Electronic Commerce - Chapter 2: Electronic Commerce Environment - Tran Thi Que Nguyet
Legal environment
• Jurisdiction on the Internet
• Much more difficult
• Use contract: promises between 2 or more legal entities for
exchanging values
• Violation of contract: filed in courts with jurisdiction
• Conflict of laws
• Online businesses: look to federal laws for guidance
• How about international issues?
• Jurisdiction on the Internet
• Much more difficult
• Use contract: promises between 2 or more legal entities for
exchanging values
• Violation of contract: filed in courts with jurisdiction
• Conflict of laws
• Online businesses: look to federal laws for guidance
• How about international issues?
Bạn đang xem tài liệu "Electronic Commerce - Chapter 2: Electronic Commerce Environment - Tran Thi Que Nguyet", để tải tài liệu gốc về máy hãy click vào nút Download ở trên.
File đính kèm:
- electronic_commerce_chapter_2_electronic_commerce_environmen.pdf
Nội dung text: Electronic Commerce - Chapter 2: Electronic Commerce Environment - Tran Thi Que Nguyet
- Electronic Commerce Chapter 2: Electronic Commerce Environment Email: ttqnguyet@hcmut.edu.vn
- Legal environment • All businesses must comply to laws • Borders and Jurisdiction • Physical world: territorial borders mark range of culture and applicable laws • Jurisdiction: the ability to control a person or corporation of the government
- Legal environment • Jurisdiction on the Internet • Much more difficult • Use contract: promises between 2 or more legal entities for exchanging values • Violation of contract: filed in courts with jurisdiction • Conflict of laws • Online businesses: look to federal laws for guidance • How about international issues?
- Online crime, terrorism, warfare • Online crime • Online version of physical crimes: theft, stalking, pornography distribution, gambling • New online crime: using computers to attack other computers, cyberbullying, stealing or destroying important data • Difficult to enforce laws due to jurisdiction issues • Advantages of the Internet • Track perpetrators of online crimes • Criminals brag on social networking sites • Criminals leave clues in online profiles
- Online crime, terrorism, warfare • Online warfare • Actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption • Espionage • Sabotage
- Intellectual property • Copyright infringement • Difficult to apply • Napster peer-to-peer file sharing • Case-by-case basis • Patent • Exclusive right granted to an individual to make, use, and sell an invention • Limited time (20 years) • Invention: must be genuine, novel, useful, and not obvious given current technology state • Business process patent: controversial
- Intellectual property • Domain name issues • Cybersquatting • Name changing (typosquatting) • Name stealing • Protecting intellectual property • Digital watermark • Digimarc: provides watermark protection systems and software • Copy control • Electronic mechanism limiting number of copies
- Ethical issues
- Ethical issues • Privacy policies • Opt-out approach • Assumes customer does not object to company’s use of information • Unless customer specifically denies permission • Opt-in approach • Company collecting information does not use it for any other purpose • Unless customer specifically chooses to allow use • Communication with children • Children less capable of evaluating information sharing and transaction risks
- End of chapter 2