Back To CourseBusiness 104: Information Systems and Computer Applications
12 chapters | 111 lessons | 11 flashcard sets
As a member, you'll also get unlimited access to over 70,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.Free 5-day trial
Jill has taught college-level business and IT. She has a Doctorate in Business Administration and an M.S. in Information Technology & Leadership.
Hi, I'm Mary Thompson of GNN News with a special report on consumer privacy and fraud. Information technology has changed society in many ways including the way we conduct business and purchase goods and services. E-commerce and m-commerce have become a way of life. Electronic commerce, or e-commerce, is the buying and selling of products over the Internet. Mobile commerce, or m-commerce, refers to e-commerce conducted in a wireless environment over the Internet. This typically occurs over mobile technologies such as smartphones, tablets or other wireless devices. With this technology come two important issues and concerns we must be aware of: consumer privacy and fraud.
The protection of personal data is a pressing privacy issue. Privacy is the right to be left alone and free from surveillance and unreasonable personal intrusions. Information privacy is the right to determine when and to what extent information about oneself can be communicated to others. But, how much control do consumers really have over their information in our ever increasing digital world?
A decline in privacy has resulted from the development and widespread use of databases. A database is an organized collection of information that can be accessed, managed and updated. Databases may contain all sorts of personal information including addresses, buying habits, preferences, credit card information and personal histories. Practically every organization we conduct business with maintains a database of information including the grocery store, the pharmacy and e-commerce websites on the Internet.
E-commerce transactions typically require buyers to divulge large amounts of personal information, either for the purpose of completing the sales transaction or as required by the company. Consumers don't often give much thought to how secure their information is, who has access to it and how it will be used. A consumer's privacy can easily be violated through unintentional consent.
Let's talk with Martin Brown, a successful e-business entrepreneur.
(Mary:) Hi Martin, welcome!
(Martin:) Hi Mary, thanks for having me.
(Mary:) Martin has developed a website called Gadgets and Things, which sells a variety of miscellaneous products that are sometimes difficult to find. Customers can engage in e-commerce or m-commerce by purchasing products through his website over the Internet. E-commerce and m-commerce transactions are known for leaving a trail of personally identifiable information. Martin, can you tell us what information you collect and how you use the information from consumers who transact business with your company?
(Martin:) Of course, Mary! We collect personal information, such as one's name, address, email or phone number; we also collect demographic information, such as age and gender. This allows us to gain a better understanding of our customers and their needs. With this information, we are able to cater to their specific wants, market products to them that they may be interested in and increase the likelihood that a purchase will be made.
(Mary:) Clearly, for the business, collecting personal information is useful in marketing research and personalized advertising. Websites frequently collect this type of information when a user signs up or makes purchases. Martin, how are you able to gather data about consumer preferences and likes?
(Martin:) Well, Mary, one technological tool that is quite popular and used commonly in e-business is the cookie. Cookies are small data files that are written and stored on the user's hard drive by a website whenever the user visits the site with their browser. Cookies send information back to me on the user's movements and actions.
(Mary:) Cookies are a popular method for collecting data. The public should also be aware of a more controversial manifestation of this technology, which is third-party cookies. Third-party cookies are placed across a network of related websites so that a user's movements can be tracked at any site within the network.
An even more intrusive technology is spyware. Spyware is a small computer program, stored on the user's hard drive, that collects users' habits and transmits that information to a third party, all without the user's consent. Spyware can monitor any website visited by the user whereas cookies are specific to a particular website or network of websites. Thanks Martin for your time and expertise on the type of data collected by businesses and how that data is commonly collected.
(Martin:) You're very welcome Mary!
(Mary:) Consumers will have a difficult time keeping their information private when they engage in e-commerce and m-commerce. Transactions between vendor and customer used to be private, but information technology has dramatically impacted the availability of information and reduced privacy.
Most businesses have attempted to build strong defenses to protect consumer information. They understand the importance of securing and guarding this valuable resource. Even so, security breaches do occur in which personally identifiable information within organizations is susceptible to fraud and theft.
The question that arises is: how can we protect our privacy? Some suggest that creating awareness and educating consumers and businesses would help. Others believe legislation is needed, while some feel technology is the answer. Most likely, a combination of the three would be most effective.
Some technologies attempt to provide more anonymity. For instance, a method could be implemented that enables organizations to store information in databases, yet ensures the information cannot be traced back to a specific person by removing all identifying information. Other technologies may limit access to information by alerting users of cookies or preventing their installation.
Legislation can be effective at restricting how businesses use information or giving consumers more control. But, legislation has its limitations; technology grows rapidly and easily outpaces the legal system's ability to keep up. One new law is called the Restore Online Shoppers' Confidence Act. It was signed into law by President Obama in 2010. This act regulates post-transaction marketing and specifically targets transactions conducted by third-party sellers. The act prohibits businesses from transferring consumer data to a third-party for the purpose of engaging in post-transaction marketing on the merchant's websites.
Business owners, like Martin, must be aware of the very real possibility for fraud and must take measures to protect the business and its customers. Fraud is deliberate misrepresentation that causes others to suffer loss or damages. The same scams that are carried out by mail or phone can be found on the Internet. E-commerce concerns making transactions, and transactions concern money. This attracts crackers and criminals who attempt to exploit loopholes in the system for personal gain. Remember that a cracker is a term used to describe someone who intentionally breaches security to break into someone else's computer or network for a malicious purpose. E-commerce fraud costs retailers billions of dollars each year.
The highest incidences of fraud are against consumers. One concern is that credit card information will be stolen through the online checkout process. E-business owners must ensure they have state of the art technology and a secure checkout process to keep customer information safe and out of the hands of criminals. Failure to do so could jeopardize the business, reputation and the bottom line.
One of the fastest growing crimes has been identity theft. Identity theft is the stealing of another person's social security number, credit card number or other personal information for the purpose of borrowing money, making purchases and running up debts. Since many private organizations and governments keep information about individuals in accessible databases, there is endless opportunity for thieves to retrieve it and misuse the information. Organizations must ensure that their databases that contain private customer information are secure and cannot get into the wrong hands.
We have Hannah on the line. Hannah is a recent victim of identity theft. Let's hear her story.
(Mary:) Hi Hannah, thanks for joining us over the phone to share your story.
(Hannah:) Hi Mary, thanks for having me!
(Mary:) Hannah discovered that her credit card had been stolen and someone went on a huge shopping spree, leaving her with a $25,000 bill and many questions. Hannah, how was your credit card information stolen?
(Hannah:) Well, Mary, I'm a student at the state university, and there was a security breach affecting over 30,000 people. Crackers accessed the school's database and retrieved personal information and credit card numbers. It took the school some time to figure out what had happened and alert everyone who may have been affected. In the meantime, many identities were stolen and used fraudulently.
(Mary:) That's a scary story and something that could happen to any one of us. How has the identity theft impacted you?
(Hannah:) I've spent countless hours on the phone trying to clear my name and the large debt that has been incurred. My credit is a mess, and it is impossible to get a loan for anything right now whether it is a car, a home or even a new credit card. This has really impacted my life and it is difficult to restore my name and good credit.
(Mary:) Identity theft has a huge impact on the victim and creates a burden that is difficult and time consuming to overcome. I'm sorry this has happened to you but grateful that you were willing to share your story. Thank you again.
(Hannah:) Thank you, Mary, for having me.
(Mary:) So, what do you do if you are a victim of identity theft? You should file a police report immediately, contact the three major credit reporting agencies and your creditors, keep records of all transactions and hire a lawyer. Swift action is necessary for a satisfactory resolution.
Identity theft and fraud are serious and very real issues. Even those who take careful precautions can be at risk given the vast amount of data collected on each one of us by every organization we conduct business with. One of the biggest problems with identity theft is that once you become a victim, you're guilty until proven innocent. The victim shoulders the responsibility of proving their innocence and restoring their good name and credit.
The next time you engage in a business transaction and are asked to provide personal information, will you think twice? This is Mary Thompson for GNN News. Thank you for tuning in!
E-commerce and m-commerce have impacted the way we conduct business and make transactions. Recall that electronic commerce, or e-commerce, is the buying and selling of products over the Internet. Mobile commerce, or m-commerce, refers to e-commerce conducted in a wireless environment over the Internet. This type of technology triggers additional issues and concerns for consumers that were not as prevalent prior to the Internet.
Information technology makes it very easy to collect personal information about customers without their knowledge or consent. Some sites collect personal information for their own use while others are selling or exchanging the information without permission from the user. One of the technological tools that is quite popular and used commonly in e-business is cookies. Cookies are small data files that are written and stored on the user's hard drive by a website when that user visits the site with a browser. Consumers must be aware that their habits and personal information can be collected and used by websites they purchase from or even just browse.
E-commerce has enabled fraud to take place in the online environment. Fraud is deliberate misrepresentation that causes others to suffer loss or damages, with the fastest growing crimes being identity theft. Identity theft is the stealing of another person's social security number, credit card number or other personal information for the purpose of borrowing money, making purchases or running up debts. Businesses and consumers must take proper measures to secure information and protect it from entering the wrong hands.
After viewing this lesson, you will be able to:
To unlock this lesson you must be a Study.com Member.
Create your account
Already a member? Log InBack
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Back To CourseBusiness 104: Information Systems and Computer Applications
12 chapters | 111 lessons | 11 flashcard sets