Professional Documents
Culture Documents
Ethics—the branch of philosophy that deals with what is considered to be right and wrong
Ethical issues are not governed by a set of rules and thereby are not punishable by law.
Legal issues have a set of rules on which they are based and are punishable by law if those
rules are not adhered by.
What is legal can be unethical. For example, the firing of an employee by a company is not
illegal but may be unethical.
What is ethical can be illegal. For example, euthanasia may be viewed as ethical, but it is
illegal in most jurisdictions.
Compiled: Er. Ayush Shrestha
MP3, Napster, and Intellectual Property Rights 7
The Problem
Copyright laws and copyright cases have been in existence for years but:
Were not written for digital content
Financial gain loophole was not closed
The Results
• In violation of the state’s Consumer Protection Act and asked it to stop placing
cookies on consumers’ computers without their permission
• In January 2001, the FTC ruled that DoubleClick had not violated FTC policies
DoubleClick agreed to enhance its privacy measures and to pay legal fees
and costs up to $18 million
Registration questionnaires
50% disclose personal information on a Web site for the chance to win a
sweepstakes
Personal information collected via cookies has the potential to be used in illegal and
unethical ways
Choice/consent
Access/participation
Integrity/security
Enforcement/redress
© ®
Copyright—an exclusive grant from the government that allows the owner to
reproduce a work, in whole or in part, and to distribute, perform, or display it to the
public in any form or manner, including the Internet
• Take legal action to prevent anyone from using trademark without consent
Patent—a document that grants the holder exclusive rights on an invention for a fixed
number of years
• “ Most citizens are implacably opposed to censorship in any form — except censorship of
whatever they personally happen to find offensive.”
• Citizen action groups desiring to protect every ounce of their freedom to speak
Fraud
Cyber attack
Original hackers created the Unix operating system and helped build the Internet, Usenet, and
World Wide Web; and, used their skills to test the strength and integrity of computer systems
Over time, the term hacker came to be applied to rogue programmers who illegally break into
computers and networks
Crackers
People who engage in unlawful or damaging hacking short for “criminal hackers”
Other attackers
“Script kiddies” are ego-driven, unskilled crackers who use information and software (scripts)
that they download from the Internet to inflict damage on targeted sites
Authorization
The process that ensures that a person has the right to access certain resources
Authentication
The process by which one entity verifies that another entity is who they claim to be
by checking credentials of some sort
Confidentiality (privacy)
Integrity
Availability
Nonrepudiation
The ability to limit parties from refuting that a legitimate transaction took place, usually by
means of a signature
Technical attack
Nontechnical attack
Malware
Worm
A software program that runs independently, consuming the resources of its host
from within in order to maintain itself and propagating a complete working
version of itself onto another machine
Trojan horse
A program that appears to have a useful function but that contains a hidden
function that presents a security risk
Managerial Issues
What sorts of legal and ethical issues should be of major concern to an EC enterprise?
Assignment
Deadline: 3rd March 2019
Thank You
Any Question?