Page 414 - Introduction to Electronic Commerce and Social Commerce
P. 414
402 12 Implementation Issues: From Globalization to Justification, Privacy, and Regulation
Spyware as a Threat to Privacy and Intellectual Property Monitoring Employees
In Chapter 10, we described spyware as a tool that some There are several issues concerning Internet use at work and
merchants use to gather information about users without employee privacy. In addition to wasting time online, employ-
their knowledge. Spyware infections are a major threat to ees may disclose trade secrets and possibly make employers
privacy and intellectual property. liable for defamation based on their actions on the corporate
Spyware may enter the user’s computer as a virus or as a result website. In response to these concerns, many companies
of the user clicking some innocent looking, but harmful, links. monitor their employees’ e-mail and Web surfing activities,
Spyware is effective in illegally tracking users’ Internet surfing including postings on social network walls. One tool that
habits. Using spyware clearly is an invasion of the computer enables companies to monitor their employees is Google
user’s privacy and may be illegal. It can also slow down computer Location, which works in combination with a compatible
performance. While specific spyware can harvest data, it can also device (e.g., Android, iOS).
be used to take pictures from an unsuspecting user’s Webcam and For workplace privacy and employee monitoring, see
e-mail or post the photos all over the Internet. PRC (2014).
Unfortunately, antivirus software and Internet firewalls can- The issue of monitoring employees is complex and debat-
not always detect all spyware; therefore, extra protection is able because of the possibility of invasion of privacy. For
needed. Many free and low-cost antispyware software pack- comprehensive coverage, see PRC (2014). For more about
ages are available. Representative free antispyware programs employers and Internet usage monitoring, see wisegeek.org/
are Microsoft security essentials (windows.microsoft.com/ how-do-employers-monitor-internet-usage-at-work.htm.
en-us/windows/security-essentials-download), and AVG
(avg.com). Programs that charge a fee include Trend Micro
(trendmicro.com) and Kaspersky Lab (usa.kaspersky.com). Privacy Protection by Information
Upgraded versions of free programs are also available for a fee. Technologies
Symantec and other companies that provide Internet security
services also provide anti-spyware software. Dozens of software programs and IT policies and procedures
are available to protect your privacy. Some were defined in
RFID’s Threat to Privacy Chapter 10. Representative examples are:
Although several states have mandated or are considering
legislation to protect customers from loss of privacy due to
RFID tags, as mentioned in Online Tutorial T2, privacy • Platform for Privacy Preferences Project (P3P).
advocates fear that the information stored on RFID tags or
Software that communicates privacy policies (described
collected with them may violate an individual’s privacy.
later in this chapter).
• Encryption. Software programs such as PKI for
Other Methods encrypting e-mail, payment transactions, and other
documents.
Other methods of collecting data about people are:
• Spam blocking. Built into browsers and e-mail;
blocks pop-ups and unwanted mail.
• Site transaction logs. These logs show what users • Spyware blocking. Detects and removes spyware
are doing on the Internet. and adware; built into some browsers.
• EC ordering systems and shopping carts. These fea- • Cookie managers. Prevents the computer from accept-
tures permit sellers to know buyers’ ordering history. ing cookies; identifies and blocks specific types of
• Search engines. Search engines can be used to col- cookies.
lect information about users’ areas of interest. • Anonymous e-mail and surfing. Allows you to
• Web 2.0 tools. Blogs, discussion groups, chatting, send e-mail and surf without leaving a history.
social networks, etc. contain a wealth of informa-
tion about users’ activities and personalities.
• Behavioral targeting. Using tools to learn people’s
preferences (Chapter 9). Privacy Policies
• Polling and surveys. People’s demographics, thoughts,
and opinions are collected in surveys. A useful practice for companies is to disclose their privacy
• Payment information and e-wallets. These may policies to their customers. For an example, see arvest.com/
include sensitive information about shoppers. pdfs/about/privacy-and-security/privacy-policy-and-
notice.pdf.