Professional Documents
Culture Documents
1.0 INTRODUCTION
networks of local to global scope that are linked by a broad array of electronic and optical
networking technologies. The Internet carries a vast array of information resources and services,
most notably the inter-linked hypertext documents of the World Wide Web (WWW) and the
As the internet provides us with lots of information, entertainments, and knowledge, internet
has become very important and beneficial to every single user. The saying that ‘the worlds is at
your fingertips’ really true as any affairs could be done with a blink of eyes without wasting
money and times. For instance, e-commerce, social networking websites and blogs are really
helps in fasten our daily activities. However, these eases cause privacy issues to appear and the
1
2.0 DEFINITION, DESCRIPTION AND EXAMPLES
2.1 E-commerce
2.1.1 Definition
systems such as the Internet and other computer networks. The amount of trade
systems. Modern electronic commerce typically uses the World Wide Web at least
at some point in the transaction's lifecycle, although it can encompass a wider range
known as e-tail. Almost all big retailers have electronic commerce presence on
2
electronic market). Electronic commerce that is conducted between businesses and
buyer is directly online to the seller's computer usually via the internet. There is no
intermediary is present, then the sale and purchase transaction is called electronic
It also consists of the exchange of data to facilitate the financing and payment
3
2.1.2 History
The meaning of electronic commerce has changed over the last 30 years.
and Electronic Funds Transfer (EFT). These were both introduced in the late 1970s,
also forms of electronic commerce. Another form of e-commerce was the airline
transaction processing computer via a domestic telephone line and invented online
home shopper was Mrs Jane Snowball,72, of Gateshead, England in May 1984.
[4]
During the 1980s Aldrich sold many systems mainly in the UK
car buyer on a dealer's lot to both buy and finance the car, including credit check,
online.[6] Aldrich invented both the online shopping system and the business
rationale for using it. His system was copied and his ideas were plagiarised. His
4
1980s systems were as fast as 2010 internet shopping systems. They used dial-up
and leased telephone lines as broadband was not available. He never patented his
shopping system and his ideas are the basis of internet shopping.
warehousing.
popular worldwide around 1994 when the first internet online shopping started, it
connection to the Internet. By the end of 2000, many European and American
business companies offered their services through the World Wide Web. Since then
various goods through the Internet using secure protocols and electronic payment
services.
5
2.1.3 Business Application
2.1.3.1 Email
2.1.3.4 Newsgroups
2.1.3.10 Teleconferencing
6
2.1.4 Examples
A business calls a toll free number and orders a computer using the
auction.
extranet.
(ATM).
provided below.
the book and prints it along with cover. Not an e-commerce retail
7
network. However, the right to access the digital archived copy is an e-
a toll free number and places the order with an operator. Not an e-
computer-enabled.
music was downloaded, and the CD was mastered within the kiosk this
8
2.1.4.2 Examples of e-commerce websites are
Djin
http://www.djin.se/
Putuka
http://www.putuka.com/
9
Habitat Shoes
http://www.habitatshoes.com/
Design Loot
http://www.designloot.com/
10
2.2 Social networking websites
2.2.1 Definition
user (often a profile), his/her social links, and a variety of additional services. Most
social network services are web based and provide means for users to interact over
allow users to share ideas, activities, events, and interests within their individual
networks.
The main types of social networking services are those which contain category
Germany), iWiW (mostly in Hungary), Tuenti (mostly in
Spain), Decayenne, Tagged, XING, Badoo and Skyrock in parts of
Europe; Orkut and Hi5 in South America and Central
11
America; and Friendster,Mixi, Multiply, Orkut, Wretch, renren and Cyworld in
There have been some attempts to standardize these services to avoid the need to
Source Initiative).
Although some of the largest social networks were founded on the notion of
digitizing real world connections, many networks focus on categories from books
12
2.2.2 History
(BBS). Many prototypical features of social networking sites were also present in
people together to interact with each other through chat rooms, and encouraged
users to share personal information and ideas via personal webpages by providing
each other via email addresses. In the late 1990s, user profiles became a central
feature of social networking sites, allowing users to compile lists of "friends" and
New social networking methods were developed by the end of the 1990s, and
many sites began to develop more advanced features for users to find and manage
friends. This newer generation of social networking sites began to flourish with the
13
2005, MySpace was reportedly getting more page views than Google. Facebook, ,
launched in 2004, has since become the largest social networking site in the world.
Today, it is estimated that there are now over 200 active sites using a wide variety
14
2.2.3 Typical Structure
2.2.3.1 Basic
themselves to their profiles, post blog entries for others to read, search for
other users with similar interests, and compile and share lists of contacts. In
friends and other users. To protect user privacy, social networks usually
have controls that allow users to choose who can view their profile, contact
In recent years, it has also become common for wide variety organizations
15
Lately, mobile social networking has become popular. In most mobile
communities, mobile phone users can now create their own profiles, make
conversations, share photos and videos, and share blogs by using their
mobile phone. Mobile phone users are basically open to every option that
services which allow their customers to build their own mobile community
and brand it, but one of the most popular wireless services for social
new innovative features which extend the social networking experience into
16
2.2.4 Examples of social network websites
Myspce
http://www.myspace.com/
http://www.facebook.com/
17
Friendster
http://www.friendster.com/
Tagged
http://www.tagged.com/index.html?r=/home.html
18
2.3 Blogs
2.3.1 Definition
personal online diaries. A typical blog combines text, images, and links to other
blogs, Web pages, and other media related to its topic. The ability of readers to
blogs are primarily textual, although some focus on art (Art blog), photographs
112,000,000 blogs
19
2.3.2 History
The term "weblog" was coined by Jorn Barger on 17 December 1997. The short
form, "blog," was coined by Peter Merholz, who jokingly broke the
both a noun and verb ("to blog," meaning "to edit one's weblog or to post to one's
20
2.3.3 Types
traditional, most common blog. Personal bloggers usually take pride in their
blog posts, even if their blog is never read. Blogs often become more than a
art. Blogging can have a sentimental quality. Few personal blogs rise to
fame and the mainstream, but some personal blogs quickly garner an
instantaneously with friends and family, and are much faster than emailing
or writing.
societies are called club blogs, group blogs, or by similar names; typical use
activities.
21
2.3.3.3 By genre
a mom blog While not a legitimate type of blog, one used for the sole
see typecasting (blogging).
22
2.3.3.5 By device
Blogs can also be defined by which type of device is used to compose it. A
This practice of semi-automated blogging with live video together with text
in legal matters
23
2.3.4 Community and cataloging
2.3.4.1 The Blogosphere
Several blog search engines are used to search blog contents, such
24
2.3.4.3 Blogging communities and directories
blogs has also given rise to "fake blogs" in which a company will create a
25
2.3.5 Examples of blog
26
2.3.5.3 By genre
27
3.0 PRIVACY CONCERN IN E-COMMERCE
new technical environment for consumers and businesses, the resulting data flow with
understand each one of these, and to understand the tradeoffs. Privacy as a business issue
even case law in the US) can dramatically alter business issues and possibilities.
Below is an overview of the research and business issues. This will include the
concerns. In this examination, our attempt is not to predict what will happen or should
happen, but to present issues to guide further research and business activity.
environment. The use of digital systems allows data capture at a much larger rate and
scope than previously; e-commerce sites could potentially collect an immense amount of
data about personal preferences, shopping patterns, patterns of information search and
use, and the like about consumers, especially if aggregated across sites. Not only is it
easier than ever to collect the data, it is also much easier to search these data [Dhillon and
Moores 2001]. New computational techniques allow data mining for buying patterns and
other personal trends. These data can be used to personalize a customer’s e-commerce
28
experience, augment an organization’s customer support, or improve a customer’s
specific e-site experience. The data are valuable for reuse, for example, in finding
potential sales to existing customers. As well, the data are also valuable to aggregators
(who may look for other personal trends and patterns) or for other types of resale. Indeed,
reuse and resale are simultaneously both potential opportunities and problems.
From the viewpoint of customers, many e-commerce sites have done foolish
things with their customers’ data [Fisher 2001]. Consumers’ opinions in this have been
confirmed by media stories of particularly egregious privacy failures and public relations
nightmares. Broadly speaking, consumers are merely confirmed in their opinions by the
media. As mentioned, few consumers trust companies to keep their data private. In one
survey, 92% of respondents indicated that even when companies promised to keep
Culnan and Armstrong [1999] make the argument that consumers have two kinds
of privacy concerns. First, they are concerned over unauthorized access to personal data
because of security breaches (see below) or the lack of internal controls. Second,
consumers are concerned about the risk of secondary use – the reuse of their personal
data for unrelated purposes without their consent. This includes sharing with third parties
who were not part of the transaction in which the consumer related his or her personal
data. It also includes the aggregation of a consumers’ transaction data and other personal
data to create a profile. Smith, Milberg, and Burke [1996] raise two additional concerns
based on Delphi studies, general concerns about personal data being collected and
29
Beyond the research literature describing a general anxiety (and its extent), there
is some research literature providing more detail. A persistent finding, over several
and the marginally concerned. These groupings have been consistent across studies (e.g.,
[Ackerman, Cranor, and Reagle 1999], [Spiekermann, Grossklags, and Berendt 2001]).
(Spiekermann et al. divided the pragmatics into those who were considered with
revealing their identity and those who were more concerned about making their personal
profiles available.) In Ackerman et al., these groups were 17%, 56%, and 27% of the
and fewer marginally concerned in Germany. The groups differ significantly in their
privacy preferences and attitudes. The marginally concerned group is mostly indifferent
concerned about its privacy, but is willing to trade personal data for some benefit (e.g.,
customer service). Nonetheless, consumers still want adequate measures to protect their
information from inappropriate sale, accidental leakage or loss, and deliberate attack
[Dhillon and Moores 2001]. In [Ackerman, Cranor, and Reagle 1999], the concerns of
Another interesting finding, also quite persistent, is that there is a large gap
between most people's stated preferences and their actual behavior ([Ackerman, Cranor,
and Reagle 1999], [Spiekermann, Grossklags, and Berendt 2001]). While this is often the
30
case in social studies [Bernard 2000], it is of particular interest here. It is not yet known,
31
3.2 Technologies for privacy
current privacy debates. Clark [2001] divides the technologies in question into 4 groups.
Clarke argues that Review chapter for the New Economy Handbook (Jones, ed.), in press
there are technologies used for surveillance, the technologies for forming agreements
(contracting) about the release of private data, the technologies for labeling and trust, and
The technologies for surveillance and for data capture are used by companies for
business purposes, but they have the side effect of endangering personal privacy. These
include generating data trails, data warehousing and data mining, and biometrics. Many
of these technical mechanisms can lead to consumer profiles that “are no longer based
only on the individual’s dealings with a single organization, because their data is shared
firewalls. Other PETs attempt to provide genuine anonymity, and include anonymous
remailers (e.g., Mixmaster) and digital cash (e.g., ECash). An active area of research and
development are systems to provide non-traceable identifiers (e.g., ZKS Freedom, AT&T
Crowds, anonymizer.com, anonymous remailers). Yet other PETs, which Clarke calls
“gentle PETs”, try to balance privacy and accountability. These include systems to
provide some level of pseudonymity, allowing users to hide behind the pseudonyms but
32
(e.g., from TRUSTe or the Better Business Bureau) indicate that the company follows the
A new area of research includes the so-called labeling protocols, such as the
MIT/World Wide Web Consortium’s Platform for Privacy Preferences (P3P) [Cranor and
Reagle 1998, Cranor 2002, P3P 2002]. P3P allows sites to describe their data handling
policies (P3P statements) and permits users to describe their preferences for releasing
private data (P3P preferences). As sites label themselves with P3P and as user clients
(such as Internet Explorer) handle P3P statements and preferences, it will be possible to
create technologies to form contracts for the release of private data. Other technologies,
such as those to help users understand contractual terms or even contract-related fraud,
will also emerge. Ackerman and Cranor [1999] outline one such technology. Their
browser-based agents watch for privacy violations, privacy scams, and the like on behalf
of the user.
33
4.0 PRIVACY CONCERN IN SOCIAL NETWORKING WEBSITES
On large social networking services, there have been growing concerns about users
giving out too much personal information and the threat of sexual predators. Users of these
services also need to be aware of data theft or viruses. However, large services, such
as MySpace and Netlog, often work with law enforcement to try to prevent such incidents.
In addition, there is a perceived privacy threat in relation to placing too much personal
may be taken.
Furthermore, there is an issue over the control of data—information that was altered or
removed by the user may in fact be retained and/or passed to 3rd parties. This danger was
In medical and scientific research, asking subjects for information about their behaviors
is normally strictly scrutinized by institutional review boards, for example, to ensure that
adolescents and their parents have informed consent. It is not clear whether the same rules
apply to researchers who collect data from social networking sites. These sites often contain
a great deal of data that is hard to obtain via traditional means. Even though the data are
Privacy on social networking sites can undermined by many factors. For example, users
may disclose personal information, sites may not take adequate steps to protect user privacy,
and third parties frequently use information posted on social networks for a variety of
purposes. "For the Net generation, social networking sites have become the preferred forum
34
for social interactions, from posturing and role playing to simply sounding off. However,
because such forums are relatively easy to access, posted content can be reviewed by anyone
similar to E-mail jamming have been proposed for networks such as Twitter and Facebook.
These would involve "friending" and "following" large numbers of random people to thwart
35
5.0 PRIVACY CONCERN IN BLOGS
Users usually use blog as their electronic diaries as they splitting out all of their feelings
and opinions in their daily posts. Many of them in the opinion that they could right anything
they want as the blogs is theirs and nobody has the right to stop them. As the results, they
write everything across their minds without realizing that they might cross the line. If the
blog is set to private and only the author or chosen readers could retrieve it, then the privacy
Nevertheless, almost every user do not set their blog to private which definitely means
that anyone at any place at any present time could read their blogs. Therefore, the diary that
should be written and read by only the author has lost its privacy. Furthermore when the
posts concerned to someone else which also could read it, an argument might come out and it
is up to no good.
On the other hand, people could copy the post and manipulate it which means that things
will turn from bad to worse and the blamed party is unfortunately the blog’s owner.
36
6.0 CONCLUSION
It is admitted that internet is such a great and fantastic facilities that we could not help to
use it almost everyday to facilitate us to accomplished our daily affairs whether it is for
settles our billings without have to go to the respective places, find the parking and form a
line while waiting for our turn. Social networking websites allow us to make friends, meeting
peoples, connecting us with our previous buddies and families and even strengthen our
relationship with everyone we knew. Blogs give us courage to be outspoken and helps in
releasing our pressure by writing down everything nestling in the very deep of our heart.
However, our privacy might be interrupted by irresponsible parties which manipulate all
of our personal details such as IC number, addresses, emails, photos, videos and financial
Thus, as wise user that realize about the seriousness of this facts, we still could use the
internet facilities, but we must be aware of the harm that could come by limiting the personal
37
7.0 REFERENCE LIST
7.1 Wikipedia
http://www.wikipedia.org/
7.2 Pagebuzz
http://pagebuzz.com/ecommerce-ca4.html
7.3 Tutorial blog
http://tutorialblog.org/20-of-the-best-ecommerce-websites/
7.4 Lorelle on Wordpress
http://lorelle.wordpress.com/2009/04/08/example-of-a-perfect-personal-blog/
7.5 Organizational blog
http://blogging.compendiumblog.com/blog/organizational-blogs
7.6 I Love Photography Blogs
http://www.ilovephotoblogs.com/tag/example-of-a-great-photoblog
7.8 Pro Music
http://www.pro-music.org/Content/InsideTheMusicBiz/jobs-blogger.php
7.9 Privacy and Security Issues in E-Commerce
http://www.eecs.umich.edu/~ackerm/pub/03e05/EC-privacy.ackerman.pdf
38