...that exist in the form of bits and bytes activated by electromagnetic energy and made powerful by IT and the internet-has changed the way we relate to one another. It has also revolutionized economics and business”. The authors state that while e-commerce, the sale of goods over the internet, has boosted online sales, especially products like books, CDs and computer products; it has also raised important new ethical challenges. These challenges revolve around four main issues: security, privacy, identity and transaction non-refutability. There is no doubt that a new ethical dilemma has arisen and these authors propose two universal principles that must be upheld by internet commerce. The first ethical challenge of internet commerce is security, commonly referred to as “hacking”, ‘cracking”, or “page jacking”. Internet security breaches involve trespassing or breaking into computer networks, websites, and mailboxes. Hackers will steal information from confidential files, steal services or damage a system by swamping a PC, a server or a network. The second ethical challenge relates to privacy, which involves protecting the collection, storage, processing, disseminating and destruction of personal information. They continue that no one is anonymous on-line and what is nirvana for direct marketers is a nightmare for any consumer who wants to protect his or her privacy. On-line advertising can be targeted with great precision today, thanks to “cookies”, a mall text files that...
Words: 730 - Pages: 3
...Abstract Have you ever bought anything on the Internet with your credit or debit card? Do you think other people wouldn't like to buy things with your cards, too? Have you ever given out personal information to register for a contest or special event on the Web? If so, beware. In this paper, I will attempt to explore various privacy and security concerns facing both businesses and consumers when they take part in electronic commerce. Although the Internet offers a wonderful social, personal, and business opportunity, it is also laden with hackers, plotters, and schemers. This paper will examine some of the challenges posed by these shady individuals and look at measures Internet users can take to avoid becoming their victims. To survive in today’s highly competitive business environment, successful E-businesses must market their products and services to individuals or other businesses that are “willing and able” to purchase their offerings. To assist them in identifying and targeting specific market segments, companies are now using data mining techniques to examine their databases looking for trends, relationships, and outcomes to enhance their overall operations. These databases, containing detailed consumer information, can be valuable resources for the companies that use them. They can help businesses to better understand the needs of their customers so they can react to the customer’s needs faster. Businesses can also utilize this information to cut production...
Words: 941 - Pages: 4
...Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy Journal of Network and Computer Applications 42 (2014) 120–134 Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: www.elsevier.com/locate/jnca A survey on trust management for Internet of Things Zheng Yan a,b,n,1, Peng Zhang c, Athanasios V. Vasilakos d a The State Key Laboratory of ISN, Xidian University, PO Box 119, No. 2...
Words: 18072 - Pages: 73
...INTERNET OF THINGS 2015 1. INTRODUCTION The notion of Internet of Things (IoT) has been recognized by industrial leaders and media as the next wave of innovation, and pervading into our daily life. Sensors around us are increasingly becoming more pervasive and attempt to fulfill end users’ needs, thus providing ease of usability in our everyday activities. Devices deployed in households, industrial automation, and smart city infrastructure are now interconnected with the Internet. This interconnection provides a whole range of data (environmental context, device status, energy usage, etc.) that can be collected, aggregated, and then shared in an efficient, secure, and privacy-aware manner. As these devices are connected to the Internet, they can be reached, and managed at any time and at any place. The current landscape of IoT is filled with a very diverse range of wireless communication technologies, such as IEEE 802.15.4, Wi-Fi, Bluetooth Low Energy (BTLE), and various other cellular communication technologies. Naturally, devices using different physical and link layers are not interoperable with each other. Through an Internet Protocol (IP) router, these devices are, however, able to communicate with the Internet. When the differences in the protocol stack extend beyond the physical and link layer, protocol translation needs to be performed by a gateway device. This harms the deployment of IoT devices because the deployment becomes more complex and expensive...
Words: 4572 - Pages: 19
...Cross-Cultural Perspective In the recent past, Google has had to deal with the issue of privacy. Under the current global set up, the increased use of the internet has created an even greater challenge where the privacy of the information shared on the online platform is not guaranteed. The situation is even worse if the organisation or the platform mandated to protect such confidential information does not apply adequate measures to address the growing concern of unauthorized access to private information. For a multinational organisation such as Google, the greatest challenge the organisation is yet to address effectively how to secure the private information shared on numerous social media platforms, subscription platforms and even financial platforms that operate on the organisation’s search engine platform. The responsibility of securing private information on the online platform is the responsibility of the service provider. However, cyber criminals have developed new ways of bypassing various security measures that are developed by the different service providers. This explains why most online service providers including the tech-developers have to constantly revise the security measures on platforms that require sharing of private information. As stated by Piper (2005) the mission statement of Google is to make information accessible across the globe where people can easily access any information that they require. Perhaps the clause that was omitted in this statement...
Words: 561 - Pages: 3
...comparison operations. Because decrypting data stored at the cloud servers may possibly expose its content to the provider servers at least, so it is advised that it is more secure to decrypt data only on trusted machines which are controlled by the user who is authorized to access the data. Figure 2.2 Basic Architecture for Preserving Data Privacy in the Cloud Figure 2.2 shows the basic architecture of encryption for privacy protection before sending it to the cloud server. The data remain encrypted in the cloud server and only authorized users can get the credential for accessing this encrypted data. The encrypted data can be decrypted only after the data are downloaded to an authorized user device or machine. In such scenario, the privacy of the data doesn’t depend on any implicit assumption of trust of the server or the service level of agreement (SLA). Instead, the protection of privacy or integrity completely depends on the encryption techniques used to protect the data [45ECC]. The other leftover issues are how to allow the authorized users and data owner to search...
Words: 1702 - Pages: 7
...Privacy is a valuable interest and is now threatened more than ever by technological advances. Privacy is defined as the ability to control the collection, use, and dissemination of personal information (Fast Trac Course ). At one time people could once feel confident that what others may find out about them would be treated in a way that it would probably do any harm. Information technology has been beneficial for privacy. By having access to ATMs and online banking we rarely have to present ourselves to a teller. Online shopping offers similar benefits such as being able to shop without standing in long lines and being able to compare prices and research products before purchasing. However, since so much of what we do daily is done using a computer, it can pose a serious threat to privacy. This information can then be recreated to create detailed personal profiles that could not have transpired in pre-digital days. Furthermore, this information can be distributed far, wide, and immediately without our consent or even knowledge. Judicial remedies are unlikely to produce a satisfying or sensible balance between companies’ economic prerogatives and customers’ privacy interest. New technologies that has either unconsiously adopted or resourcefully applied privacy practices will continue to threaten personal privacy. Business will have to find ways to address this uneasiness. If companies remain complacent, underestimating the degree to which privacy matters to customers, harsh...
Words: 1944 - Pages: 8
...eBusiness Research Paper The content regulation of the Internet has become the fore of public debate as an issue that both government and Net users are concerned about. Many companies have benefited from the use of e-Business in terms of revenue, capturing its marketing mix and driving shareholder value. However, governmental regulation can have a major effect on both the strategy and financial survival of e-Business. As technology continue to evolve at a rapid pace, governmental regulation struggles to keep up with its pace (McGraw-Hill). This paper will outline legal and regulatory issues with E-Business. Ethical issues such as invasion of privacy and deceptive advertising will be addressed. An e-Business failure and “Managing a Retail Website” simulation will be discussed that will include challenges that was faced and offering recommendations to overcome those challenges. In the beginning of the Internet era, there was no kind of regulation in place. As the internet and e-Business started to expand rapidly, government struggled in determining how rules and regulations would a key role in online business practices. In our text, its states new technology and the lack of physical borders associated with the Internet are changing the way societies are looking at laws (McGraw-Hill). Because of hacking and cyber crime which continue to become more common and complicated, it is necessary to set standards in order for business to continue to thrive. There are several key regulatory...
Words: 2209 - Pages: 9
...of Internet Banking Adoption and Usage by Users in the Developing World Nishali Prasadika Ranasinghe BSB10183-3-Project Submitted to the Business School in partial fulfillment for the degree of Bachelor of Arts (Hons) in Business Management Supervised By: Fathima Nazeefa Fawzer Word Count: Table of Contents Abstract 3 Acknowledgement 4 1 Working Title 5 2 Introduction 5 2.1 Problem Statement 6 2.2 Problem Justification 6 2.3 Objectives 7 3 Literature Review 8 3.1 Determinants of internet banking usage 8 3.2 Barriers for internet banking adoption and usage 10 5 Conclusion 13 6 References 14 Abstract Similar to the adoption of automatic teller machines, banks around the world are looking at online banking services as the next technology to reduce costs while maintaining or enhancing services to the customer. In developing countries, the low cost of online banking may enable banks to reach new customers, much like the cell phone offered new possibilities in telephony. Banks must understand, however, that the mediating use of technology increases interpersonal distance between banks and their customers, which can build barriers for adoption of this technology. Hence, this critical literature review seeks to explore the internet banking adoption and usage by users in the developing world and to discover the barriers affecting internet-banking adoption within the geographic scope examined. Four factors namely, perceived usefulness and security and privacy, trust...
Words: 3510 - Pages: 15
...Benjamin Marchman English 122 Cathryn Lawson The Value of Online Privacy Since the September 11th terrorist attacks the United Sates and the world at large has officially entered into an age of counter-terrorism. While the more obvious aspects of this effort against violent extremism, which violate human and constitutional rights, such as drone strikes, waterboarding, and black prison sites, are specifically targeted toward a specific population, it is the subtler aspects of mass surveillance and corporate and governmental intrusion of privacy which present an overwhelming threat to human rights and quality of life. As has been made clear by recent revelations of the scope and depth of these intrusions, internet users specifically have many reasons to suspect that private information entered online is vulnerable to un-ethical intrusions by third parties. However, many groups and individuals have come together to bring resolution to the issue of personal privacy and national security. According to article 12 of the Universal Declaration of Human Rights, no one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, or to attacks upon his honor and reputation (Lachmayer 749). However, the more subtle aspects of the new counter-terrorism age include a heightened amount of internet surveillance, video surveillance of public spaces, electronic eavesdropping, and data retention. Additionally governments have access to bank accounts,...
Words: 2685 - Pages: 11
...The development of a code-of-ethics: IT challenges Geraldetta Lovelace Northcentral University The development of a code-of-ethics: IT challenges The problem to be investigated is the development of a relevant and effective code of ethics to address the ethical use of and the ethical issues related to the use of Information Technology (IT). The use of IT, like every innovation that has the potential to change lives for good, also has the potential for harm, however IT “seems to create more ethical challenges than other kinds of technology” (Brooks, 2010, p. 2). To be proactive, ethical issues involving IT need to be addressed by educational programs as well as businesses and professional IT organizations. Discussed herein are ethical challenges presented by the four issues of concern identified by technology managers: security, privacy, intellectual property and electronic monitoring of employees (Brooks, 2010, pp. 1, 2). Security In this context, security refers to maintaining the integrity and confidentiality of data by putting protective measures in place to prevent destruction and/or unauthorized use. Security issues involve internal as well as external forces. Hacking is usually thought of as being an external force, but can be an internal force as well. Any act of accessing a computer system and/or information without the authority to do so is considered hacking. Whether the information attained is used for good or evil, is another issue and does not negate that...
Words: 1691 - Pages: 7
... TITLE OF THE PAPER: CYBER SPACE MASS SURVEILLANCE PROGRAMS,INFRINGEMENT OF PRIVACY OF INDIVIDUALS, BY STATE IN THE NAME OF NATIONAL SECURITY. ABSTRACT: In this present era of cyber revolution and globalization, citizens have turned into “Netizens”. The advancements in the field of technology is also accompanied with the development of various methods of surveillance and intervention by the State into individuals’ private information. Governments are keeping an eagle eye by monitoring individual's movements, businesses transactions and also the means of communication, which includes cyberspace. It is alleged that the United States of America’s National Security Agency runs a program known as PRISM, which enables the US government to gain access to e- mails , conversations, pictures, voice calls and even sign in details of people using websites and applications associated with 1|Page Facebook, Yahoo, Microsoft, to name a few. Failure of cyber law mechanisms and national authorities to advance legislation and frameworks along with the technological developments and the increasing trends on States’ surveillance practices has created an environment in which citizen’s right to privacy is easily violated, leading to human rights violations also and lack of accountability, which raises questions on the legitimacy of such act of state. This research paper will mainly be focusing on this issue of privacy...
Words: 6245 - Pages: 25
...This paper outlines why security and privacy cannot be mutually exclusive. As we continue to advance with information and communication technologies, our society will require cyberlaws and the government needs to equip law enforcement with modernized tools to protect society’s most vulnerable in cyberspace. To achieve a happy medium between security and privacy, I propose the concepts of transparency, accountability, integrity, and professionalism in the security-privacy debate. Today, there are over three billion online users, which make up about 40% of the world population (ITU 2014). The users are online, conducting daily communications, transactions, and sharing of information. The Internet has created an increasing amount of personal...
Words: 1892 - Pages: 8
...A Literature Review “Privacy and Health Information Technology” Deborah Jones Dr. Udoh Udom Health Information Systems HAS 520 12/06/10 Introduction The increased use of health information technology (Health IT) is a common element of privacy of medical information. Proponents hope that the increased use of health IT will improve health outcomes for individual patients by facilitating the delivery of evidence-based care and reducing medical errors. Additionally, proponents hope that increasing information sharing among providers will better coordinate care within and across health care settings. Health IT facilitates the creation of a comprehensive health record that can move with an individual over his or her lifetime, in contrast to the fragmented records that exist today. Further, health IT is promoted as a critical tool for improving population health by allowing for the more efficient gathering of data regarding the effectiveness of certain treatments. Finally, health IT is also expected to help decrease health costs by reducing the duplication of services and the delivery of unnecessary or inappropriate care. This paper examines some of the “gaps” in privacy protections that arise out of the current federal health privacy standard, the Health Insurance Portability and Accountability (HIPAA) Privacy Rule, the main federal law which governs the use and disclosure of health information. Additionally, it puts forth a range of possible solutions, accompanied by...
Words: 3190 - Pages: 13
...Data Security and Privacy Act Data security & privacy has varies of roles and responsibilities to prevent financial crimes. Financial crimes can include telemarketing scams, investment or pension fraud, credit card fraud, and insurance fraud. However, it is the company decision on how much personal protection is needed to secure its customers financial investments. Moreover as who is suppose to make this decision for financial protection falls under corporate security. These decisions are very important because businesses, as well as individuals, can be victims of financial crimes and face serious financial loss. In this recent ongoing decade because of the fear of big government and the fear of privacy intrusions through the internet and internet commerce, across all enforcement agencies, data security and privacy are high priorities. The Obama Administration has made enforcement of data security and privacy a top priority. In this modern day age, updating the Healthcare Insurance portability & Accountability Act is recently now highly recommended. The healthcare industry is already familiar with data security and privacy restrictions. We the people in the United States of America is living in an information technology era, with increasing automation of electronic medical records, clinical systems, and medical imaging, as well as growing regulatory pressures, it is a challenge for healthcare providers to protect the privacy of patient data and secure their IT...
Words: 601 - Pages: 3