Chapter 9 Legal and Ethical Issues in E-Commerce

1234567891011121314151617181920
Across
  1. 1. A principle that consumers must approve in advance what information they receive from a company or allow a company to share their information with third parties.
  2. 4. __________ is one the IT technologies to ensure that all information communicated over the network is being translated into cipher text.
  3. 8. One of the methods to fake news in huge amount without intervention of humans.
  4. 9. Internet _________ in the workplace refer to the actual time wasted and productivity losses due to employees spending time on the Web during working hours are very high.
  5. 11. One of the privacy protection principles that concerns about an individual's ability both to access data and view the data.
  6. 13. _________ law protects original work of authorship, such as music and literacy works.
  7. 16. _________ law protects inventions and discoveries.
  8. 18. _________ rights management is a system of protecting the copyrights of data circulated over the Internet or digital media.
  9. 19. _________ secret law protects proprietary business information.
  10. 20. One of the privacy protection principles that concerns whether customers are given notice on how the collection of information is being practiced.
Down
  1. 2. _________ law is used to protect logos.
  2. 3. ___________ is bullying that takes place electronically.
  3. 5. Restrictions on what can be seen, published, or accessed on the Internet.
  4. 6. A method that gives consumers the choice to refuse to share information about themselves or to avoid receiving unsolicited information.
  5. 7. Internet __________ refers to a member of an online social community who deliberately tries to disrupt, attack, offend, or generally cause trouble within the community.
  6. 10. a set of moral principles or rules of how people are expected to conduct themselves.
  7. 12. _________ property law protects the creative work of people.
  8. 14. Site __________ logs show what users are doing on the Internet.
  9. 15. refers to the limited use of copyrighted material, without paying a fee or royalty for certain purposes only.
  10. 17. Content __________ can be based on a blacklist of offensive website content providers or by other methods.