文档介绍:Chapter9Law,Ethics,andCyberCrime1PrenticeHall,在***和在互联网上的审查制度2PrenticeHall,2003LearningObjectives(cont.)worksecurityattacksUnderstandthefactorscontributingtotheriseofECsecuritybreachesDescribethekeysecurityissuesfacingECsitesDiscusssomeofthemajortypesofcyberattacksagainstECsitesDescribesomeofthetechnologiesusedtosecureECsites3PrenticeHall,2003MP3,Napster,andconnectionwithoutpayingroyalties版税Napstersupportedthefreedistributionofmusicandotherdigitizedcontentamongmillionsutilizingpeer-to-peer(P2P)technologyTheseservicescouldnotbeignoredbecausetheycouldresultinthedestructionofmillionsofjobsandrevenue4PrenticeHall,2003MP3,Napster,andIntellectualPropertyRights(cont.)版权侵犯诉讼Copyrightlawsandcopyrightcaseshavebeeninexistenceforyearsbut:WerenotwrittenfordigitalcontentFinancialgainloopholewasnotclosed漏洞5PrenticeHall,2003MP3,Napster,andIntellectualPropertyRights(cont.)merceinvolvesanumberoflegal,ethical,hical,intrusive,orundesirablebehavior闯入的6PrenticeHall,2003PrivacyAdvocatesTakeOnDoubleClickDoubleClickisoneoftheleadingprovidersofonlineadvertisingDoubleClickusescookiestopersonalizeadsbasedonconsumers’interestsInJanuary1999,DoubleClickboughtcatalogmarketerAbacusDirectandannouncedplanstomergeAbacus’soff-linedatabasewiththeironlinedata9PrenticeHall,2003PrivacyAdvocatesTakeOnDoubleClick(cont.)SeveralclassactionlawsuitswerebroughtagainstDoubleClick,panywas“usersandobtainingpersonalandfinancialinformationwith-outtheindividual’sknowledgeInviolationofthestate’puterswithouttheirpermissionInJanuary2001,theFTCruledthatDoubleClickhadnotviolatedFTCpolicies10PrenticeHall,2003