The evolution of the Internet started from the department of defense's project, and rapidly distributed to world wide. With the rise of the Internet age comes with the benefits and the concerns. Because of the easeness to communicate information and displaying data, the first amendment needs to be applied to this communication channel. How are we using and communicating information without offending and harm others? Since the evolution of the Internet, there has been acts from Congress to regulate the use the Internet such as the Communications Decency Act in 1996 and the Child Online Protection Act in 1998. These acts aim to forbid Internet users from displaying offensive speech to users or exposing children of indecent materials. The Internet raises other issues that people might have. The biggest and most debatable topic is the privacy issue. Is the Internet a safe place to protect personal information such as financial information, medical data, etc…? Some people who are computer literate or at least with some experience in software and technology would not trust to release the information on the web or at random sites . As a matter of fact, any unknown or small vendor on the web would have difficulty getting many customers to do business online. Big vendors such as Amazon would want to secure their network infrastructure to protect the users information, so that their server would not be hacked. However, even this style of protecting personal information is not enough. The users demand further protection such as ensuring their information is not being sold to other vendors for misuse, or spam the users mailbox with soliticing.
... middle of paper ...
Soukup, Paul, Ethics@Email, http://www.scu.edu/ethics/publications/iie/v8n2/email.html
Hinds, Sara, Is your life an open book?, http://www.consumer-action.org/English/CANews/2001_July_Privacy.php#Topic_06
Sherry, Linda, Web aggregators: questions about privacy and liability, http://www.consumer-action.org/English/CANews/2001_July_Privacy.php#Topic_07
Same as 6
PLPR's World-Wide Privacy Guide, Privacy Protection Agencies, http://austlii.edu.au/~graham/PLPR_world_wide_guide.html#agencies
The Australian Privacy Charter, http://www.austlii.edu.au/au/other/CyberLRes/1995/smart/54.html
Privacy Knowledge Base, http://www.privacyknowledgebase.com/document.jsp?docid=REFDPMEA&isInt=INT
Same as 10.
EbusinessForum.com, VietNam: Law and Regulations, http://www.ebusinessforum.com/index.asp?
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Introduction New information technologies change the way society lives. This is why the tax authorities cannot remain outside such changes. Since the year 2005 the Tax Administration System (SAT Servico de Administracion Tributaria), which is the Mexican IRS, has been introducing and applying new information technologies with the objective of a better, faster and safer way of fulfilling its obligations with taxpayers. One of the most controversial tools the SAT started using is the Electronic Signature (FIEL Firma Electronica).... [tags: privacy, security, biometric features]
1916 words (5.5 pages)
- E-commerce security threats and technology solution dimensions consist of integrity, authenticity, confidentiality, privacy, availability, etc. (Laudon & Traver, 2012, p.268). The internet can serve as a very useful tool or it can be a tool manipulated to perform unethical actions. Its function as tool all depends on what the user and what they intend to do with the information they download, view or share. Many analysts trace the increase in the number of issues faced by consumers today to the internet.... [tags: Security ]
1904 words (5.4 pages)
- Security on the Internet How do you secure something that is changing faster than you can fix it. The Internet has had security problems since its earliest days as a pure research project. Today, after several years and orders of magnitude of growth, is still has security problems. It is being used for a purpose for which it was never intended: commerce. It is somewhat ironic that the early Internet was design as a prototype for a high-availability command and control network that could resist outages resulting from enemy actions, yet it cannot resist college undergraduates.... [tags: essays research papers]
2385 words (6.8 pages)
- ... doi:10.1007/978-3-642-31600-5_36 Chaffey, D. (2011). Mobile commerce. In C. Dave, E-Business and E-Commerce Management: Strategy, Implementation and Practice (5th Edition) [Electronic version] (p. 7). Prentice Hall. Chaffey, D., & Smith, P. (2013). Emarketing Excellence : Planning and Optimizing your Digital Marketing [Electronic version] (4th ed.). Retrieved May 2, 2014, from http://www.myilibrary.com?ID=459190 Chana, N. L., & Guillet, B. D. (2011). Investigation of Social Media Marketing: How Does the Hotel Industry in Hong Kong Perform in Marketing on Social Media Websites.... [tags: Globetrotter Hotels customer database]
979 words (2.8 pages)
- Ever since day one, people have been developing and creating all sorts of new methods and machines to help better everyday life in one way or another. Who can forget the invention of the ever-wondrous telephone. And we can’t forget how innovative and life-changing computers have been. However, while all machines have their positive uses, there can also be many negatives depending on how one uses said machines, wiretapping in on phone conversations, using spyware to quietly survey every keystroke and click one makes, and many other methods of unwanted snooping have arisen.... [tags: Privacy, Security]
1260 words (3.6 pages)
- James Madison once said “Knowledge will forever govern ignorance; and a people who mean to be their own governors must arm themselves with the power which knowledge gives.” To gain a better understanding of a society, one must gain knowledge of the needs and wants the citizens’ demand from the country’s representatives. In every country the needed to protect its citizens is the same. In some nations, security is a higher priority which causes sacrifices to be made to obtain an indefinite protection against all rivals.... [tags: Privacy vs Security ]
1175 words (3.4 pages)
- "Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing." -- Helen Keller Security has been a common topic of controversy since the terrorist attacks of September 11, 2001, and even before then it was a constant subject. The image of buildings collapsing and billowing smoke has been engraved into the minds of Americans and will remain there for years to come. Security is an issue that we encounter everyday. Whether it is driving down the freeway or walking into the grocery store; we are cautious of what is going on around us.... [tags: Security vs Privacy]
2936 words (8.4 pages)
- Abstract: Electronic mail is quickly becoming the most prevalent method of communication in the world. However, e-mail systems in corporate, institutional, and commercial environments are all potential targets of monitoring, surveillance and ultimately, censorship. Electronic mail is a phenomenon that has begun to pervade all aspects of our lives today. We use e-mail in our personal lives, at our schools, at our jobs, and everywhere in between. However, very few of us consider the fact that even though our e-mail is composed by the sender, and is intended to be read only by the recipient, it actually passes through many hands in between.... [tags: Security vs Privacy]
1764 words (5 pages)
- When the Challenger space shuttle blew up. Students gathered in the student lounge for hours, watching in disbelief. In a way, it was more existential than September 11. We watched the same ten seconds of the shuttle explosion over and over again, without there being a trace of the Shuttle anywhere in the world. That day was a technological disaster, a mechanical disaster that Americans, in our inimical fashion, could quickly fix. What students watched on September 11, 2001 was a social and political disaster.... [tags: Security vs Privacy]
796 words (2.3 pages)
- INTRODUCTION Cloud computing has boost a large amount of interest in the IT industry. The market research and analysis firm IDC suggests that the market for cloud computing services was $16bn in 2008 and will rise to $42bn/year by 2012 (Chhabra, Verma & Taneja, 2010) .The era of cloud computing introduces a new dimension for Enterprises. The academia and research worlds have developed a keen interest into challenges and issues introduced by this relatively new concept (Sriram & Khajeh-Hosseini, 2009).... [tags: Information Technology, Data, Security]
2060 words (5.9 pages)