Page 414 - Introduction to Electronic Commerce and Social Commerce
P. 414

402                                  12  Implementation Issues: From Globalization to Justification, Privacy, and Regulation

             Spyware as a Threat to Privacy and Intellectual Property    Monitoring Employees

           In Chapter 10, we described spyware as a tool that some  There are several issues concerning Internet use at work and
           merchants use to gather information about users without  employee privacy. In addition to wasting time online, employ-
           their knowledge. Spyware infections are a major threat to  ees may disclose trade secrets and possibly make employers
           privacy and intellectual property.                 liable for defamation based on their actions on the corporate
              Spyware may enter the user’s computer as a virus or as a result  website. In response to these concerns, many companies
           of the user clicking some innocent looking, but harmful, links.  monitor their employees’ e-mail and Web surfing activities,
           Spyware is effective in illegally tracking users’ Internet surfing  including postings on social network walls. One tool that
           habits. Using spyware clearly is an invasion of the computer  enables companies to monitor their employees is Google
           user’s privacy and may be illegal. It can also slow down computer  Location, which works in combination with a compatible
           performance. While specific spyware can harvest data, it can also  device (e.g., Android, iOS).
           be used to take pictures from an unsuspecting user’s Webcam and   For workplace privacy and employee monitoring, see
           e-mail or post the photos all over the Internet.   PRC (2014).
              Unfortunately, antivirus software and Internet firewalls can-  The issue of monitoring employees is complex and debat-
           not always detect all spyware; therefore, extra protection is  able because of the possibility of invasion of privacy. For
           needed. Many free and low-cost antispyware software pack-  comprehensive coverage, see PRC (2014). For more about
           ages are available. Representative free antispyware programs  employers and Internet usage monitoring, see wisegeek.org/
           are Microsoft security essentials (windows.microsoft.com/  how-do-employers-monitor-internet-usage-at-work.htm.
           en-us/windows/security-essentials-download), and AVG
           (avg.com). Programs that charge a fee include Trend Micro
           (trendmicro.com) and Kaspersky Lab (usa.kaspersky.com).   Privacy Protection by Information
           Upgraded versions of free programs are also available for a fee.  Technologies
           Symantec and other companies that provide Internet security
           services also provide anti-spyware software.       Dozens of software programs and IT policies and procedures
                                                              are available to protect your privacy. Some were defined in
             RFID’s Threat to Privacy                         Chapter 10. Representative examples are:

           Although several states have mandated or are considering
           legislation to protect customers from loss of privacy due to
           RFID tags,  as mentioned  in Online  Tutorial  T2, privacy   •  Platform for Privacy Preferences Project (P3P).
           advocates fear that the information stored on RFID tags or
                                                                  Software that communicates privacy policies (described
           collected with them may violate an individual’s privacy.
                                                                  later in this chapter).
                                                                •  Encryption. Software programs such as PKI for
             Other Methods                                        encrypting e-mail, payment transactions, and other
                                                                  documents.
           Other methods of collecting data about people are:
                                                                •  Spam blocking. Built into browsers and e-mail;
                                                                  blocks pop-ups and unwanted mail.
              •  Site transaction logs. These logs show what users   •  Spyware blocking. Detects and removes spyware
                are doing on the Internet.                        and adware; built into some browsers.
              •  EC ordering systems and shopping carts. These fea-  •  Cookie managers. Prevents the computer from accept-
                tures permit sellers to know buyers’ ordering history.  ing cookies; identifies and blocks specific types of
              •  Search engines. Search engines can be used to col-  cookies.
                lect information about users’ areas of interest.  •  Anonymous e-mail and surfing.  Allows you to
              •  Web 2.0 tools. Blogs, discussion groups, chatting,   send e-mail and surf without leaving a history.
                social networks, etc. contain a wealth of informa-
                tion about users’ activities and personalities.
              •  Behavioral targeting. Using tools to learn people’s
                preferences (Chapter 9).                        Privacy Policies
              •  Polling and surveys. People’s demographics, thoughts,
                and opinions are collected in surveys.        A useful practice for companies is to disclose their privacy
              •  Payment information and e-wallets. These may   policies to their customers. For an example, see arvest.com/
                include sensitive information about shoppers.  pdfs/about/privacy-and-security/privacy-policy-and-
                                                              notice.pdf.
   409   410   411   412   413   414   415   416   417   418   419