 Amherst St., 3 rd Floor, Nashua, NH info@mcr-ip.com

ACCEPTABLE USE POLICY OF BROADVOX, INC; BROADVOX, LLC; (COLLECTIVELY BROADVOX )

Acceptable Use Policy ("AUP")

Chapter 1- Introduction. Lecture 1

Terms of Use Gateway Clipper Website

Autoliv Business Conduct and Ethics for Suppliers

Professional issues. Una Benlic

PATENT INFORMATION. Cameron IP

NORTHERN VALLEY REGIONAL HIGH SCHOOL Office of Curriculum and Instruction. BUSINESS EDUCATION DEPARTMENT Demarest and Old Tappan

Legal and Ethical Aspects of Computer Hacking

PROCEDURES AND COSTS FOR PATENTS

HTC Communications Acceptable Use Policy High Speed Internet Service Page 1 of 5. HTC Communications

Intellectual Property

Ryerson Digital Media Zone Online Resources Patent Essentials

Legal Problems of Domain Name Registration in Thailand. Overview

SAMPLE EXAMINATION PAPER SAMPLE ANSWERS

Intellectual Property and Copyright

Chapter 1- Introduction. Lecture 1

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE

Acceptable Use and Publishing Policy

Guidelines for the National IP Strategy of the Republic of Macedonia ( ) Version 2

Administration and Management in Criminal Justice. Chapter 4: Environmental Influences

In an age where so many businesses and systems are reliant on computer systems,

How Fashion and Luxury Brands are Turning the Tide Against Rogue Websites

Canadian Legal Guide for Small Business

Transcription:

Cyber Security Issues on E-Commerce L.Madhava Reddy, Librarian, Andhra Muslim College, Guntur L.Jyothsna,B.Tech,ECM, K.L.University ABSTRACT: Cyber security is at a sensitive and critical juncture in the evolution of e-commerce. A major attack at this time, if successful, could significantly influence the future development of the e- commerce business model in general, and could have severe complexes for the victimized organization(s) in particular. This article advocates the issues in E-Commerce which are of different types, that may be ethical, social and political issues. Here the issues are described and the models to resolve the issues. INTRODUCTION: In today s digital environment, a broad spectrum of activities occur via the internet: commercial transactions between businesses and directly with consumers, the consumption of media and entertainment, the sharing of information, particularly sensitive data such as health care or banking records, not to mention social activities. Each day billions of transactionstake place on the web and in the process an individual s digital footprint increases in detail with sensitive and personal information. Advantages of E-Commerce: It s convenient. Not only can you shop from home and have it delivered to you, you also have an electronic record of purchases, payments and deliveries. There are a lot of different ways to pay: credit cards (including disposable or lowlimit cards), online payment services, gift cards, site credits, and so on, many of which allow us to control how much of our financial information we are sharing and how much money we can spend at a time. It has built-in safety tools: many sites are equipped with features such as icons and alerts that help us to protect ourselves from being scammed. If you use them, you make it much easier to keep your shopping safe. It s easy to do research before you buy by finding customer reviews on products, services, and even individual vendors/buyers online. Ethical, Social, and Political Issues in E- commerce: Internet, like other technologies, can: Enable new crimes, Affect environment and Threaten social values. Costs and benefits must be carefully considered, especially when there are no clear-cut legal or cultural guidelines. Basic Ethical Concepts: 66 www.ijdcst.com

Ethics-Study of principles used to determine right and wrong courses of action. Responsibility. Accountability. Liability-Laws permitting individuals to recover damages. Due process-laws are known, understood. Ability to appeal to higher authorities to ensure laws applied correctly. 1. Privacy and Information Rights: Privacy Analyzing Ethical Dilemmas: Process for analyzing ethical dilemmas: Moral right of individuals to be left alone, free from surveillance or interference from other individuals or organizations Identify and clearly describe the facts. Define the conflict or dilemma and identify the higher-order values involved. Identify the stakeholders. Identify the options that you can reasonably take. Identify the potential consequences of your options. Model for Organizing the Issues: Issues raised by Internet and e-commerce can be viewed at individual, social, and political levels. Four major categories of issues: 1. Information rights 2. Property rights 3. Governance 4. Public safety and welfare Information privacy Subset of privacy Includes both the claim that certain information should not be collected at all and the claim of individuals to control the use of whatever information is collected about them. Various laws strengthen ability of law enforcement agencies to monitor Internet users without knowledge and sometimes without judicial oversight. CALEA, PATRIOT Act, Cyber Security Enhancement Act, Homeland Security Act Government agencies are largest users of private sector commercial data brokers Retention by ISPs of user data a concern Major ethical issue related to e-commerce and privacy: Under what conditions should we invade privacy of others? Major social issue: Development of expectations of privacy and privacy norms. 67 www.ijdcst.com

Major political issue: Development of statutes that govern relations between record keepers and individuals. Information Collected at E-commerce Sites: Data collected includes Personally identifiable information (PII) and Anonymous information Types of data collected: Name, address, phone, e-mail, social security Bank and credit accounts, gender, age, occupation, education Preference data, transaction data, clickstream data, browser type Social Networks and Privacy: Social networks encourage sharing personal details and Pose unique challenge to maintaining privacy However, use of personal information for monetizing social networks has met backlash Facebook s Beacon program and Facebook s Terms of Service change 2. Property rights: Intellectual property: Encompasses all tangible and intangible products of human mind Major ethical issue: How should we treat property that belongs to others? Major social issue: Is there continued value in protecting intellectual property in the Internet age? Major political issue: How can Internet and e-commerce be regulated or governed to protect intellectual property? Intellectual Property Protection: Three main types of protection: 1. Copyright 2. Patent 3. Trademark law 4. Balance two competing interests public and private Maintaining this balance of interests is always challenged by the invention of new technologies. 1. Copyright law: Protects original forms of expression (but not ideas) from being copied by others for a period of time. Look and feel copyright infringement lawsuits and Fair use doctrine Digital Millennium Copyright Act, 1998: First major effort to adjust copyright laws to Internet age and it implements WIPO treaty that makes it illegal to make, distribute, or use devices that circumvent technology-based protections of copyrighted materials. 2. Patents: grants owner a 20-year monopoly on ideas behind an invention Four types of inventions: machines, manmade products, compositions of matter and processing methods Invention must be new, non-obvious, novel. 68 www.ijdcst.com

Benefits: Encourages inventors and Promotes dissemination of new techniques through licensing. Danger: Stifles competition by raising barriers to entry. 3. Trademarks: Identifies, distinguishes goods and indicates their source Ensures consumer gets what pays for/expects to receive Protects owner against piracy and misappropriation Infringement: use of trademark that Creates confusion with existing marks, causes consumers to make market mistakes, or Misrepresents origins of goods Dilution: Behavior that weakens connection between trademark and product. Trademarks and the Internet: Cybersquatting Cyberpiracy Metatagging Keywording Deep linking Framing 3. Stages of Governance and E-commerce: Government Control Period (1970 1994) Privatization (1995 1998) Self-Regulation (1995 present) Government Regulation (1998 present) 4. Public Safety and Welfare: Protection of children and strong sentiments against pornography Passing legislation that will survive court challenges has proved difficult: Communications Decency Act struck down Children s Online Protection Act struck down (but still be considered by lower courts) Children s Internet Protection Act upheld by Supreme Court (requires schools and libraries to install technology protection measures) Efforts to control gambling and restrict sales of drugs and cigarettes currently mostly regulated by state law and unlawful Internet Gambling Enforcement Act. REFERENCES: 1. E-Commerce 2010 sixth edition by Kenneth Laudon, Carol Guercio Traver. 2. Boehm, B. W. (1981), Software Engineering Economics, Prentice-Hall, New Jersey. 3. Chaffey, D. (2005) E-Business and E- Commerce, 2nd, Prentice Hall. 4. Conte, S. D., Dunsmore, H. E. and Shen, V. Y.(1986), Software Engineering Metrics and Models,Benjamin/Cummings, Menlo Park. 69 www.ijdcst.com

5. Davis, N., Humphrey, W., Redwine, Jr. S. T., Zibulski, G. and McGraw, G. (2004), Processes for Producing Secure Software, IEEE Security & Privacy, vol. 2, no. 3, 2004, pp. 18-25. 6. Fenton, N. E. (1991), Software Metrics - A Rigorous Approach, Chapman & Hall. 7. Galin, Daniel, (2004), Software Quality Assurance, Addison-Wesley. 8. Halaweh, M. and Fidler, C. (2008), Security Perception in E-commerce: Conflict between Customer and Organizational Perspectives, Proceedings of the International Conference on Computer Science and Information Technology, pp. 443 449. 9. Hall, A. and Chapman, R. (2002), Correctness by Construction: Developing a Commercial Secure System, IEEE Software, vol. 19, no. 1, pp.18-25. 10. Holcombe, C. (2007), Advanced Guide to ecommerce, LitLangs Publishing. 70 www.ijdcst.com