Ebook Electronic commerce (11/E): Part 2

290 39 0
Ebook Electronic commerce (11/E): Part 2

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

(BQ) Part 2 book Electronic commerce has contents: Payment systems for electronic commerce, electronic commerce security, electronic commerce software, web server hardware and software, managing electronic commerce implementations,... and other contents.

CHAPTER www.downloadslide.net THE ENVIRONMENT OF ELECTRONIC COMMERCE: LEGAL, ETHICAL, AND TAX ISSUES LEARNING OBJECTIVES In this chapter, you will learn: • How the legal environment affects electronic commerce activities • What elements combine to form an online business contract • How copyright, patent, and trademark laws govern the use of intellectual property online • That the Internet has opened doors for online crime, terrorism, and warfare • How ethics issues arise for companies conducting electronic commerce • Ways to resolve conflicts between companies’ desire to collect and use their customers’ data and the privacy rights of those customers • What taxes are levied on electronic commerce activities INTRODUCTION Spokeo is a California business that operates an online search engine that, it claims, “organizes white pages listings, public records, and social network information.” Between 2008 and 2010, Spokeo also compiled information from public records and online sources (including social media sites) and sold it in the form of “profiles” to business customers for various uses Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net Chapter These profiles included the person’s address, phone number, marital status, approximate age, e-mail address, hobbies, ethnicity, religion, participation on social media sites, photos, and other information Most of Spokeo’s business customers used these profiles to screen potential job applicants In the United States, the Fair Credit Reporting Act (FCRA) requires that companies who sell information as a consumer reporting agency must take steps to ensure that its practices not 314 violate the consumer protections specified in the FCRA Although Spokeo did not think it was a consumer reporting agency, the U.S Federal Trade Commission (FTC) did, and filed charges against the company for violations of the FCRA In response to the charges, Spokeo changed the terms of service statement on its Web site to make clear that it was not a consumer reporting agency and that its customers could not use the profiles it sold for purposes that were covered by the FCRA The FTC believed these actions were insufficient and argued that Spokeo had marketed the profiles without making sure they would be used for legal purposes The FTC also charged that Spokeo failed to ensure the accuracy of the profiles and neglected to tell its customers what their responsibilities are under the FCRA All three of these requirements are mandated by the FCRA The FTC also charged Spokeo with violations of the Federal Trade Commission Act for making statements about the independence of comments endorsing Spokeo’s services displayed on the site and posted on news and technology Web sites and blogs (the endorsements had actually been written and posted by Spokeo employees) In 2012, Spokeo settled the charges by paying an $800,000 fine and agreeing to change its business practices and Web site The company did not admit that the charges were true as part of the settlement Companies that business on the Web expose themselves, often unwittingly, to liabilities that arise from today’s business environment That environment includes laws and ethical considerations Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues that may be different from those with which the business is familiar Spokeo was unfamiliar with the laws that regulate consumer reporting agencies and did not believe they were operating as such As you will learn in this chapter, Spokeo is by no means the only Web business that has run afoul of laws and regulations As companies business online, they can find themselves subject to unfamiliar laws and different ethical frameworks much more rapidly than when they operated in familiar 315 physical domains THE LEGAL ENVIRONMENT OF ELECTRONIC COMMERCE Businesses that operate on the Web must comply with the same laws and regulations that govern the operations of all businesses If they not, they face the same penalties— including fines, reparation payments, court-imposed dissolution, and even jail time for officers and owners—that any business faces Businesses operating on the Web face two additional complicating factors as they try to comply with the law First, the Web extends a company’s reach beyond traditional boundaries As you learned in Chapter 1, a business that uses the Web becomes an international business instantly Thus, a company can become subject to many more laws more quickly than a traditional brick-and-mortar business based in one specific physical location Second, the Web increases the speed and efficiency of business communications As you learned in Chapters and 4, customers often have much more interactive and complex relationships with online merchants than they with traditional merchants Further, the Web creates a network of customers who often have significant levels of interaction with each other In Chapter 5, you learned how companies use online communications to facilitate complex strategic alliances and supply web relationships These communication- and information-sharing supply chain channels also expose an organization’s operations to other entities Web businesses that violate the law or breach ethical standards can face rapid and intense reactions from large numbers of customers, vendors, and other stakeholders who become aware of the businesses’ activities In this section, you will learn about the issues of borders, jurisdiction, and Web site content and how these factors affect a company’s ability to conduct electronic commerce You will also learn about legal and ethical issues that arise when the Web is used in the commission of crimes, terrorist acts, and even the conduct of war Borders and Jurisdiction Territorial borders in the physical world serve a useful purpose in traditional commerce: They mark the range of culture and reach of applicable laws very clearly Legal rules, Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net Chapter languages, currency, and cultural customs differ from one country to another In the physical world, geographic boundaries almost always coincide with legal and cultural boundaries The limits of what constitutes acceptable behavior and the laws that are adopted in a geographic area are both influenced by that area’s dominant culture The relationships among a society’s culture, laws, and ethical standards appear in Figure 7-1, which shows that culture affects laws directly and indirectly through its effect on ethical standards The figure also shows that laws and ethical standards affect each other 316 Laws FIGURE 7-1 Ethical standards © 2015 Cengage Learning Culture Culture helps determine laws and ethical standards The geographic boundaries on culture are logical; for most of our history, slow methods of transportation and conflicts among various nations have prevented people from travelling great distances to learn about other cultures Both restrictions have changed in recent years, however, and now people can travel easily from one country to another within many geographic regions One example is the European Union (EU), which allows free movement within the EU for citizens of member countries Most of the EU countries (Great Britain being a notable exception) now use a common currency (the euro) instead of their former individual currencies Legal scholars define the relationship between geographic boundaries and legal boundaries in terms of four elements: power, effects, legitimacy, and notice Power Power is a form of control over physical space and the people and objects that reside in that space, and is a defining characteristic of statehood For laws to be effective, a government must be able to enforce them Effective enforcement requires the power both Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues to exercise physical control over residents, if necessary, and to impose sanctions on those who violate the law The ability of a government to exert control over a person or corporation is called jurisdiction Laws in the physical world not apply to people who are not located in or not own assets in the geographic area that created those particular laws For example, the United States cannot enforce its copyright laws on a citizen of Japan who is doing business in Japan and owns no assets in the United States Japanese citizens who bring goods into the United States to sell, however, are subject to applicable U.S laws A Japanese Web site that offers delivery of goods into the United States is, similarly, subject to applicable U.S laws The level of power asserted by a government is limited to that which is accepted by the culture that exists within its geographic boundaries Ideally, geographic boundaries, cultural groupings, and legal structures all coincide When they not, internal strife and civil wars can erupt 317 Effects Laws in the physical world are grounded in the relationship between physical proximity and the effects, or impact, of a person’s behavior Personal or corporate actions have stronger effects on people and things that are nearby than on those that are far away Government-provided trademark protection is a good example of this For instance, the Italian government can provide and enforce trademark protection for a business named Casa di Baffi located in Rome The effects of another restaurant using the same name are strongest in Rome, somewhat less in geographic areas close to Rome, and even less in other parts of Italy That is, the effects diminish as geographic distance increases If someone were to open a restaurant in Kansas City and call it Casa di Baffi, the restaurant in Rome would experience few, if any, negative effects from the use of its trademarked name in Kansas City because it is so far away and because so few people would be potential customers of both restaurants Thus, the effects of the trademark infringement would be controlled by Italian law because of the limited range within which such an infringement has an effect The characteristics of laws are determined by the local culture’s acceptance or rejection of various kinds of effects For example, certain communities in the United States require that houses be built on lots that are at least acres Other communities prohibit outdoor advertising of various kinds The local cultures in these communities make the effects of such restrictions acceptable Once businesses began operating online, they found that traditional effects-based measures did not apply as well and that the laws based on these measures did not work well either For example, France has a law that prohibits the sale of Nazi memorabilia The effects of this law were limited to people in France and they considered it reasonable U.S laws not include a similar prohibition because U.S culture makes a different trade-off between the value of memorabilia (in general) and the negative cultural memory of Nazism When U.S.-based online auction sites began hosting auctions of Nazi memorabilia, those sites were in compliance with U.S laws However, because of the international nature of the Web, these auctions were available to people around the world, Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net Chapter including residents of France In other words, the effects of U.S culture and law were being felt in France The French government ordered Yahoo! Auctions to stop these auctions Yahoo! argued that it was in compliance with U.S law, but the French government insisted that the effects of those Yahoo! auctions extended to France and thus violated French law To avoid protracted legal actions over the jurisdiction issue, Yahoo! decided that it would no longer carry such auctions Legitimacy 318 Most people agree that the legitimate right to create and enforce laws derives from the mandate of those who are subject to those laws In 1970, the United Nations passed a resolution that affirmed this idea of governmental legitimacy The resolution made clear that the people residing within a set of recognized geographic boundaries are the ultimate source of legitimate legal authority for people and actions within those boundaries Thus, legitimacy is the idea that those subject to laws should have some role in formulating them Some cultures allow their governments to operate with a high degree of autonomy and unquestioned authority China and Singapore are countries in which national culture permits the government to exert high levels of unchecked authority Other cultures, such as those of the Scandinavian countries, place strict limits on governmental authority The levels of authority and autonomy with which governments of various countries operate vary significantly from one country to another Online businesses must be ready to deal with a wide variety of regulations and levels of enforcement of those regulations as they expand their businesses to other countries This can be difficult for smaller businesses that operate on the Web Notice Physical boundaries are a convenient and effective way to announce the ending of one legal or cultural system and the beginning of another The physical boundary, when crossed, provides notice that one set of rules has been replaced by a different set of rules Notice is the expression of such a change in rules People can obey and perceive a law or cultural norm as fair only if they are notified of its existence Borders provide this notice in the physical world The legal systems of most countries include a concept called constructive notice People receive constructive notice that they have become subject to new laws and cultural norms when they cross an international border, even if they are not specifically warned of the changed laws and norms by a sign or a border guard’s statement Thus, ignorance of the law is not a sustainable defense, even in a new and unfamiliar jurisdiction This concept presents particular problems for online businesses because they may not know that customers from another country are accessing their Web sites Thus, the concept of notice—even constructive notice—does not translate very well to online business The relationship between physical geographic boundaries and legal boundaries in terms of these four elements is summarized in Figure 7-2 Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues Power Control over space, people, and objects Effects Stronger on people and things that are closer Legitimacy Mandate of those people subject to the laws Notice People must know about a law to obey it FIGURE 7-2 Legal boundaries © 2015 Cengage Learning Physical geographic boundaries 319 Physical geographic boundaries lead to legal boundaries Jurisdiction on the Internet The tasks of defining, establishing, and asserting jurisdiction are much more difficult on the Internet than they are in the physical world, mainly because traditional geographic boundaries not exist For example, a Swedish company that engages in electronic commerce could have a Web site that is entirely in English and a URL that ends in “.com,” thus not indicating to customers that it is a Swedish firm The server that hosts this company’s Web page could be in Canada, and the people who maintain the Web site might work from their homes in Australia If a Mexican citizen buys a product from the Swedish firm and is unhappy with the goods received, that person might want to file a lawsuit against the seller firm However, the world’s physical border-based systems of law and jurisdiction not help this Mexican citizen determine where to file the lawsuit The Internet does not provide anything like the obvious international boundary lines in the physical world Thus, the four considerations that work so well in the physical world—power, effects, legitimacy, and notice—do not translate very well to the virtual world of electronic commerce Governments that want to enforce laws regarding business conduct on the Internet must establish jurisdiction over that conduct A contract is a promise or set of promises between two or more legal entities—people or corporations—that provides for an exchange of value (goods, services, or money) between or among them If either party to a contract does not comply with the terms of the contract, the other party can sue for failure to comply, which is called breach of contract Persons and corporations that engage in business are also expected to exercise due care and not violate laws that prohibit specific actions (such as trespassing, libel, or professional malpractice) A tort is an intentional or negligent action (other than breach of contract) taken by a legal entity that causes harm to another legal entity People or corporations that want to enforce their rights based on either contract or tort law must file their claims in courts with jurisdiction to hear their cases A court has sufficient jurisdiction to hear a matter if it has both subject-matter jurisdiction and personal jurisdiction Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net Chapter Subject-Matter Jurisdiction 320 Subject-matter jurisdiction is a court’s authority to decide a particular type of dispute For example, in the United States, federal courts have subject-matter jurisdiction over issues governed by federal law (such as bankruptcy, copyright, patent, and federal tax matters), and state courts have subject-matter jurisdiction over issues governed by state laws (such as professional licensing and state tax matters) If the parties to a contract are both located in the same state, a state court has subject-matter jurisdiction over disputes that arise from the terms of that contract The rules for determining whether a court has subject-matter jurisdiction are clear and easy to apply Few disputes arise over subject-matter jurisdiction Personal Jurisdiction These terms of use shall be governed by and construed in accordance with the laws of the State of Washington, without regard to its conflict of laws rules Any legal action arising out of this Agreement shall be litigated and enforced under the laws of the State of Washington In addition, you agree to submit to the jurisdiction of the courts of the State of Washington, and that any legal action pursued by you shall be within the exclusive jurisdiction of the courts of King County in the State of Washington FIGURE 7-3 © 2015 Cengage Learning Personal jurisdiction is, in general, determined by the residence of the parties A court has personal jurisdiction over a case if the defendant is a resident of the state in which the court is located In such cases, the determination of personal jurisdiction is straightforward However, an out-of-state person or corporation can also voluntarily submit to the jurisdiction of a particular state court by agreeing to so in writing or by taking certain actions in the state One of the most common ways that people voluntarily submit to a jurisdiction is by signing a contract that includes a statement, known as a forum selection clause, that the contract will be enforced according to the laws of a particular state That state then has personal jurisdiction over the parties who signed the contract regarding any enforcement issue that arises from the terms of that contract Figure 7-3 shows a typical forum selection clause that might be used on a Web site A typical forum selection clause In the United States, individual states have laws that can create personal jurisdiction for their courts The details of these laws, called long-arm statutes, vary from state to state, but generally create personal jurisdiction over nonresidents who transact business or commit tortious acts in the state For example, suppose that a company based in Arizona charges a customer in California for something she did not order The company’s tortious behavior in California could trigger California’s long-arm statute and give its courts personal jurisdiction over the matter Companies should be aware of jurisdictional issues when conducting online business across state and international lines In most states, the application of these laws to companies doing business is still evolving; however, the more business activities a Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net The Environment of Electronic Commerce: Legal, Ethical, and Tax Issues company conducts in a state, the more likely a court will assert personal jurisdiction over that company using its long-arm statute An exception to the general rule for determining personal jurisdiction can arise in the case of tortious acts A business can commit a tortious act by selling a product that causes harm to a buyer The tortious act can be a negligent tort, in which the seller unintentionally provides a harmful product, or it can be an intentional tort, in which the seller knowingly or recklessly causes injury to the buyer The most common businessrelated intentional torts involve defamation, misrepresentation, fraud, and theft of trade secrets Courts tend to invoke their respective states’ long-arm statutes much more often in cases of tortious acts than in breach of contract cases If the case involves an intentional tort or a criminal act, courts will assert jurisdiction even more liberally 321 Jurisdiction in International Commerce Jurisdiction issues that arise in international business are even more complex than the rules governing personal jurisdiction across state lines within the United States The exercise of jurisdiction across international borders is governed by treaties between the countries engaged in the dispute Some of the treaties that the United States has signed with other countries provide specific determinations of jurisdiction for disputes that might arise However, in most matters, U.S courts determine personal jurisdiction for foreign companies and people in much the same way that these courts interpret the long-arm statutes in domestic matters Non-U.S corporations and individuals can be sued in U.S courts if they conduct business or commit tortious acts in the United States Similarly, foreign courts can enforce decisions against U.S corporations or individuals through the U.S court system if those courts can establish jurisdiction over the matter Courts asked to enforce the laws of other nations sometimes follow a principle called judicial comity, which means that they voluntarily enforce other countries’ laws or judgments out of a sense of comity, or friendly civility However, most courts are reluctant to serve as forums for international disputes Also, courts are designed to deal with weighing evidence and making findings of right and wrong International disputes often require diplomacy and the weighing of costs and benefits Courts are not designed to cost–benefit evaluations and cannot engage in negotiation and diplomacy Thus, courts (especially U.S courts) prefer to have the executive branch of the government (primarily the State Department) negotiate international agreements and resolve international disputes The difficulties of operating in multiple countries are faced by many large companies that business online For example, eBay, which had struggled to compete in China for many years, finally closed its operations in the country in 2006 eBay entered China in 2003 with a $30 million investment In subsequent years, it poured another $250 million into acquisitions and advertising in China But its effort to compete effectively against Alibaba.com’s TaoBao consumer auction unit failed Some observers believe that a Chinese cultural tendency to favor home-grown online services caused eBay’s difficulties; however, others noted that Chinese laws favored Chinese companies and blocked eBay’s PayPal unit from operating in China Some have even Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net Chapter 322 accused the Chinese government of intentionally blocking access to eBay’s site for a few minutes each day so that Chinese competitors (some of which are owned, in part or completely, by the Chinese government) would appear to be more reliable Many argued that eBay, as a foreign company, was at a considerable disadvantage because of these government regulations The culture and government of China were also problematic for Google In 2006, after going through the lengthy process of obtaining a government license to open a search engine site based in China (Google.cn; the company had operated Chinese language versions of Google.com for years), Google found its license revoked after less than three months of operations The Chinese authorities questioned whether Google was operating a search engine (as permitted under the license) or a news service (under Chinese law, foreign owners are not permitted to operate online news services) Google worked hard to satisfy China’s bureaucrats and was granted another operating license in 2007 After two years of operation under the new license, during which a number of conflicts arose between Google and the Chinese government over censorship, Google found that its computer systems in China had been hacked Internal investigations concluded that the sophistication of the attack and its targets suggested that the Chinese government was involved in the attack Specifically, the hackers had accessed the e-mail accounts of Chinese dissidents and human rights activists In 2010, as a result of the attack and a general weariness with fighting with government censors, Google decided to close its operations in China Jurisdictional issues are complex and change rapidly Any business that intends to conduct business online with customers or vendors in other countries should consult an attorney who is well versed in issues of international jurisdiction However, there are a number of resources online that can be useful to non-lawyers who want to preliminary investigation of a legal topic such as jurisdiction The Harvard Law School’s Berkman Center for Internet & Society Web site includes links to many current Internet-related legal issues and the Berkeley Technology Law Journal includes articles that analyze these topics The UCLA Online Institute for Cyberspace Law and Policy contains an archive of legal reference materials published between 1995 and 2002, important years in the development of online law Conflict of Laws In the United States, business is governed by federal laws, state laws, and local laws Sometimes, these laws address the same issues in different ways Lawyers call this situation a conflict of laws Because online businesses usually serve broad markets that span many localities and many states, they generally look to federal laws for guidance On occasion, this can lead to problems with state and local laws One online business that faced a serious conflict of laws problem was the online wine sales industry Since the repeal of national Prohibition in 1933, all U.S states and most local governments have enacted a myriad of laws that heavily regulate all types of alcoholic beverage sales These laws govern when and where alcoholic beverages of various kinds can be sold, who can purchase them, and where they can be consumed Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net Index 598 smart cards (continued) in Japan, 496 Octopus Card, 496 in the United States, 496 smartphones, 15, 60 smart sourcing, 230 See also impact sourcing SMS (short messaging service), 99, 284 SMTP (Simple Mail Transfer Protocol), 73 sniffer programs, 450 snipes and sniping software, 301 SOAP (Simple Object Access Protocol), 415 social commerce, 16 social media and networks See also auctions blogs, 275–276 business strategies and, 518 children and, 348–350 criminals and, 340–341 cyberbullying, 340 early communities, 271–272 emergence of, 272–277 idea-based, 279 marketing through, 180, 207–208 mobile commerce, 284–289 revenue models, 280–284 virtual learning, 279 social networking administrators, 535 spreading of, 16 social shopping, 278 Society of American Travel Writers Silver Award, 166 Softbank, 43 software See also browsers agents, 101 auction, 301–302 case examples, 397–399, 403–404 e-mail, 72 filtering, 349 project management, 531–532 Web hosting alternatives, 405 for Web servers, 374–376 (See also Web servers) software, e-commerce basic functions of, 405–410 case examples, 428–431 introduction, 403–404 for large businesses, 419–424 for midsize businesses, 418–419 other software and, 410–416 for small and midsize companies, 416–418 Web hosting alternatives, 405 software-based threats, 464–465 software-only digital wallets, 494–495 Solaris, 375, 376 Solar Turbines, 299 Sony, 127, 299 Sony Online Entertainment, 140 sourcing, 230 South Korea, 13, 434, 453 Southwest Airlines, 212 spam basic content filtering, 379–380 individual user antispam tactics, 378–379 legal solutions, 382–384 overview, 199 phishing and, 502, 504 statistics, 377–378 technical solutions, 384–385 Spam and Open Relay Blocking System, 380 Spamhaus Project, 380 spear phishing, 501 specialists (auctioneers), 292 specialty consumer auctions, 296 spend, defined, 232 spiders, 208 Spokeo, 313–315 sponsored top-level domains (sTLDs), 78 sponsorships search term, 209 site, 195–196 spoofing, 452 sports programming, market segments for, 181 sportsters, 185 Spotify, 126 spot market, 232 spot purchasing, 232 SpyEye, 444 Square, 499 SRI International, 62 SSL (Secure Sockets Layer), 458–460 SSL-EV (Secure Sockets Layer-Extended Validation) digital certificates, 447 SSUTA (Streamlined Sales and Use Tax Agreement), 353 staffing, 25, 533–536 stakeholders, 149 stalking, 340 Standard Generalized Markup Language (SGML), 79, 81 Standard Performance Evaluation Corporation, 389 Stanford Copyright & Fair Use, 330 Staples, 176, 233 Starbucks, 269–270 start pages, 85 startups, funding, 523–524 Starz, 127 state sales taxes, 351–353 static catalogs, 406–407 static pages, 369 statistical modeling, 203 Statute of Frauds, 326 statutory law, 333 steganography, 448 stickiness, 129 stickiness of Web sites, 280–281 Sting, 334 sTLDs (sponsored top-level domains), 78 stock brokerage firms, 135 stockouts, 252 stolen goods, 341 store-branded cards, 485 See also store charge cards store charge cards, 485 See also store-branded cards stored-value cards, 495–496 See also smart cards magnetic strip cards, 496 smart cards, 496 storytelling, 173–175 strategic alliances/partnerships, 31, 147–148 strategic business units (SBUs), 30 Streamlined Sales and Use Tax Agreement (SSUTA), 353 Stub Hub, 136 style sheets, 87 subject-matter jurisdiction, 320 subnetting, 71 subscription model fee-for-content, 124–128 transitions from/to, 143–144 sufficient jurisdiction, 319 suitability of products for e-commerce, 20–21 Sullivan, Danny, 211 Sumner, Gordon, 334 suppliers advantages of using Internet technologies, 250 AmazonSupply site and, 255 Google Shopping for Suppliers site and, 255 tier-one, 248 tier-three, 248 tier-two, 248 supply alliances, 248 Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net Index supply chain, 230, 247 increasing efficiencies in, 250–251 management (See supply chain management) trust, building and maintaining in, 254 ultimate consumer orientation, creating in, 253–254 value creation in, 248 Supply Chain Council, 249 supply chain management, 247–254, 248 auctions and, 299–300 case example, 262–264 goal of, 248, 253 Internet technologies and, 247–254 main discussion, 248–250 materials-tracking technologies, 251–253 software, 422 Supply Chain Council and, 249 supply chain efficiencies, increasing, 250–251 technology-enabled, 250 trust, building and maintaining in, 254 ultimate consumer orientation, creating, 253–254 value creation and, 248–250 supply management, supply webs, 238–239 supporting activities, 33–34, 229, 234–236 surfers, 185 surf vacation sites, 139 Sviokla, John, 202 SWOT analysis, 37–38 Symantec, 456 Symantec Intelligence Reports, 385 Symantec Security Response, 444 Symbian, 287 symmetric connections, 94 symmetric encryption, 456–457 Syracuse University, 79 systems administrators, 536 T T Rowe Price, 158 tablet devices, 15–16, 61, 100, 285–286 tags, 79, 82–84, 91 Talbots, 122, 182 Target, 52, 120, 148, 252 tariffs, 353 taxation, 350–353, 410 TCO (total cost of ownership), 521 TCP (Transmission Control Protocol), 70 TCP/IP, 70 TD Ameritrade, 135 TechCrunch, 276 technical content, 125 technologies See also Internet; specific technologies in first and second waves, 13–14 integration issues, 25 materials-tracking, 251–253 in third wave, 16, 17 tracking, 17–18 usability and, 153–154 video delivery, 127–128 technology development activities, 35, 234–235 technology-enabled CRM, 201–204 technology-enabled supply chain management, 250 teergrubing, 385 telecommuting/telework, 7, 23, 31, 67 telephone connections, voicegrade, 94 television advertising, 129 fee-for-content model, 128 market segmentation, 181 Tellers, Kate, 174 Telnet, 386, 459, 467 Tereshchuk, Myron, 340 terms of service (ToS) agreements, 328 terrorism, 341–342 Tesco, 24 testing, usability, 158 test version, 534 text ads, 193–194 text chats, 124 text markup languages, 79 Thaler, William, 291 Thawte, 446 Theglobe.com, 272 therapy services, 141 TheStreet.com, 282 third-generation (3G) wireless technology, 100 third-party cookies, 439 third-party logistics (3PL) providers, 234 Thorn Tree, 166 threats database, 464 integrity, 452–453 necessity, 453 overview, 435–436 password attack, 462–463 physical, communication channels, 453 physical, Web servers, 465 secrecy, 450–452 software-based, 464–465 Web server, 462–463 3DES, 457 3G wireless technology, 100 three-tier architecture, 373 throughput, 389 Ticketmaster, 136 TicketsNow, 136 tier-one suppliers, 248 tier-three suppliers, 248 tier-two suppliers, 248 Tiffany & Co., 204 Times Mirror, 296 Time Warner, 76, 344 TLDs (top-level domains), 77 T1 lines, 97 T3 lines, 97 tobacco products, advertising, 337 Tohan, 43 Tomlinson, Ray, 62–63 Top 10 Information Architecture Mistakes, 153 top-level domains (TLDs), 77 Tor, 452 torts, 319 ToS (terms of service) agreements, 328 total cost of ownership (TCO), 521 touchpoints, 186, 202 Toys“R”Us, 52 Trace Center, 154 Tracert, 385–386 tracking technologies, 17–18, 251–253 trademark dilution, 336–337 trademark issues, 333 trade names, 333 Trader Publishing, 133 trading partners, 10 trading pits, 292 training activities, 234, 235 transaction costs, 27–31 transaction processing, 409–410 transactions, defined, transaction servers, 371 transaction taxes, 350, 353 transceivers, 99 transfer taxes, 350 translation services, language, 41 TransLink smart card system, 496 599 Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net Index 600 Transmission Control Protocol (TCP), 70 transportation, advertising, 337 Travelocity, 138 travel sites, revenue models, 131, 137–139 TreasuryDirect, 236 Treo, 60 trial visits, 196 Tribe.net, 273 trigger words, 184 TriNet, 229 Triple DES, 457 Tripod, 272 Trojan horses, 442, 444, 449, 464 trust international commerce and, 40 marketing and, 178–180 in supply chain, 254 usability and, 157–158 Trusted Computer System Evaluation Criteria, 435 trusted networks, 467 Tuenti, 274 Tunisia, 43 TurboTax, 23 TV.com, 128 Twitter, 17, 180, 207, 273, 274, 275 24/7 operation, 529 20th Century Fox, 127 two-tier client/server architecture, 372–373 typosquatting, 333 See also name changing U UAP (universal ad package), 191 UCC (Uniform Commercial Code), 325 UCE (unsolicited commercial e-mail), 199 UCLA Online Institute for Cyberspace Law and Policy, 322 Uclue, 282 UDDI (Universal Description, Discovery, and Integration Specification), 415 UDRP (Uniform Domain Name Dispute Resolution Policy), 334 UIGEA (Unlawful Internet Gambling Enforcement Act), 339 ultimate consumer orientation, 253 Ultra High Security Password Generator, 463 Ultra Wideband (UWB), 98 Unfair Contract Terms European Union Directive, 326 Uniform Commercial Code (UCC), 325 Uniform Domain Name Dispute Resolution Policy (UDRP), 334 Uniform Resource Locators (URLs), 74 United Arab Emirates, 43 United Kingdom, 63, 102 United Nations, UN/EDIFACT, 240–241 See also EDI for Administration, Commerce, and Transport (EDIFACT) United Nations Convention on CISG, 326 Universal, 127 universal ad package (UAP), 191 Universal Description, Discovery, and Integration Specification (UDDI), 415 University of California, Los Angeles, 62 University of California, Santa Barbara, 62 University of Illinois, 75–76, 367 University of Maryland HumanComputer Interaction Lab, 158 University of North Carolina, 63 University of Texas Copyright Crash Course, 330 University of Utah, 62 UNIX, 376 Unlawful Internet Gambling Enforcement Act (UIGEA), 339 unsolicited commercial e-mail (UCE), 199 untrusted networks, 467 upload bandwidth, 94 uPortal, 279 UPS, 234 upstream bandwidth, 94 upstream strategies, 517 URL brokers, 213 URLs (Uniform Resource Locators), 74 U.S Anticybersquatting Consumer Protection Act, 334, 358 U.S CAN-SPAM law, 382 U.S Constitution, 323, 329 U.S Department of Defense, 62, 80, 435 U.S Department of Homeland Security, 341 U.S Department of Justice, 338–339 U.S Department of the Treasury, 339 U.S Federal Reserve Bank, 490 U.S Federal Trade Commission on spam, 384 U.S Federal Trade Commission (FTC) advertising regulation by, 337 privacy rights and, 343–348 Spokeo and, 314–315 U.S government, use of EDI by, 10 U.S income taxes, 351 U.S Navy, 299 U.S Panasonic, 531 U.S Pentagon, 433 U.S state sales taxes, 351–353 USABancshares.com, 508 usability, 153–160 usage-based market segmentation, 183–185 USA Today, 525 used cars, 21 used vehicle sites, 133 Usenet, 63, 271 “User Agreement,” 328 User’s News Network, 63 use taxes, 352 utility programs, 386–387 UWB (Ultra Wideband), 98 V VacationsToGo.com, 139 value-added networks (VANs), 10, 245–247 advantages of using, 246 costs of, 247 defined, 246 direct connection EDI, 245 indirect connection EDI, 246 nonrepudiation, 247 Value Added Tax (VAT), 353 value chains, 33–37 ValueClick, 192 value systems, 35 value-to-weight ratio, 21, 26 Vanorder, Gil, 358 VANs See value-added networks (VANs) VAT (Value Added Tax), 353 VBScript, 441 V Code (verification code), 489 vegetables, 24 Vendio, 301 Ventro, 255, 257 venture capitalists, 524 Verance, 335 verification code (V-Code or V Code), 489 Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net Index VeriSign, 446 Verizon, 96 vertical integration, 29–30 vertical portals, 254, 255 vicarious copyright infringement, 331 Vickrey, William, 292 Vickrey auctions, 292, 293 video chats, 124 videos fee-for-content model, 127–128 rich media ads, 195 YouTube, 14, 273 viral marketing, 207–208 virtual communities, 22, 271 The Virtual Community, 271 virtual companies, 31 virtual learning networks, 279 virtual model feature, 124 virtual private networks (VPNs), 68 Virtual Vineyards, 42 Virtual Works, 358 viruses main discussion, 442–444 on mobile devices, 448–449 overview, 377 Visa credit cards, 485, 486 digital wallet, 495 interchange networks and, 486, 490 phone reader, 289 visits, 196 VKontakte, 274 V.me devices, 495 voice-grade lines, 95 voice-grade telephone connections, 94 Volkswagen, 358 Voltrank, 192 Volusion, 408 vortals, 255 See also vertical portals VPNs (virtual private networks), 68 vw.com and vw.net, 358 W The Wall Street Journal, 125, 133, 525 Wal-Mart, 9, 10, 120–121, 228, 247, 252 Walt Disney, 127, 204 WANs (wide area networks), 65 WAP (Wireless Application Protocol), 286 WAPs (wireless access points), 98, 454 warchalking, 454 Ward, Aaron Montgomery, 119 wardrivers, 454 warfare, 341–342 Warner Brothers, 127 warranties and disclaimers, 326–327 warranty disclaimer, 327 WaveHunters.com, 139 W3C (World Wide Web Consortium), 80, 81 W3C Getting Started with HTML, 84 W3C HTML 5, 81 W3C HTML Working Group, 81 W3C Semantic Web, 102 W3C Web Accessibility Initiative, 154 W3C XHTML Version 1.0 Specification, 80 W3C XML Pages, 92 Web communication on, 160–161 defined, 62 emergence of, 74–79 page request and delivery protocols, 73–74 Web 2.0, 14, 16 Web APIs, 413 Web browser software, 73 Web bugs, 440 web catalog revenue model, 119–124 Web client computers, 73 Web client software, 73 Web communities, 271–272 Web directories, 130, 209 Web EDI, 247 See also Internet EDI; open EDI Web graphics designers, 535 Web hosting alternatives, 405 evaluation criteria, 522 outsourcing, 529 Web logs, 179, 275–276 Web programmers, 534 Web servers See also e-mail basics, 368–374 case examples, 367–368, 399–400 defined, 75 hardware, 388, 390–393 performance evaluation, 389–390 software, 374–376 threats, 462–463 utility programs, 386–387 XML and, 92 Web server software, 73 Web services, 413–416, 430–431 examples of implementations of, 414 functioning of, 414–415 Representational State Transfer (REST), 415–416 RESTful applications, 415–416 RESTful design, 415–416 specifications, 415 uses of, 414 Web services, anonymous, 451 Web Services Description Language (WSDL), 415 Web site design, customercentric, 158–160 Web sites and presences See also software brand image, 150 case examples, 165–169 communicating with customers, 160–162 costs, 521–523 creating effective presence, 149–153 evolution of, 526–527 identifying goals, 149–153 for mobile devices, 288 strategies for developing, 526–531 usability, 153–160 WebSphere Commerce Enterprise, 419 WebSphere Commerce Professional, 419 WebTrends, 387 WebVan, 24 WebWord.com, 155 Web-wrap acceptance, 326 WELL, 271–272 Wells Fargo, 494 We Love Etsy, 278 WEP (Wireless Encryption Protocol), 454 Western Union, 494 Wevorce, 516 Wheeler, Tony and Maureen, 166 white hat hackers, 436 white list spam filter, 380 Whole Earth Review, 272 wide area networks (WANs), 65 Wi-Fi, 98–99 Wikimedia Foundation, 281 Wikipedia, 14 Williamson, Oliver, 29 WiMAX (Worldwide Interoperability for Microwave Access), 100 601 Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it www.downloadslide.net Index 602 Windows Live ID, 495 Windows Phone, 287 Winebid, 296 Wine.com, 42 wine industry, sales regulation, 323 Wingspan Bank, 508 winner’s curse, 291 WIPO (World Intellectual Property Organization), 334 Wired Magazine, 141 wireless access points (WAPs), 98, 454 Wireless Application Protocol (WAP), 286 wireless connections, 97–100 Wireless Encryption Protocol (WEP), 454 wireless Ethernet, 98 wireless networks, threats to, 454 wire transfers, 10 World Intellectual Property Organization (WIPO), 334 World Trade Organization, 339 Worldwide Interoperability for Microwave Access (WiMAX), 100 World Wide Web Consortium (W3C), 80, 81 worms, 442–444 writings, 326 WSDL (Web Services Description Language), 415 WSJ.com, 525 Wu, Juliet, 398 W.W Grainger, 9, 233 X Xanadu, 74 XBRL (Extensible Business Reporting Language), 91 XHTML (Extensible Hypertext Markup Language), 80 Xing, 274 XML editors, 93 main discussion, 87–92 Semantic Web and, 101–102 SGML and, 79 in Web services, 414–415 XML parsers, 92 XML Spy, 93 XML vocabularies, 92 XSL (Extensible Stylesheet Language), 92 Y Yaga, 483 Yahoo! advertising model on, 131 Answers, 282 Answers site, 282 antivirus scan on e-mails, 444 Art.com, agreement with, 212 auction site, 295, 318 botnet attack on, 453 domain names, 212 Games, 77 GeoCities, 272 Japan, 43 in late 1990s, Mail, 72, 444 Nazi memorabilia, 317 Overture, 211 premium e-mail service, 142 Small Business Ecommerce, 416 social networking elements, 281 third wave opportunities and, 18 traffic statistics, 281 Wallet, 495 Web Directory, 329 Yankee auctions, 291 Y Combinator, 515–516, 530 Yemen, 43 Yesmail, 199 Yodlee, 137, 148 YouTube, 14, 128, 174, 273 Yunus, Muhammad, 282 Z Zeus, 444 Zhivago, Kristin, 159 Zhivago Marketing Partners, 159 ZigBee, 98 ZigBee Alliance, 98 Zimmerman, Phil, 456 zombies and zombie farms, 442, 503 zShops, 475 Zuckerberg, Mark, 273 Zynga, 288 Copyright 2015 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s) Editorial review has deemed that any suppressed content does not materially affect the overall learning experience Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it ... Copyright 20 15 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook. .. Copyright 20 15 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook. .. Copyright 20 15 Cengage Learning All Rights Reserved May not be copied, scanned, or duplicated, in whole or in part Due to electronic rights, some third party content may be suppressed from the eBook

Ngày đăng: 18/01/2020, 16:04

Mục lục

  • Brief Contents

  • Table of Contents

  • Preface

  • Part 1: Introduction

    • Ch 1: Introduction to Electronic Commerce

      • The Evolution of Electronic Commerce

      • The Development and Growth of Electronic Commerce

      • Business Models, Revenue Models, and Business Processes

      • Electronic Commerce: Opportunities, Cautions, and Concerns

      • Economic Forces and Electronic Commerce

      • Identifying Electronic Commerce Opportunities

      • International Nature of Electronic Commerce

      • Summary

      • Key Terms

      • Ch 2: Technology Infrastructure: The Internet and the World Wide Web

        • The Internet and the World Wide Web

        • Packet-Switched Networks

        • Internet Protocols

        • Emergence of the World Wide Web

        • Markup Languages and the Web

        • Internet Connection Options

        • Internet2 and the Semantic Web

        • Summary

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan