'Social, Legal and Professional Issues of Computing': Course contents and ethical awareness. Lynette Drevin. 1 and Penny Duquenoy. 2. 1. North-West. conduct and ethical standards as a computing/IT practitioner;. • To be in a position understanding of professional, ethical, legal, security and social issues and. Professional Ethical and Social Issues In Ecommerce 1/ 30/ Samadara M et Under this research, discuss about the ethical, legal, social and professional side .. To that network millions of computers are connected and as well as more .
|Language:||English, Spanish, Japanese|
|Genre:||Science & Research|
|ePub File Size:||18.31 MB|
|PDF File Size:||20.72 MB|
|Distribution:||Free* [*Regsitration Required]|
Request PDF on ResearchGate | On Jan 1, , P Duquenoy and others published Ethical, Legal and Professional Issues in Computing. team's office, Iris slipped the disk into the drive of her computer and ran a virus scan on its . Legal, Ethical, and Professional Issues in Information Security. Get this from a library! Ethical, Legal and Professional Issues in Computing.. [ Simon Jones; Barry G Blundell; Duquenoy, Penny.].
Cancel Forgot your password? Some features of WorldCat will not be available. Under the Ethical Principles clearly mention everyone has a right to life, liberty and security person. Sometimes the sellers are selling those contact information to the third party. Home Deport was targeted from the hackers in September and more than 50 Million credits and other card data was hacked Ben, Micgael and Dune
If the Ecommerce business is going down store keepers and sellers lose their jobs and ultimately they will not have any other jobs in this field because they were trained to work with the Ecommerce business not in the usual business. In the Ecommerce business consumers can directly purchase products from the manufactures. According to the Universal Declaration of Human Rights Article 23 1 talk about everyone has the right to work and free choice of employment, to just and favorable conditions of work and to protection against unemployment.
Using Ecommerce business reduces the storage cost and staff cost. No need to worry about the physical storage to start the business. That is a main advantage in the Ecommerce.
Under that consumer has to provide name, email address, birthday act. Some consumers are providing fake information to the website and they are doing transaction using fake information. According to the general principle in ethics mention act truthful. Under the legal side the computer misuse act, data protection act, software general policies and US copyright act and etc.
Because of the Ecommerce growth there are so many legal issues happened. In the process in Ecommerce mostly providing consumer personal details like name, address, NIC number, birthday etc to fill the customer registration form. To do the payments consumer has to provide credit or debit card details. Ecommerce websites must register under the Data Protection Act. If the consumer collects information about the people, consumers act. Those mention information includes name, telephone number, address and email address.
This act can apply to any type of business and must sure about the data security and if they want to delete details that facility also must be there. Under this regulation mention must provide clear information about the product and service before purchase and also must be clear about the postage and packing cost and tax. Website must allow a "cooling off" era where by the customer can change their mind and cancel or return the order within 7 working days for most goods.
By considering above incidents hackers hacked the account password and credit card details. Under the Data protection Act a mention consumers details can process lawful if the consumer provide there action to do so. By hacking the websites breaks Data protection Act a statement.
By using credit card details hackers can do transactions and also hackers can do their payments by using those credit card details. Using these systems customers always point out the location data.
Above incident violate the Data protection Act a , consumers details can process lawful if the consumer provide there action to do so. By using correct testing patterns can avoid those errors. There for this incident breaks the Computer Misused Act 3 statement.
In the Computer Misused Act 3 talk about the unauthorized access and modification of the computer materials. Spam blocker can use to block down the amount of spam mail.
Under the unsolicited Commercial Electronic Mail act mention all the spam mails are must indicate the word Advertisement and also must include the content name and the address of the sender. Some spam mails sending false information to the consumers. Ecommerce using electronic documents in the entire all process. By hacking electronic documents can change and modify. Computer Misuse Act 3 statement talks about that unauthorized access and modification of the computer materials.
But there are advantages than the usual document method. Some of the online interviews are done by companies and they can capture their photographs and by using those photographs they can do marketing. Under the Data Protection Act a state personal details of the employee can used only with the employee permission.
Under the Software General Policy states that computer Software copyright cannot be copied for use of a person or to be distributed unless who has got the necessary authorization to do.
Software copyright could lead to penalties under the US Copyright Act. Some Ecommerce websites are selling copies of software, movies etc. And the price also lower than the original price. In Ecommerce domain is a big part to the Ecommerce business.
Owners have to make sure to protect domain name. To do so they can follow trademark law. Today professional website hackers grow very fast. Some websites are displaying advertisements to hire professional hackers. In this website advertise their team having high skills for hacking and those professional hackers can hack email, Face book, websites, social media, and more. They are providing this facility to recover password and they are telling that they can protect websites using new technology.
Hacker- soft website publishing the all computer systems hacking methods and those websites can use any one because they are providing all instructions to follow.
In Ecommerce websites main attack came from hackers. That is the main threat in Ecommerce. By publishing those hacking advertisements and hackers websites that highly effect to the Ecommerce.
Because of the technology growth the negative side is this. By releasing hacking tools also increase the hacking incidents. Ecommerce cover three types of transactions. Home Deport was targeted from the hackers in September and more than 50 Million credits and other card data was hacked Ben, Micgael and Dune By looking above mention real word examples clearly seen that hacking websites is violated the BCS Code of Conduct 01 a.
Hone deports also attack from the hackers and 50 million of credit card data deposed. Using those details hackers can change details also. BCS Code of Conduct 01 a states that; Have due regard for public health, privacy, security and wellbeing of others and the environment. Sellers can sell those details third party for marketing purpose. BCS Code of Conduct 03 d states that; Duty to relevant authority such information should not be used by the organization itself and giving to the third party without permission from the information owner.
In the E-business consumers are checking product usually using product specification and the comments of the consumers who purchase the product before. Consumer can check the product after the product reserve. After reserving the product sellers contact will loose.
True information about the product and services sellers cant suspended. EBay admits it banned a Whistleblower warning Shoppers about fake products Julie And website removing the fake products and blocked sellers also.
And EBay removes the comment that warns people about fake product. This iPad all details are same to the original one but the product weight is wrong. Original product weight is 2Kg and this fake product weight is 1Kg. There for this incident violate BCS Code of Conduct 03 e Consumers are angry by fake online payment which tricks the consumers using fake websites with fake stocks.
Making fake profit is injuring to the consumer property. BCS Code of Conduct 02 f states that; shall avoid injuring others, their property, reputation or employment by false or malicious or negligent action or inaction. The main problem in Ecommerce is product packing. And some product quality is low. Consumers are not responsible for the quality of the product and sellers who are having responsibility about the quality of the product.
Those methods are used to get the customer attraction. Some websites display price is deferent after payment is done. According to the Professional code of conduct before implement the website developers has to give attention to the public interest 01 c -website color, font size and act. Ecommerce system must develop for all users.
Under the public interest 01 d mention legitimate rights for all users to use systems. According to the Hoffman et al.
According to the finding there are some amount of consumers do not like to provide information to the e- commerce systems because of the lack of trust between the consumer and the e-business. Figure 7: Above figure shows the world wild Ecommerce revenue in and Considering this analyst, Western Europe countries Ecommerce usage gone up and Asian countries Ecommerce usage gone down Zorayda Zorayda Above table shows the B2B Ecommerce in the year to According to the above finding Ecommerce technology is growing fast but there are some consumers do not trust the Ecommerce technology yet.
By using digital certificates can protect from the hackers. There are two methods to encryption using the digital certificates. They are Secured-key encryption and ublic-key encryption. In the Secured key encryption method both parties are having shared key that they only know. In the Public-key encryption method sender and the receiver key is deferent. Receiver has to decrypt the data after reserved. Figure 8: According to the research in Computer and Communication Engineering mention secure online shopping guideline to the consumers.
If the website is secure the closed padlock displayed on the address bar in the screen. If the lock is open that site is not secure one.
Ecommerce business responsibility is to provide guideline and company policies to the consumer. They are news paper publishers and they provide electronic cash system and aimed to magazine. Figure For individuals they provide free payment clearing service. Ecommerce is now familiar with all around the world. Because of that anyone can purchase goods or service any time anywhere.
And nowadays some consumers are willingness to do the transaction via Ecommerce because of the real incident behind on the Ecommerce. Ecommerce websites request to provide personal details and the credit or debit card details before transaction.
Providing credit card facts is main danger in Ecommerce. Because hacking incidents are in high level in this technology. As developers they can reduce Ecommerce risk by using new technology when developing the website.
And also the consumers can follow secure methods before do the transaction. Most of the consumers are now familiar with the Ecommerce and with the new technology. Because of that nowadays consumers also can protect them self. Journal of Social Sciences,, 7 2 , BCS Code of Conduct. The Universal Declaration of Human Rights. A Gift of Fire: Prentice Hall: Pearson Education Ltd. Singapore Newspaper Site Hacked. Hacker group claims to have released 13, passwords, credit numbers from websites including Walmart and Amazon.
This Week in Credit Card News: Seppala, , Engadget. Bing and Yahoo went down but hackers weren't to blame. Nature of e-business ethical dilemmas. Managing electronic information: An ethics perspective. E-ethical leadership for virtual project teams. International Journal of Project Management, 27, MyiLibrary, Table of contents.
Please choose whether or not you want other users to be able to see on your profile that this library is a favorite of yours. Finding libraries that hold this item You may have already requested this item. Please select Ok if you would like to proceed with this request anyway. WorldCat is the world's largest library catalog, helping you find library materials online.
Some features of WorldCat will not be available. Create lists, bibliographies and reviews: Search WorldCat Find items in libraries near you. Advanced Search Find a Library. Your list has reached the maximum number of items. Please create a new list with a new name; move some items to a new or existing list; or delete some items. Your request to send this item has been completed.
APA 6th ed. Citations are based on reference standards. However, formatting rules can vary widely between applications and fields of interest or study.
The specific requirements or preferences of your reviewing publisher, classroom teacher, institution or organization should be applied. The E-mail Address es field is required. Please enter recipient e-mail address es. The E-mail Address es you entered is are not in a valid format. Please re-enter recipient e-mail address es.
You may send this item to up to five recipients. The name field is required. Please enter your name. The E-mail message field is required. Please enter the message. Please verify that you are not a robot. Would you also like to submit a review for this item? You already recently rated this item.
Your rating has been recorded. Write a review Rate this item: Preview this item Preview this item. Ethical, Legal and Professional Issues in Computing. Duquenoy, Penny.