SlideShare une entreprise Scribd logo
1  sur  14
X
M
WHAT IS E-COMMERCE?
                      Stands for: Electronic Commerce


      It’s basically a world of business online. But it’s
not only selling and buying. There’s more to it than
just Amazon or Ebay.
      It’s circulated around everything a business can
do, but online, or “virtually.”
WHAT REALLY HAPPENS?
HOW E-COMMERCE IS
GROWING?
       According to Heggins " Entrepreneurship is meant that
function of seeking investment and production opportunity
organizing and enterprise to undertake a new production
process, raising capital, having labor, arranging the supply of
raw materials, finding site and selecting to managers of day-to-
day operations.
WHAT IS                       ?
      It’s basically a sort of money service, commonly
mistaken to be a type of “online banking system”.
EFFECTS ON SOCIAL
AND ETHICAL
SIGNIFICANCE
UNRELIABLE
                           PayPal proved to be unreliable, as users
                  put their confidence and trust in this company ,
                  while later on, they could easily become a victim
                  of false transactions and money transfers.


RELIABLE
         Reliability is how dependable one tends to be on an object.
For a source of e-commerce to be reliable it must:
  • Provide a comfortable user interface for its users, so that they may
    easily use the program or website.

  • Have up-to-date data.
  •
INTEGRITY
 - For the system to have integrity, it must contain
 accurate data that is NOT tampered with.



          BUT IS THERE A SOLUTION?
      There is no full-proof solution, other than only
using trusted sites and services.
SECURITY                          ISSUE OF THEFT?
  •   To what extent can a         Identity theft occurs when someone
      service be trusted by its    obtains your personal information,
      users?                       such as your credit card data or
  • Does the service take          Social Security number, to commit
      the appropriate              fraud or other crimes.
      measures to keep its
      users information
      protected and kept only     WHAT U CAN DO;
      for uses agreed by the
      user themselves?             Protect your information.
  These are the questions to       ~Erase login information (usually
  rate the security of a              stored in the cache of a browser),
  service.                            change passwords occasionally
                                      and frequently.
                                   ~Use your credit card instead of online

      PRIVACY?
                                      payment services (eg: PayPal).
                                   ~Use familiar websites with security
                                      control. There are       scams of
                                      phising
AUTHENTICITY


                                           If hackers obtain enough data
                                           (Login information and credit
                                           card number), they basically
                                           provide the service enough
                                           authenticity to log in and use
                                           your account.



You can use online payment services and by keeping your
firewall on, it could also prevent any more future access to
your computer and the information you have stored in it.
DIGITAL DIVIDE
EQUALITY OF ACCESS
Not everyone has access to the internet…
         So the online services and the whole working of e-commerce
is limited to those who DO have access to such resources, leaving a
large population out of their usage.
POLICIES
        Rules made by the services to encourage appropriate use,
and discourage inappropriate use.




                                               From Amazon.
PEOPLE AND MACHINES

Instead of :


               We can do it all in online :3
THE END

Contenu connexe

Tendances

Information security management
Information security managementInformation security management
Information security management
UMaine
 

Tendances (20)

E commerce
E  commerceE  commerce
E commerce
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Chapter 8 / Electronic Payment
Chapter 8 / Electronic  PaymentChapter 8 / Electronic  Payment
Chapter 8 / Electronic Payment
 
Lesson 1 - E-Commerce
Lesson 1 - E-CommerceLesson 1 - E-Commerce
Lesson 1 - E-Commerce
 
Information security management
Information security managementInformation security management
Information security management
 
E commerce
E  commerce E  commerce
E commerce
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Unit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.pptUnit 6 Privacy technological impacts.ppt
Unit 6 Privacy technological impacts.ppt
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Legal challenges in E-commerce
Legal challenges in E-commerce Legal challenges in E-commerce
Legal challenges in E-commerce
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
What is e-commerce- Traditional Commerce Vs. E-Commerce
What is e-commerce- Traditional Commerce Vs. E-CommerceWhat is e-commerce- Traditional Commerce Vs. E-Commerce
What is e-commerce- Traditional Commerce Vs. E-Commerce
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
E Commerce: Its role and development
E Commerce: Its role and developmentE Commerce: Its role and development
E Commerce: Its role and development
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
 

Similaire à E commerce law and ethics

A case study of amazon
A case study of amazonA case study of amazon
A case study of amazon
robinbarney
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data
Momina Mateen
 
Experiment
ExperimentExperiment
Experiment
jbashask
 

Similaire à E commerce law and ethics (20)

E commerce
E commerceE commerce
E commerce
 
E commerce
E commerceE commerce
E commerce
 
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
Callcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience streamCallcredit's Fraud Summit - Customer experience stream
Callcredit's Fraud Summit - Customer experience stream
 
Identity theft pp presentation
Identity theft pp presentationIdentity theft pp presentation
Identity theft pp presentation
 
A case study of amazon
A case study of amazonA case study of amazon
A case study of amazon
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data3.5 Online Services and Security and Privacy of Data
3.5 Online Services and Security and Privacy of Data
 
Experiment
ExperimentExperiment
Experiment
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure World
 
Identity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docxIdentity Verification API The Cornerstone of Digital Trust.docx
Identity Verification API The Cornerstone of Digital Trust.docx
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 students
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshure
 
IT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docxIT Security and Risk Management - A - ST.docx
IT Security and Risk Management - A - ST.docx
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
How to Stay Safe While Using Digital Payment Apps
How to Stay Safe While Using Digital Payment AppsHow to Stay Safe While Using Digital Payment Apps
How to Stay Safe While Using Digital Payment Apps
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
Wk White Paper
Wk White PaperWk White Paper
Wk White Paper
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Dernier (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

E commerce law and ethics

  • 1. X M
  • 2. WHAT IS E-COMMERCE? Stands for: Electronic Commerce It’s basically a world of business online. But it’s not only selling and buying. There’s more to it than just Amazon or Ebay. It’s circulated around everything a business can do, but online, or “virtually.”
  • 4. HOW E-COMMERCE IS GROWING? According to Heggins " Entrepreneurship is meant that function of seeking investment and production opportunity organizing and enterprise to undertake a new production process, raising capital, having labor, arranging the supply of raw materials, finding site and selecting to managers of day-to- day operations.
  • 5. WHAT IS ? It’s basically a sort of money service, commonly mistaken to be a type of “online banking system”.
  • 6. EFFECTS ON SOCIAL AND ETHICAL SIGNIFICANCE
  • 7. UNRELIABLE PayPal proved to be unreliable, as users put their confidence and trust in this company , while later on, they could easily become a victim of false transactions and money transfers. RELIABLE Reliability is how dependable one tends to be on an object. For a source of e-commerce to be reliable it must: • Provide a comfortable user interface for its users, so that they may easily use the program or website. • Have up-to-date data. •
  • 8. INTEGRITY - For the system to have integrity, it must contain accurate data that is NOT tampered with. BUT IS THERE A SOLUTION? There is no full-proof solution, other than only using trusted sites and services.
  • 9. SECURITY ISSUE OF THEFT? • To what extent can a Identity theft occurs when someone service be trusted by its obtains your personal information, users? such as your credit card data or • Does the service take Social Security number, to commit the appropriate fraud or other crimes. measures to keep its users information protected and kept only WHAT U CAN DO; for uses agreed by the user themselves? Protect your information. These are the questions to ~Erase login information (usually rate the security of a stored in the cache of a browser), service. change passwords occasionally and frequently. ~Use your credit card instead of online PRIVACY? payment services (eg: PayPal). ~Use familiar websites with security control. There are scams of phising
  • 10. AUTHENTICITY If hackers obtain enough data (Login information and credit card number), they basically provide the service enough authenticity to log in and use your account. You can use online payment services and by keeping your firewall on, it could also prevent any more future access to your computer and the information you have stored in it.
  • 11. DIGITAL DIVIDE EQUALITY OF ACCESS Not everyone has access to the internet… So the online services and the whole working of e-commerce is limited to those who DO have access to such resources, leaving a large population out of their usage.
  • 12. POLICIES Rules made by the services to encourage appropriate use, and discourage inappropriate use. From Amazon.
  • 13. PEOPLE AND MACHINES Instead of : We can do it all in online :3