Internet And Privacy Essay

PAGES
7
WORDS
2824
Cite

¶ … Privacy Protection Features Present Privacy Policy of Website

This paper analyzes the privacy policy of e-commerce websites, and highlights the aspects that should be covered in order to benefit customers.

Privacy Policy of E-commerce Website

Important Features of Privacy Policy of E-Commerce Website

Cookies:

Payment Methods:

Social Security Number:

Customer Information Sharing:

Password Sharing:

Identity Theft:

Information Provided by Website

Comparison among Top E-commerce Websites

First Mover vs. Follower in E-Commerce

Network Effect

Switching Cost

Disadvantage of First Mover

Privacy Policy of Website

Throughout the major part of the last century, there has been a lot of development and advancement in the field of information and technology (Jing, 2009). Most of the business activities have shifted base from being orthodox setups towards the IT portals. This development has also given rise to certain issues which were not present with the business fraternity earlier. In the past two decades, there has been immense growth in the online business portals (Head and Yuan, 2011). E-commerce-based businesses have particularly flourished and prospered, and there have been several new entrants in this avenue. E-commerce-based websites have provided the target customers with a lot of options and convenience in term of products and services, and this whole development has benefited both customers and businesses (Syzmanski, Troy and Bharadwaj, 2005). New age customers are not particularly moving about in market place, as most of the modern day works and jobs are confined inside offices and on a work desk. Web-based shopping portals are the most sought after virtual showrooms and markets, which fill the gap between customer and business. Customers are provided with a lot of choice in terms of shopping and they do not need to leave their work desk for shopping, which saves a lot of time and money (Chahar and Niranjanamurthy, 2013).One of the biggest and most important factors in this new development of e-business is that of the security function which is associated and is an integral part of this whole web program. Businesses have a responsibility towards procuring the privacy rights of customers, in order to continue business practices ethically and also to sustain its functions (Goldfarb, Brent, and Miller, 2007).

Privacy Policy of E-commerce Website

There is a huge function involved with the privacy function of an e-commerce business, and this is mainly associated with the protection of certain consumer rights. It is understood that the e-commerce portals are a platform to conduct trade activities in digital world, and they provide a lot of approach and choice in terms of business functions. Each and every customer who is engaging in business through these websites is sharing certain form of information and other credentials (Head and Yuan, 2011). Privacy is one of the biggest issues that have arisen in the modern digital business scenario, which is why it is very important to ensure it. There are certain aspects associated with designing and maintaining a privacy policy for an e-commerce website, and all this aspects are to be covered completely in order to maintain ethical business functioning (Jing, 2009). Maintaining privacy begins with collecting the information form a customer in a most discreet and confidential way. Another aspect includes collecting only relevant and that information which is actually needed to complete the business transaction (Goldfarb, Brent, and Miller, 2007). Another important aspect of privacy policy is to store this information in the most secure and make sure that this information is not breached and accessed by unauthorized personnel. This also covers the terms that third parties and vendors are shared critical financial information. They are only provided general details in order to fulfill the transactions (Juan, 2006). This privacy policy maintains a complete exchange between all parties involved in business, including customers, vendors and delivery guys, and makes sure that information from one source remains intact, and is not shared to other source (Syzmanski, Troy and Bharadwaj, 2005).

Important Features of Privacy Policy of E-Commerce Website

Cookies:

There has been a lot of advancement in the area of online business and marketing, where the e-commerce related businesses have taken a leap forward in direction of specialization. Latest schemes and phenomenon in online marketing include providing the target audience with detailed and specialized (Jing, 2009). This is done by popping specialized advertisement on the WebPages, when the customer logs in the computer browser, these ads are related to searches that the customer had conducted in the recent past (Goldfarb, Brent, and Miller, 2007). This function...

...

There are certain types of cookies in a system and these cookies are both temporary and permanent. The temporary ones are discarded once the connection is lost or the computer is rebooting, whereas the permanent ones are stored in computer and can be accessed through internet connection (Chahar, Niranjanamurthy, 2013). This is very helpful for marketers, however they have to ensure the privacy in this action, and ensure that none other database or personal cookies are not accessed on the customer's computer (Head and Yuan, 2011).
Payment Methods:

When there is trade involved in any form, there has to be an exchange of money and funds between the buyer and the seller (Chahar, Niranjanamurthy, 2013). Similarly, e-commerce also involves exchange of funds and this is done through various sources of digital money transfer. Two of the most popular ways of exchanging funds is either through internet banking or through credit/debit cards, which transfer funds from buyer to seller almost instantaneously (Head and Yuan, 2011). This is very critical function as far as the confidentiality of the transaction is concerned, and the seller has to ensure confidentiality of financial information provided by the buyer. This is one of the fundamental parts of the whole privacy function, because if the information pertaining to financial credentials of an individual is compromised, it can cause serious financial loss or harm to the customer (Goldfarb, Brent, and Miller, 2007).

Social Security Number:

One of the most important credentials of an individual is the social security number, upon which several other functions depend (Juan, 2006). The whole being of an individual rests upon SSN, and it is a part of most privacy policies, to not to share the SSN, until and unless necessary, because the security of this number cannot be compromised at any cost (Syzmanski, Troy and Bharadwaj, 2005).

Customer Information Sharing:

There is a certain amount of personal information which is shared with the merchant by the customer (Head and Yuan, 2011). Business websites extract maximum possible information from the customer, in order to use it in their future marketing functions and in order to run effective campaigns in terms of market targeting. This information cannot be shared without permission of the customer, and should be maintained in such a way (Goldfarb, Brent, and Miller, 2007).

Password Sharing:

One practice which many website companies in e-commerce follow is that of an individual ID and password provision, which is provided to each customer (Syzmanski, Troy and Bharadwaj, 2005). This password has to be kept confidential by the customer, and also has to be included in the privacy policy, in order to protect the information of the customer. There has to be strict follow up and confirmation policy when the password is lost or forgotten by the customer (Head and Yuan, 2011).

Identity Theft:

Identity Theft is one of the most common and popular type of cybercrimes which is committed by hackers and offenders on the web space. In this function the identity and other credentials of an individual are stolen and digitally used on another platform, which is not authorized by the individual (Juan, 2006). Websites need to maintain high level of security in order to protect interests of customers against this crime (Chahar, Niranjanamurthy, 2013). Strengthening of internal information structure is required by the business website, and it also includes implementation of stricter IT protocols and codes of conduct which are to be followed by each personnel (Head and Yuan, 2011).

Information Provided by Website

The information provided by the website to the customers is also covered under the privacy policy and it has to be made sure that the whole information is precise and correct (Juan, 2006). There is a certain communication which has to be conducted between both parties; customers and the trade website, and all of it cannot be made public or publically declared by the website (Goldfarb, Brent, and Miller, 2007). This means that e-commerce portals are bound to maintain privacy in their information function in order to maintain a discreet communication portal. The public declaration regarding certain aspects associated with the trade can affect the privacy or the customer, and it is not very comfortable position for the customer to be in. This can also bring a bad name to the business and can lead to bad word of mouth regarding its business process, which is a great loss (Syzmanski, Troy and Bharadwaj, 2005).

Comparison among Top E-commerce Websites

Based on the above aspects of privacy policy, the following table compares the privacy policies of top 4 e-commerce websites, and provides ratings on the scale of 1-5 for better explanation. These four e-commerce websites are…

Sources Used in Documents:

References

C. Juan. (2006). The electronic commerce security architecture and the safety technology apply. Net Security Technologies and Application. 7(1), 56-58. C. O'Connor. (2013). Wal-Mart Vs. Amazon: World's Biggest E-Commerce Battle Could Boil Down To Vegetables. Available: http://www.forbes.com/sites/clareoconnor/2013/04/23/wal-mart-vs.-amazon-worlds-biggest-e-commerce-battle-could-boil-down-to-vegetables/. Last accessed 31 December 2014.

C.O' Connor. (2013). Wal-Mart Vs. Amazon: World's Biggest E-Commerce Battle Could Boil Down To Vegetables. Available: http://www.forbes.com/sites/clareoconnor/2013/04/23/wal-mart-vs.-amazon-worlds-biggest-e-commerce-battle-could-boil-down-to-vegetables/. Last accessed 31 December 2014.

D. Chahar, M. Niranjanamurthy. (2013). Copyright to IJARCCE www.ijarcce.com 2885 The study of E-Commerce Security Issues and Solutions. International Journal of Advanced Research in Computer and Communication Engineering. 2 (7), 2885-2895.

D. Syzmanski, L. Troy and S. Bharadwaj (2005). Order of entry and business performance: An empirical synthesis and reexamination. Journal of Marketing. 59(4), 17-33.
T. Worstall. (2013). Fascinating Number: Amazon Is Larger Than The Next Dozen Internet Retailers Combined. Available: http://www.forbes.com/sites/timworstall/2013/09/01/fascinating-number-amazon-is-larger-than-the-next-dozen-internet-retailers-combined/.Last accessed 31 December 2014.
T. Worstall. (2013). Fascinating Number: Amazon Is Larger Than The Next Dozen Internet Retailers Combined. Available: http://www.forbes.com/sites/timworstall/2013/09/01/fascinating-number-amazon-is-larger-than-the-next-dozen-internet-retailers-combined/.Last accessed 31 December 2014.


Cite this Document:

"Internet And Privacy" (2015, January 03) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/internet-and-privacy-2148434

"Internet And Privacy" 03 January 2015. Web.24 April. 2024. <
https://www.paperdue.com/essay/internet-and-privacy-2148434>

"Internet And Privacy", 03 January 2015, Accessed.24 April. 2024,
https://www.paperdue.com/essay/internet-and-privacy-2148434

Related Documents

They suggest that the laws necessary to protect informational privacy from unauthorized collection and use simply must catch up to the realities presented by modern digital technology exactly the way the laws now prohibiting unwarranted wiretapping of telephones once lagged behind the obvious implications of failing to incorporate the needs posed by modern technology into appropriate legislation (Levin, 2012). Competing Interests and Positions On balance, there are legitimate justifications for imposing

According to the current laws, which are not really up to speed yet, an employer can monitor employee email if he or she has a legitimate business purpose for doing so. There is a belief that, because the employer has an email and computer system for employee use, the computer system (as well as the resulting email and browsing history) is the property of the employer. While this makes sense,

In this sense, internet privacy represents a challenge indeed. Internet privacy is a relatively new term and the definitions are therefore rather scarce or general. For instance, it can be defined as "the ability of individuals to determine for themselves when, how, and to what extent information about them is communicated to others." (Givens, 1999) in this sense, privacy is a matter of personal choice and is therefore subject to

Internet Privacy The greatest challenge to the legal foundations of the Internet is the continual assault on individual privacy, brought about by continually loosening standards as to how personal data is used, stored and tracked online. Foremost among these threats is the relentless use of personal data from websites, social networks and other online forums where people are coaxed into giving up as much data as possible to support advertising strategy-based

Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients

Even sex, she said, because everybody has a sexual nature. In other words, she accepted living her life as "an open book." She saw the trend on Internet web sites such as Myspace as an extension of life in a small town. The difference today, however, is that a record is being kept for all time. The Einsteins and Ghandi's of tomorrow will be there, sharing their thoughts, feelings, revelations,