电子商务英语结课论文
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
——网络隐私权的在线保护
网络隐私权的在线保护
理论(概要)
随着电子商务的发展,电子商务的安全是电子商务的关键问题。
我们也需要思考如何保护消费者隐私权。
本文介绍了几种侵犯公民隐私的行为和几种保护个人信息的方法。
政府,消费者本人和最新的技术都能够保护个人信息。
全国人民代表大会应通过立法保护网络隐私权;个人用户应加强隐私权保护意识;技术工具,包括信息安全技术在电子商务中的安全协议的电子商务信息,应该用来保护消费者隐私权。
所以如果他们采取有效的措施,共同营造一个健康的环境,它可以为电子商务长期稳定的发展提供一个良好的保护。
关键词:电子商务隐私权网络隐私权保护因特网服务提供商全国人民代表大会
消费者的隐私问题
该组织从以下两种方式得到消费者的个人信息,网站可以以不同的方式收集消费者个人信息:公开等方式,通过注册页面,用户调查,网上比赛,申请表格,和秩序的形式。
例如,一项被称为“饼干”的技术。
这是在特定的情况下收集信息的形式(以及惊人的速度和效率,可以收集,存储,聚合,和传播的个人信息),使消费者谨慎的上网和交易。
与传统的互联网为基础的企业(如医院和银行)处理相同的信息相比消费者不信任网络服务供应商和客商办理个人信息。
有商业公司,电子商务服务提供商,互联网服务供应商和个人入侵使用个人信息获得好处。
第一,商业公司
作为人气爆棚的新兴电子市场,技术发展保证了灵活安全的网上交易。
开发这一市场提供分散的经济力量,方便低价获得的产品,和那些以前没有店面或路边摊相比,这是一个新的机会,为每一位在中国的人提供产品或服务。
虽然商业网站为消费者提供有用的信息产品和服务,他们有能力也可以收集访问他们网站的消费者的信息个人信息。
同样,他们与那些有兴趣的了解这些信息的人去交换提供的信息、产品或服务,这仅取决于谁来利用这些信息。
公司有兴趣收集网上信息因为还没有一个研究对消费者信息有透彻的解释。
例
如,如果信息提供者可以收集那些访问人数与频率的信息,这些信息提供者可以作出准确的决定什么内容应继续提供,扩大,或删除。
同样,如果一个商人通过其网站发现A产品比B产品卖得好,该公司可能要停止提供B产品和提供和A产品类似产品代替。
事实上,每次用户在一个网站上点击鼠标时。
从她点击鼠标的那一刻起,,她的信息就会被公司所收集,她买什么东西,何时购买,以及购买频率。
商人希望拥有这些信息由于这些信息具有消费市场的研究价值。
例如,我们可以推测她从上网开始花大部分时间在购物区。
这个人很可能是一个女子,因为大多数购物迷是妇女。
客观角度来讲,接收或促销购物信息将是一个好东西,当然比接收信息,这些产品中,她已经很少或没有兴趣。
显然,互联网的能力,收集这些信息可以越来越准确和个人销售目标。
消费者对隐私的关注是因为他们不了解是谁收集他们的个人信息,企业如何获得他们的信息,或收集信息的目的。
这种消极情绪会激发消费者为了避免相关的风险而拒绝将个人信息泄漏给营销人员。
保护意识较强的个人所关注的是关于营销信息收集的做法,更可能是减少风险行为。
互联网拥有大量的信息,然而,也拥有巨大的风险。
当人们开始了解媒介及其信息采集的潜力,警钟已经敲响,不只是因为大量的信息收集,而且还有担心公司不考虑消费者的隐私权,披露或使用该隐私的个人信息。
第二,电子商务服务提供商
电子商务服务提供商使用相同的方式得到消费者的个人信息。
然而他们的目的并不与他们相同。
公司通过分析信息来为更多的消费者提供自己的产品,并根据消费者的需求,本公司能满足消费者需求。
所以他们可以有更大的利润。
电子商务服务提供商为企业和用户提供了一个方便的交易方式,为需要注册的企业和个人信息提供服务。
电子商务非法使用、收集、存储用户信息获取利润,这侵犯了用户的隐私。
第三,互联网服务提供商
互联网服务提供者非法收集用户的信息,如使用Cookie监视用户的网络记录,网络管理员监测监控用户的活动信息;互联网服务供应商为了赚钱而收集,存储和处理个人的数据;互联网服务提供商进入用户私人空间的许可,如客户的电子邮件传输或关闭,造成客户的电子邮件、秘密和隐私丢失。
第四,个人入侵
由于缺乏对电子商务系统的了解,违反网络用户隐私权。
个人传播和转移自己和他人之间的未经许可的隐私。
个人获得个人计算机系统收集的个人信息和骚扰别人。
个人打开别人的电子邮件或擅自进入他人私人领域。
这些对互联网用户和消费者有巨大危害,为他们带来了巨大麻烦。
电子商务是基于互联网的业务,网上的用户角色隐私被侵犯。
这已影响到电子商务的进一步发展。
在电子商务环境下,由于网络全球性、快速性等特点,这使网络侵犯影响巨大传播迅速。
具体来说,我们应该采取行动的保护消费者的隐私不被侵犯。
保护消费者隐私权的方法
技术工具
技术工具,包括信息安全技术和电子商务中的信息的安全协议,都应该用来保护消费者隐私权。
信息的安全在很大程度上取决于技术的改进,这些技术包括防火墙技术,加密技术,数字签名技术,网络技术。
防火墙技术是用来加强网络,控制和防止外部网络用户进入内部网络的非法行为。
加密技术保证了信息的完整性,是一种安全有效的预防策略。
——The protection of Internet privacy online
The protection of Internet privacy online
Abstract (Summary)
With the development of the E-commerce, the security of E-commerce is becoming the key problem in the E-commerce. How to protect the consumers’ privacy also needs us thinking about. This article introduces several ways to violate the citizens’ privacy and the several ways to protect the personal information. The government, the consumers themselves and the recent technology could take action to protect the personal information. The National People’s Congress should protect the network privacy through legislation; individual users should enhance the protection of privacy awareness; the technical instrument, including the information security technology in electronic commerce and the security agreement of the E-commerce information, should be used to protect consumers’ privacy. So if they take the effective measures to jointly create a healthy environment for the development of e-commerce, it can provide a good protection for our long-term stable development of the e-commerce industry. Key words: E-commerce Privacy Rights P2P technology Network privacy protection Internet service providers the National People’s Congress
The problem of the consumer s’ privacy
The organization obtain consumer’s personal information from the two way ,Web sites can collect personal consumer information in two different ways: overtly, through means such as registration pages, user surveys, online contests, application forms, and order forms, and clandestinely, through, for instance, a technology known as "cookies." It is this second type of information collection in particular (as well as the as tounding speed and efficiency with which sites can collect, store, aggregate, and disseminate personal information) that causes consumers' wariness of online transaction and exploration. Consumers are less trusting of how online service providers and merchants handle personal information than they are with how traditional non-Internet based businesses (such as hospitals and banks) handle the same information. There are commercial company, E-commerce service provider, Internet service provider and personal invasion to use the personal information for benefits.
The first, the commercial company
As the emerging electronic marketplace increases in popularity, technology is developing to ensure increasing flexibility with Internet transactions. The development of this marketplace offers decentralized economic power, convenient low-priced access to products, and for those previously without a storefront or roadside stand, a newfound opportunity to offer products or services to potentially everyone in China. Although commercial web sites offer consumers useful product and service information, they also can, and do, collect personal information about the consumers who visit their sites. It is almost as if, in exchange for providing the information, product, or service to
those interested enough to seek it out, companies collect information about those who do choose to utilize it.
Companies are interested in collecting this online information because once analyzed, the data offers consumer research information at a level of granularity never before available. For example, if information providers can gather information as to the number of visitors who visit their Internet web site or the frequency with which they view the information, these information providers can make accurate programming decisions as to what content should continue to be offered, expanded, or removed. Similarly, if a merchant finds that product A sells better than product B through its web site, the company may want to discontinue offering product B and offer a product similar to product A instead.
In fact, each time a user clicks her mouse while on a web site, the potential ex ists for the company to record the location of her "click" and thus to collect information about her online behavior-where she goes, what she buys, when she buys, and how frequently she buys. Merchants want this granular information because of its consumer market research value. For example, one could surmise much from a visitor to a web site who spends most of the time in the shopping area. This individual is likely to be a woman, as the majority of figure shopping fans are women. From the visitor's perspective, receiving promotions or information about shopping would be a good thing and certainly better than receiving information about those products in which she has little or no interest. Clearly, the Internet's ability to collect such information allows for increasingly accurate and personally targeted marketing.
Concerns for privacy are heightened when consumers feel uninformed about who is collecting their personal information, how companies obtain their information, or for what purposes the information is used. Such negative feelings may motivate consumers to avert risks associated with divulging personal information to marketers. The stronger an individual's concerns are about marketers' information collection practices, the more likely the individual is to adopt risk-reducing behaviors.
The Internet's great promise of granular information, however, is also its great risk. A s people begin to understand the medium and its information collection potential, alarm bells are ringing, not simply because of the amount of information being collected, but also because of concerns that companies are not considering consumers' privacy needs when using or disclosing this granular personal information.
The second, E-commerce service provider
The E-commerce service provider use the same way to get the consumers’ personal information. However, they make use of it for different purpose. The company will analyze the information in order to produce their product to more consumer, and according to the consumers’ demand, the firm could meet the consumers’ demand. So they could make a large profit. The E-commerce service provider offers a convenient way to trade for enterprises and users. As business and personal information need to be registered, Electronic commerce services that use of the collection, storage of information about users pay for the illegal profit, which violates the user's privacy. The third, Internet service provider
Internet service provider collects the information about the users illegally, such as
using cookies to monitor the user's network records , network administrator to monitor the monitor users’ activity and information; Internet service providers will collect, store and process data to others in order to make money; Internet service providers come into the private space without the users’ permission, such as customer's e-mail transferred or closed, resulting in loss of customers’ e-mail, privacy, and secrets.
the last, Personal invasion
Due to the lack of understanding of the e-commerce system, individuals would violate the network users’ privacy. Individuals spread and transfer the privacy between ourselves and others without permission. Individuals access to personal computer system to collect personal information and harass others. Individuals open others’ e-mail or access to private areas without permission. All are very harmful to the Internet users and consumers, which brings a lot of trouble to them.
Electronic commerce is based on the internet for business, the characteristic of Internet results in the occur of the privacy violations. This has an effect to the further development of e-commerce. In the e-commerce environment, because of the network’s glo bal, fast and other characteristics, this determines the net work infringement would affect a large rage and more fast. Specifically, we should take action to the invasion of the consumers’ privacy.
The way to protecting the consumers’ privacy
The technical instrument
The technical instrument, including the information security technology in electronic commerce and the security agreement of the E-commerce information, should be used to protect consumers’ privacy.
The information security technology depends largely on the improvement of these technologies, these technologies including firewall technology, encryption technology, digital signature technology, P2P technology. Firewall technology is used to strengthen the network of the question, control and prevent external Internet users to enter the internal network illegally. Encryption technology could meet the information integrity and is a kind of active safety preventive strategy.。