Can you please explain how a web site might handle security, confidentiality
and international issues.
Posting 31334 - E-BUSINESS CONSUMER DATA
Ethics is the study of moral principles that guide conduct. There are two schools of thought on the study of ethics in marketing:
• 'Let the buyer beware' - this point of view says that the right of the seller is the central view. A company using this view has little regard for consumer's needs and wants.
• 'Let the seller beware' - in this view, customer satisfaction may be taken to the extreme. No matter what the customer does, it is OK.
Ethicists believe that Relationship Marketing is a reasonable practice that leads to positive relationships between buyers and sellers. Relationship marketing allows buyers and seller to work together. This disadvantage is that this takes time to develop and may be difficult to develop.
Marketers must be aware of ethical standards and acceptable behavior. This means that marketers must recognize that there are three viewpoints: the company, the industry and society. When there is a difference between the needs of the three aforementioned groups, a conflict may arise. Ethical conflicts may also arise when one's personal values conflict with the organization. Ethical dilemmas facing marketing professionals today generally fall into three categories: tobacco and alcohol promotion, consumer privacy and green marketing.
Standards for ethical marketing tend to guide business in efforts to do the right thing. There are four functions of these standards: to help identify acceptable practices, foster internal control, avoid confusion and facilitate a basis for discussion.
ETHICAL MARKETING RULES
The American Marketing Association has identified the following rules to guide marketing behavior:
1. Responsibility of the marketer - accept responsibility for the consequences of their activities and make every effort to ensure that their decision, recommendations and actions function to identify, serve and satisfy all relevant publics: customers, organizations and society.
2. Honesty and fairness - uphold and advance the integrity, honor and dignity of the marketing profession.
3. Rights and duties in the marketing exchange process - participants should be able to expect that products and services are safe and fit for intended uses, that communications about the offered product is not deception, that all parties intend to honor their obligations in good faith, and that internal methods exist for equitable adjustment and/or redress.
4. Organizational relationships - marketers should be aware of how their behavior influences the behavior of others in organizational relationship. They should not demand, encourage or apply coercion to encourage unethical behavior in the relationship with others.
ETHICS AND E-BUSINESS
One of the most distinguishing characteristics of the World Wide Web is its interactivity. Visitors interact with a Web site - and as they do, the web site usually gathers information about the visitor. Some personal information is overtly gathered through requests for personal information. Studies show that over 90% of Web sites aimed at consumers collect at lest some personal information and more than 55% collect at least some demographic information.
Privacy is an emotional issue for many people. Many people are disturbed when they first learn of the level to which their on-line activities have been monitored and feel a sense of loss of control. The information that is gathered has commercial value to Web site operators, advertising agencies and others.
Many privacy concerns arise as a result of the use of "cookies". Cookies are small bits of code or software that is usually stored on a visitor's computer hard drive. Cookies contain code that will be sent from the visitor's computer to the web site the next time the visitor returns to the web site, thereby, providing the web site with information about the visitor. The name cookie derives from UNIX objects called magic cookies. These are tokens that are attached to a user or program and change depending on the areas entered by the user or program. Cookies are also called persistent cookies because they typically stay in the browser for long period of time. By retrieving a previously stored cooked, the web site may be able to monitor the activities of the visitor.
A few of the technologies that support E-Commerce are as follows: electronic data interchange, electronic mail and messaging, electronic funds transfer, electronic forms, and electronic catalogs. The transition to E-Commerce offered: new ways to procure business, to advertise, to sell, to administer, to distribute, to manage to bill and pay to communicate and to serve. E-Commerce offered:
• New relationships between suppliers and buyers, commerce brokers, payment channels and new business. These new relationships require new relationship and trust
• New exposures between public, private and not-so-private networks, more direct connections with business partners, automated business processes and fewer humans. More exposure also meant more exposure to threats to security and reliability.
• New risks, such as: direct financial loss from fraud, theft of confidential information, loss of business opportunity through disruption of service, unauthorized use of resources, loss of customer confidence or respect and the cost resulting from uncertainties.
There a basic security needs that every e-business should consider. Security and reliability play critical roles in any e-business model. These needs are as follows:
• To ensure the availability of information and services
• To security allow access to information and services
• To prevent loss of integrity of information and transactions
• To provide authenticity of all parties involved
• To provide confidentiality of information and transactions
• To provide non-repudiation to all parties involved
• To provide an audit log of significant events, and
• To provide fraud prevention and other misuse controls.
To deliver trust, privacy and security, the electronic business infrastructure needs cryptography, digital signatures, public key infrastructure, networking and trust & trusted third parties. Assurance attestation liability and legal responsibilities need to be established. There are various levels or strengths of attestation: self attested, independent attestation and 'trusted' independent attestation.
SECURITY SERVICE TERMS:
Confidentiality - The degree to which data items are protected from unauthorized or unintended observation or disclosure.
Integrity - The degree to which data processed by a computer or communications system is the same as that in the original document or other data source and has not been exposed to accidental or deliberate alteration or destruction.
Authenticity - The degree to which the origin of data or the identity of communicating parts is known and validated.
Non-Repudiation - The degree to which unforgeable proof of shipment and/or receipt of data may be claimed.
The Electronic Communications Privacy Act of 1986 (ECPA) was designed to protect the contents of stored electronic mail and voice mail and to prevent the intentional interception, disclosure or use of electronic communications. The ECPA also prohibits providers of electronic communication services from disclosing contents of a communication that they have store electronically without the lawful consent of the person who originated the communication. More importantly, ECPA restricts access by government agencies to customer records belonging to electronic service provides. In order to gain access to such records without notifying the customer, a government agency must ...
The expert examines websites and security, confidentiality and international issues.