SlideShare ist ein Scribd-Unternehmen logo
1 von 16
The Internet macro-environment
The Internet macro-environment ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
SOCIAL FACTORS ,[object Object],[object Object],NO PERCIEVED BENEFIT LACK OF TRUST SECURITY LACK OF SKILLS
 
Ethical issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Refers to a Moral right Of individual To avoid intrusion Into personal Affairs by third party May lead to Identity theft Effective IM requires  a balance between Benefit of providing info By customers and use  Of such info
INFORMATION TYPES(E)  ,[object Object],[object Object],[object Object],[object Object]
Types of information needed ,[object Object],[object Object],[object Object],[object Object],[object Object]
2007 Telecom Unsolicited Commercial Communications Regulations 2000 Information Act  1964(Amend) Constitution of India India 2007 Unsolicited Electronic Messages Ordinance (UEMO) Hong Kong 2001 Act on E-Commerce and Information Society Related Services Hungry 1997 Directive 97 Greece 1996 Data Protection Act Italy 1999 Personal Data Act Finland  2000 Marketing Practices Act  Denmark  1981 Protection of Privacy Law Israel 2002 Information  Act  2000 Information Privacy Act  1988 Privacy Act  Australia  2003 Personal Data Protection Act Japan 1990 The Personal Information Protection and Electronic Documents Act Canada  1998 Directive on Data Protection  Europe  1991 Telephone Consumer Protection Act  1998 Children’s Online Privacy Protection Act 1974 Privacy Act  United States Year  Privacy Law Country
 
E-commerce legislation areas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ECONOMIC FACTORS
POLITICAL FACTORS
Technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
TECHNOLOGICAL FACTORS ,[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
safa
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber Laws
Cma Mohd
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
Damo Ward
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
Lance Michalson
 

Was ist angesagt? (20)

Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | SysforeSecurity and Privacy challenges of the Internet of Things (IoT) | Sysfore
Security and Privacy challenges of the Internet of Things (IoT) | Sysfore
 
IT Business Law Assignment Help
IT Business Law Assignment HelpIT Business Law Assignment Help
IT Business Law Assignment Help
 
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Be aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisationBe aware of the ICT laws that apply to your organisation
Be aware of the ICT laws that apply to your organisation
 
Chp 05 anonymity, security, privacy and civil liberties (shared)
Chp 05   anonymity, security, privacy and civil liberties (shared)Chp 05   anonymity, security, privacy and civil liberties (shared)
Chp 05 anonymity, security, privacy and civil liberties (shared)
 
Privacy and video surveillance: Advanced technology and best practices protec...
Privacy and video surveillance: Advanced technology and best practices protec...Privacy and video surveillance: Advanced technology and best practices protec...
Privacy and video surveillance: Advanced technology and best practices protec...
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber Laws
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Legal & moral issues in e commerce
Legal & moral issues in e commerceLegal & moral issues in e commerce
Legal & moral issues in e commerce
 
Security Built Upon a Foundation of Trust
Security Built Upon a Foundation of TrustSecurity Built Upon a Foundation of Trust
Security Built Upon a Foundation of Trust
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)Ict Compliance (Sept 2004)
Ict Compliance (Sept 2004)
 
Chp10 public policy
Chp10 public policyChp10 public policy
Chp10 public policy
 
Legal Issues in Applied Technology
Legal Issues in Applied TechnologyLegal Issues in Applied Technology
Legal Issues in Applied Technology
 
Legal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social ImplicationsLegal, Ethical, Environmental, Economic and Social Implications
Legal, Ethical, Environmental, Economic and Social Implications
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 

Andere mochten auch

Andere mochten auch (11)

Session 3 4
Session 3 4Session 3 4
Session 3 4
 
internet marketingx 7 8
internet marketingx 7 8internet marketingx 7 8
internet marketingx 7 8
 
Csession 1 2
Csession 1 2Csession 1 2
Csession 1 2
 
Csession 1 2
Csession 1 2Csession 1 2
Csession 1 2
 
internet marketingx 3 4
internet marketingx 3 4internet marketingx 3 4
internet marketingx 3 4
 
Csession 1
Csession 1 Csession 1
Csession 1
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Ähnlich wie Session 5 6

Chapter2
Chapter2Chapter2
Chapter2
Pibi Lu
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
blogzilla
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
E-Journal ICT4D
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
adnis1
 
delphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingdelphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-masking
Jes Breslaw
 

Ähnlich wie Session 5 6 (20)

Chap 4 (1)
Chap 4 (1)Chap 4 (1)
Chap 4 (1)
 
Chapter2
Chapter2Chapter2
Chapter2
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Abubakar munir iisf2011
Abubakar munir iisf2011Abubakar munir iisf2011
Abubakar munir iisf2011
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Challenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in MexicoChallenges to Achieve Privacy for Online Consumers in Mexico
Challenges to Achieve Privacy for Online Consumers in Mexico
 
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
Innocenzo Genna, Genna Cabinet, Bruxelles: Privacy in the electronic communic...
 
Software Legal Issues
Software Legal IssuesSoftware Legal Issues
Software Legal Issues
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
E governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalfE governance dushanbe 2012 katrin-nymanmetkalf
E governance dushanbe 2012 katrin-nymanmetkalf
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 
Infosec Law (Feb 2006)
Infosec Law (Feb 2006)Infosec Law (Feb 2006)
Infosec Law (Feb 2006)
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
delphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-maskingdelphix-wp-gdpr-for-data-masking
delphix-wp-gdpr-for-data-masking
 
Chapter 4_dp-pertemuan 6
 Chapter 4_dp-pertemuan 6 Chapter 4_dp-pertemuan 6
Chapter 4_dp-pertemuan 6
 
Lo2= p3, d1
Lo2= p3, d1Lo2= p3, d1
Lo2= p3, d1
 
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...
A Legal Perspective of E-Businesses and E-Marketing for Small and Medium Ente...
 
Technology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationTechnology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformation
 
FIWARE Global Summit - The BDVA Legal & Ethical Perspective in the Smart Manu...
FIWARE Global Summit - The BDVA Legal & Ethical Perspective in the Smart Manu...FIWARE Global Summit - The BDVA Legal & Ethical Perspective in the Smart Manu...
FIWARE Global Summit - The BDVA Legal & Ethical Perspective in the Smart Manu...
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Session 5 6

  • 2.
  • 3.  
  • 4.
  • 5.  
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. 2007 Telecom Unsolicited Commercial Communications Regulations 2000 Information Act 1964(Amend) Constitution of India India 2007 Unsolicited Electronic Messages Ordinance (UEMO) Hong Kong 2001 Act on E-Commerce and Information Society Related Services Hungry 1997 Directive 97 Greece 1996 Data Protection Act Italy 1999 Personal Data Act Finland 2000 Marketing Practices Act Denmark 1981 Protection of Privacy Law Israel 2002 Information Act 2000 Information Privacy Act 1988 Privacy Act Australia 2003 Personal Data Protection Act Japan 1990 The Personal Information Protection and Electronic Documents Act Canada 1998 Directive on Data Protection Europe 1991 Telephone Consumer Protection Act 1998 Children’s Online Privacy Protection Act 1974 Privacy Act United States Year Privacy Law Country
  • 11.  
  • 12.
  • 15.
  • 16.