Professional Documents
Culture Documents
Prepared by Dr.Lakshmi.H
2
Global markets
• Globalization- changed the way-
marketers conduct business-
physical distance reduced-
advancements in
telecommunication and computer
technologies- lot of opportunities
for e marketing
• E marketers assess the country’s
market opportunity and market
conditions before selection of
specific targets for entry
4
Electricity problems
• Nepal- less developed countries- rich in natural resources
• Through UN & other international aids- Nepal built series of
hydroelectric dams- 0nly 15% of households have dams
• NEA (Nepal Electrical Authority)- could not generate
electricity- 6-12 hours of blackout
• Similar condition with china Zimbawe and other countries,
India
11
Solution
Through a countrywide digital literacy campaign N Ravi Shanker,
CMD of Bharat Broadband Network (BBNL), the government
entity charged with deploying a Rs 20,000-crore National Fibre
Optic Network, says, “We need pan-India digital literacy
campaigns and missions that are aligned to existing literacy and
education programmes like the National Literacy Mission and the
Sarva Shiksha Abhiyan. We should aim to make at least one
person in each household computer-literate.”
12
Privacy
• Privacy- can be defined as “right to be left alone”
• Lawsuits for invasion of privacy: 4 categories
1. Unreasonable intrusion seclusion of another
2. Unreasonable publicity of another private life
3. Appropriation of another’s name or likeness
4. Publication of another’s personal information in a false light
• Later theories evolved:
1. Seclusion theory:
• This model encourages law and ethical standards that are
oriented towards maintaining personal and punishing those
who cross the limits set by the individual
20
2. Access control:
• Emphasis on laws and standards that enables person to
reasonably regulate the information that they are giving up
• Empower individuals to protect personal material form
unauthorized release
• Eg: Details on FB
3. Autonomy model:
• Empowering individuals to decide whether to give information
are not
• Eg: credit cards, frequent flyer programs, security precautions
in airport etc
21
• DoubleClick is a subsidiary
of Google which develops and provides
Internet ad serving services.
• Its clients include agencies, and
publishers who serve customers
like Microsoft, General Motors, Coca-
Cola,Motorola, L'Oréal, Apple
Inc., Visa USA, Nike etc among others.
• DoubleClick's headquarters is in New
York City, United States.
• Internet advertiser DoubleClick and
market researcher Abacus Direct have
won shareholder approval to merge in
a deal estimated to be worth $1.7
billion, bringing together droves of
consumer marketing information.
23
Digital Property
• Primary function of law is ownership- challenging coz of
widespread use of internet
• So law protects protect intangible or intellectual property
through 3 basic mechanisms
Patents
• Mainly for invention but not for computer software- codes
algorithms and formulas are generic in nature- so cannot be
owned by anyone
• Current focus- business patents- marketing activities and
approaches, methods for conducting commerce online
27
Copyright
• Copyright is a bundle of rights given by the law to the
creators of literary, dramatic, musical and artistic
works and the producers of cinematograph films and
sound recordings.
Trademarks
• Concerned with ownership of intellectual property that
identifies goods or services
• Lanham Act:
• Trademarks may be registered with the government,
registered or not, may still be protect under this act
• Claimants must prove that trademark is protectable- more
distinctive
• This act also prohibits dilution- use of famous trademarks in
association with different goods or services in manner-
lessening its uniqueness
30
Metatags
• Are HTML statements that describes website contents
• They allow search engines to identify relevant sites to topics
of their inquiries
• Variation of metatag problem is found in practice of assigning
keywords- within search engines
• Eg: cosmetic manufacturer Estee Lauder sued Excite- alleging
entry of trademark to unlicensed dealer
• Framing:
• A process in which web browser is instructed to divide itself
into 2 or more partitions and load within a section obtained
form another website through execution of automatic link
32
Licenses
• Popular method of Intellectual property protection- involves
use of license
• Consist of contractual agreements made between consumers
and software vendors- allow the buyer to use the product but
restrict duplication or distribution
• Types of software validity are:
1. Shrink-wrap or break the seal licenses: appears outside the
software
2. Click-wrap licenses: user is required to click the button
online or within a program to acknowledge acceptance of
terms
• Shrink-wrap- vendors error, whereas click wrap legally
enforceable
33
Data Ownership
• Website usage is much easy and access is often shared by
site owners, marketing professionals, advertisers and
consumers
• Click data- new technology- collect data who access the ad
information
• Spidering:
• This process involves use of software applications called
‘robots’- to enter targeted websites and obtain data for the
use of its owner
35
Online Expression
• Mass distribution of unsolicited email is a major concern
• Spam, by definition, unrequested and users complain of
unwanted intrusion into their affairs
• Many users are disturbed that to find information given to
individuals or entities for one purpose is collected and sold
for mass distribution
• AMA code of ethics addresses spam problem as “the
expressed wishes of others should be respected with regard
to the receipt of unsolicited email messages”
• Opt out list to those who seek to avoid mass email messages
• Currently illicit spam consisting of deceptive, misleading
statements, false representation of email content as displayed
on the subject line
36
• Cybercrime.mp4
38
Cyber Crime
• Cyber crimes can involve criminal activities that are traditional in
nature, such as theft, fraud, forgery, defamation and mischief, all of
which are subject to the Indian Penal Code.
• The abuse of computers has also given birth to a gamut of new age
crimes that are addressed by the Information Technology Act, 2000.
8. IPR Violations:-
• These include software piracy, copyright
infringement, trademarks violations, theft of
computer source code, patent violations.
etc.
Is a nonprofit
organization that is
• Cyber Squatting- Domain names are also responsible for
trademarks and protected by ICANN’s coordinating the
(The Internet Corporation for Assigned maintenance and
Names and Numbers) domain dispute methodologies of
several databases, with
resolution policy and also under trademark unique identifiers,
laws. related to the
namespaces of
the Internet - and
• Cyber Squatters registers domain name
thereby, ensuring the
identical to popular service provider’s network's stable and
domain so as to attract their users and get secure operation
benefit from it.
44
Cyber Security
• Computer security, also known
as cyber security or IT security, is
the protection of information
systems from theft or damage to
the hardware, the software, and to
the information on them, as well as
from disruption or misdirection of the
services they provide.
Backdoors
• A backdoor in a computer system, a cryptosystem or an
algorithm, is any secret method of bypassing normal
authentication or security controls.
Denial-of-service attack
• Denial of service attacks are designed to make a machine or
network resource unavailable to its intended users.
• Attackers can deny service to individual victims, such as by
deliberately entering a wrong password enough consecutive
times to cause the victim account to be locked, or they may
overload the capabilities of a machine or network and block all
users at once.
• System will be attacked with more applications which it cannot
handle
• Such attacks can originate from the zombie computers of
a botnet, where innocent systems are fooled into sending traffic
to the victim.
56
Eavesdropping Spoofing
• Eavesdropping is the act of • Spoofing of user identity
surreptitiously listening to a describes a situation in which
private conversation, typically one person or program
between hosts on a network. successfully masks as another
• For instance, programs such by falsifying data.
as Carnivore and NarusInsight
have been used by
the FBI and NSA to eavesdrop
• Tampering
on the systems of internet • Tampering describes a
service providers. malicious modification of
products.
• Even machines that operate as
a closed system (i.e., with no • So-called "Evil Maid"
contact to the outside world) attacks and security services
can be eavesdropped upon via planting of surveillance
monitoring the faint electro- capability into routers[ are
magnetic transmissions examples.
generated by the hardware
58
Clickjacking
• Clickjacking, also known as "UI redress attack or User Interface
redress attack", is a malicious technique in which an attacker
tricks a user into clicking on a button or link on another
webpage while the user intended to click on the top level page.
• The attacker is basically "hijacking" the clicks meant for the top
level page and routing them to some other irrelevant page,
most likely owned by someone else. A similar technique can be
used to hijack keystrokes.
• Carefully drafting a combination of stylesheets, frames, buttons
and text boxes, a user can be led into believing that they are
typing the password or other information on some authentic
webpage while it is being channeled into an invisible frame
controlled by the attacker.
60
Systems at risk
1. Financial systems: credit card numbers and bank
account, ATMS