Trust in electronic commerce: the role of trust from a legal, an organisational and a technical point of view
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | German |
Veröffentlicht: |
The Hague ; London
Kluwer Law International
<<c>>2002
|
Schriftenreihe: | Law and electronic commerce
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 309 S. Ill. 25 cm |
ISBN: | 9041118454 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021453454 | ||
003 | DE-604 | ||
005 | 20030225 | ||
007 | t | ||
008 | 020829s2002 a||| |||| 00||| ger d | ||
020 | |a 9041118454 |9 90-411-1845-4 | ||
035 | |a (DE-599)BVBBV021453454 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a ger | |
049 | |a DE-M382 | ||
245 | 1 | 0 | |a Trust in electronic commerce |b the role of trust from a legal, an organisational and a technical point of view |c edited by J.E.J. Prins ... [et al.] |
264 | 1 | |a The Hague ; London |b Kluwer Law International |c <<c>>2002 | |
300 | |a XII, 309 S. |b Ill. |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Law and electronic commerce | |
650 | 0 | 7 | |a Vertrauen |0 (DE-588)4063290-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 0 | 1 | |a Vertrauen |0 (DE-588)4063290-8 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Prins, C. |e Sonstige |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014673691&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-014673691 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804135175224819712 |
---|---|
adam_text | Table of Contents
General
Chapter 1
Corien Prins and Leo van der Wees
E Commerce and Trust: a Variety in Challenges 1
1 Tune in to the Digital World 1
2 Defining Electronic Business and Electronic Commerce 2
3 The Opportunities of Electronic Business and Electronic Commerce 3
4 A Key Challenge: Trust 4
5 Trust as the Subject of this Book 5
Technical
Chapter 2
Florian Egger
Consumer Trust in E commerce: From Psychology to Interaction Design 11
1 Introduction 11
2 From EDI to B2C 11
2.1 EDI Based Business to Business E Commerce 11
2.2 Internet based Business to Business E Commerce 12
2.3 Internet Based Business to Consumer E Commerce 12
3 The Trust Challenge 13
3.1 Security 13
3.2 Privacy 14
3.3 Unfamiliar Services 15
3.4 Lack of Direct Interaction 16
3.5 Credibility of Information 16
4 Semantics of Trust 16
4.1 Morality of Trust 16
4.2 Defining Trust 17
5 Risk 18
5.1 Risk Perception 18
5.2 Heuristics Biases 18
6 Trust in Romantic Relationships 19
6.1 Predictability 19
6.2 Dependability 20
6.3 Faith 20
6.4 Reputation 21
6.5 Cooperation 22
6.6 Familiarity 22
7 Trust in Business Relationships 23
8 HCI Trust in E Commerce 24
8.1 Trust in Machines 24
8.2 Trust in E Commerce: Academic Research 25
vi Table of Contents
8.3 Trust in E Commerce: Industry Reports 29
9 MoTEC: A Model of Trust for E Commerce 30
9.1 Pre Interactional Filters 31
9.1.1 User Psychology 31
9.1.2 Pre Purchase Knowledge 32
9.2 Interface Properties 33
9.2.1 Branding 34
9.2.2 Usability 34
9.3 Informational Content 35
9.3.1 Competence 35
9.3.1.1 Products Services 35
9.3.1.2 Company 36
9.3.2 Risk 36
9.3.2.1 Terms Conditions 37
9.3.2.2 Security 37
9.3.2.3 Privacy 38
9.4 Relationship Management 38
9.4.1 Pre Purchase 38
9.4.2 Post Purchase 39
10 Trustworthiness Evaluation Design 39
10.1 Evaluating a Web Site s Trustworthiness 39
10.2 Designing the Trust Experience 40
11 Further research 40
12 Conclusions 40
13 References 41
Chapter 3
Berry Schoenmakers and Henk van Tilborg
What Cryptology Can Mean for Electronic Commerce 45
1 Introduction 45
2 Cryptographic Primitives 45
2.1 Introduction 45
2.2 One way Functions 47
2.3 Public Key Cryptosystems 48
2.4 Digital Signatures 49
2.5 Random number generators 49
3 Cryptographic Protocols 50
3.1 Identification Protocols 50
3.2 Electronic Cash Protocols 51
4 Further Possibilities and Impossibilities 52
5 Concluding Remarks 53
6 References 53
Chapter 4
Dennis Abrazhevich
Importance of User related Factors in Electronic Payment Systems 55
1 Introduction 55
Table of Contents vii
2 Classification of Payment Mechanisms: State of the Art 57
2.1 Classification of Payment Mechanisms 57
2.1.1 Basic Classification: Account and Token based Mechanisms 57
2.1.2 Mediating Systems vs. Payment Systems 58
2.2 Identifying the Characteristics of Payment Systems 59
2.2.1 Description of the Characteristics of Payment Systems 60
2.3 Examples of Classification of Payment Systems 63
2.3.1 Electronic Currency or Token based Systems 63
2.3.2 Credit debit Instruments or Account based Systems 65
3 Overview of Internet Payment Mechanisms 67
3.1 Account based or Credit and Debit Systems 67
3.1.1 Generic Account based Systems 67
3.1.1.1 E mail Systems 68
3.1.2 Specialized Payment Solutions 68
3.1.2.1 Digital Content 68
3.1.2.2 Payment Systems for Mobile Commerce 69
3.2 Electronics Cash and Smart Card Systems 69
3.2.1 Online Cash Systems 69
3.2.2 Smart Cards Systems 71
3.2.3 Specialized Payment Solutions 71
3.2.3.1 Prepaid Systems/Cards 71
3.3 Mediating Systems 72
3.3.1 Mediating Systems: Credit Card Protection Solutions 73
3.3.2 Other Mediating Systems 73
3.3 Theoretical and Development Frameworks 74
4 Problems with User Acceptance of Electronic Payment Systems 76
5 Survey of User of Payment Systems 78
6 Discussion 80
6.1 Conclusions 83
7 References 83
8 Appendix: Summary Of The Survey
Organizational
Chapter 5
Kaiyin Huang
A Managerial Perspective of Security in Electronic Business 91
1 Introduction 91
2 The Framework of Inter Organisational Systems and the Management
of Electronic Business 93
3 Security Challenge in Communication 96
3.1 Safety of Communication Channels 97
3.2 The Vulnerable Network 98
3.3 Safety of Messages 99
4 Security Challenge in Organisational IT Resources 100
4.1 Computer Systems are Vulnerable 100
viii Table of Contents
4.2 Internet Hackers are on the Rise 102
4.3 Computer Virus Threat on the Rise 103
4.4 System Quality Problems 104
4.5 Building a Security Infrastructure 105
5 Security in Human Resources 105
5.1 The Internal Threat 106
5.2 The Weakness of Security Consciousness 106
5.3 The Change of the Organizational Structure and Culture 108
5.4 Maintaining Organizational Coherence 108
6 Protection from Business Environment 109
6.1 Time based Competition 109
6.2 Cultural challenges 109
6.3 Different Legal Protections and Constraints 111
6.4 Poor Social Trust 114
6.5 Many Other Uncertainties in the Market 114
6.6 Business Cooperation 115
7 Conclusions 116
8 References 116
Chapter 6
Mike Papazoglou, Piet Ribbers, Alea M. Fairchild
Integrated Value Chains in E Commerce and their IT Implications 119
1 Introduction 119
2 New Internet Oriented Business Models 121
2.1 Teleworking Model 122
2.2 Virtual Organization Model 122
2.3 Process Outsourcing Model 123
2.4 Collaborative Product Development Model 123
2.5 Value Chain Integration Model 124
3 Enabling Technologies: Business Objects and Processes 124
3.1 The Integrated Enterprise Framework 125
3.2 Business Processes and the Impact of Integrated Value Chains 127
3.2.1 Global Coordination Approach 128
3.2.2 Loosely Coupled Approach 128
3.2.3 Tightly Coupled Approach 130
4 Business Interoperability at the Cross Enterprise Level 131
5 Change Management 134
5.1 Leveraging Legacy Assets for E Commerce Activities 135
5.2 Adaptability of Business Processes 136
5.3 Managing Changes at the Business Object Level 137
6 The Role of the Infrastructure 139
7 Summary 143
8 References 143
Table of Contents ix
Chapter 7
PietRibbers, Alea M. Fairchild, Eric van Heck,, Jack Kleijnen
Creating Alternative Electronic Trading Mechanisms in Time Sensitive
Transaction Markets 147
1 Introduction 147
2 Review of Research Literature 148
3 Descriptive Framework 150
4 The Dutch Flower Industry 154
4.1 Industry Background 154
4.2 Price Discovery by Dutch Auction 154
4.3 Imports: Volumes and Restrictions 155
5 The Teleflower Auction (TFA) Case 15 6
5.1 EAF Reaction to Import Restrictions: The Creation of TFA 156
5.2 TFA Case Description 157
6 Comparison of TFA with other Electronic Markets initiatives in the
Financial Securities Sector 160
6.1 Differences with the Flower Industry 160
6.2 Industry developments 161
6.3 Electronic Market Initiatives in Securities Industry 162
7 Observations 164
8 Conclusions 167
9 Acknowledgement 168
10 References 168
Legal
Chapter 8
Paul De Hert
European Data Protection and E Commerce: Trust Enhancing? 171
1 Introduction 171
2 European Data Protection Law 172
2.1 Data Protection 172
2.2 The Council of Europe Convention (Treaty 108 of 1981) 174
2.3 The Directive 95/46/EC of the European Union 176
2.4 A Brief Presentation of the Core Provisions of Directive 95/46/EC 177
2.5 Major Differences with Older Texts 180
2.6 The Additional Protocol to the Council of Europe Convention
(Treaty 108 of 1981) 183
2.7 Practical Effects of European Data Protection on E Commerce
(in general) 184
3 Can the Consumers Trust the Internet? 187
3.1 Introduction 187
3.2 Indirect Privacy Threats 187
3.3 Direct Privacy Threats 189
3.4 Are These Features Really Threats and If Yes, to What? 190
3.5 Collective and Societal Privacy Dimensions Should Be Considered
x Table of Contents
in the Harm debate 196
3.6 Two Further Remarks About the Actual Harm 198
3.7 European Data Protection Has No Problems with the Internet Context 201
3.8 Opting Out 203
3.9 Some Problems Remain 205
3.10 European Data Protection Has No Problem with the Internet In
Europe 208
3.11 European Data Protection Has No Problem with the Internet
Outside Europe 210
3.12 Safe Harbor 211
3.13 Do These Directive Provisions Achieve International Trust? 213
3.14 Contractual Provisions to Establish International Trust, Are Used to
By pass Safe Harbor 215
3.15 Some Problems Remain 218
4 Can the Americans Trust the European Approach to Data Protection? 219
4.1 The American Critique on European Data Protection 219
4.2 Self regulation 220
4.3 The Debate Concerning Data Protection Authorities 221
5 Conclusion 225
6 Bibliography 227
Chapter 9
Rik Geurts
Legal Aspects of Software Agents 231
1 Introduction 231
2 What Are Software Agents? 232
2.1 Characteristics of Software Agents 233
2.2 Examples of Software Agents 233
3 What People Are Involved? 234
4 Legal Aspects of Software Agents 235
4.1 Non contractual Liablity 235
4.1.1 The Wrongful Act (Article 6:162 Dutch Civil Code (DCC)) 235
4.1.1.1 Characteristics 236
4.1.1.2 The Wrongful Act and SAs? 237
4.1.2 Privacy and Data Protection 238
4.1.2.1 Characteristics 239
4.1.2.2 Privacy, Data Protection and SAs 242
4.1.3 Intellectual Property Rights 243
4.1.3.1 Characteristics 244
4.1.3.2 Dutch Copyright Act 244
4.1.3.3 European Copyright Directive 246
4.1.3.4 Intellectual Property Rights and SAs 248
4.1.4 Products Liability 249
4.1.4.1 Characteristics 249
4.1.4.2 Software a Product? 250
4.1.4.3 Products Liability and SAs 251
4.2 Contractual Liability 251
Table of Contents xi
4.2.1 What Is a Contract? 251
4.2.2 Obligations 252
4.2.3 International Dimensions 253
4.2.4 Contractual Liability and SAs 254
5 Overview of Regulatory Initiatives Regarding Software Agents in the
United States, Canada and Europe 256
5.1 Regulatory Initiatives in the USA 256
5.1.1 Applicability of the Uniform Computer Information Transaction Act
(UCITA) 256
5.1.2 Relevance of UCITA for Software Agents 257
5.1.3 Applicability of the Uniform Electronic Transactions Act (UETA) 259
5.1.4 Relevance for of UETA for Software Agents 260
5.1.5 Applicability of Electronic Signatures in the Global and National
Commerce Act (E Sign) 261
5.1.6 Relevance of E Sign for Software Agents 262
5.1.7 Conclusion 262
5.2 A Regulatory Initiative in Canada 262
5.2.1 Applicability of the Uniform Electronic Commerce Act (UECA) 262
5.2.2 Relevance of UECA for Software Agents 263
5.2.3 Conclusion 264
5.3 Overview of Regulatory Initiatives of the EU 264
6 Conclusion 265
7 Bibliography 267
Chapter 10
Maurice Schellekens and Leo van der Wees
ADR and ODR in Electronic Commerce 271
1 Outline 271
1.1 Introduction 273
2 What is ADR? 273
2.1 Introduction 273
2.2 Arbitration 273
2.3 Mediation 275
2.4 Consumer Complaints 276
3 ADR Systems in an On line Environment (ODR) 277
3.1 Introduction 277
3.2 E arbitration 278
3.3 E mediation 279
3.4 E complaints 281
4 ODR: Nature and Key Issues 285
4.1 Nature 285
4.1.1 Information and Communications Technology 285
4.1.2 Standardization of ODR systems 287
4.2 Meeting Face to face 288
4.2.1 Key Issues 289
4.2.2 Trust 290
xii Table of Contents
4.2.3 Privacy 290
4.2.4. Shadow of Law 290
4.2.5 Compliance 291
5 Legal Bottlenecks in Introducing ADR systems in an On line
Environment 291
5.1 Introduction 291
5.2 Some Preliminary Observations Concerning B2C Relations 291
5.3 ODR Awareness 292
5.4 Agreeing on ODR 292
5.5 What Neutral Party? 293
5.6 What Law is Applicable? 294
5.7 The Proceedings Before a Neutral Party 295
5.8 Should a Decision By an ODR Provider Be Binding? 297
5.9 Recognition and Execution of Decisions 298
6 Conclusion 299
General
Authors 301
Index 305
|
adam_txt |
Table of Contents
General
Chapter 1
Corien Prins and Leo van der Wees
E Commerce and Trust: a Variety in Challenges 1
1 Tune in to the Digital World 1
2 Defining Electronic Business and Electronic Commerce 2
3 The Opportunities of Electronic Business and Electronic Commerce 3
4 A Key Challenge: Trust 4
5 Trust as the Subject of this Book 5
Technical
Chapter 2
Florian Egger
Consumer Trust in E commerce: From Psychology to Interaction Design 11
1 Introduction 11
2 From EDI to B2C 11
2.1 EDI Based Business to Business E Commerce 11
2.2 Internet based Business to Business E Commerce 12
2.3 Internet Based Business to Consumer E Commerce 12
3 The Trust Challenge 13
3.1 Security 13
3.2 Privacy 14
3.3 Unfamiliar Services 15
3.4 Lack of Direct Interaction 16
3.5 Credibility of Information 16
4 Semantics of Trust 16
4.1 Morality of Trust 16
4.2 Defining Trust 17
5 Risk 18
5.1 Risk Perception 18
5.2 Heuristics Biases 18
6 Trust in Romantic Relationships 19
6.1 Predictability 19
6.2 Dependability 20
6.3 Faith 20
6.4 Reputation 21
6.5 Cooperation 22
6.6 Familiarity 22
7 Trust in Business Relationships 23
8 HCI Trust in E Commerce 24
8.1 Trust in Machines 24
8.2 Trust in E Commerce: Academic Research 25
vi Table of Contents
8.3 Trust in E Commerce: Industry Reports 29
9 MoTEC: A Model of Trust for E Commerce 30
9.1 Pre Interactional Filters 31
9.1.1 User Psychology 31
9.1.2 Pre Purchase Knowledge 32
9.2 Interface Properties 33
9.2.1 Branding 34
9.2.2 Usability 34
9.3 Informational Content 35
9.3.1 Competence 35
9.3.1.1 Products Services 35
9.3.1.2 Company 36
9.3.2 Risk 36
9.3.2.1 Terms Conditions 37
9.3.2.2 Security 37
9.3.2.3 Privacy 38
9.4 Relationship Management 38
9.4.1 Pre Purchase 38
9.4.2 Post Purchase 39
10 Trustworthiness Evaluation Design 39
10.1 Evaluating a Web Site's Trustworthiness 39
10.2 Designing the Trust Experience 40
11 Further research 40
12 Conclusions 40
13 References 41
Chapter 3
Berry Schoenmakers and Henk van Tilborg
What Cryptology Can Mean for Electronic Commerce 45
1 Introduction 45
2 Cryptographic Primitives 45
2.1 Introduction 45
2.2 One way Functions 47
2.3 Public Key Cryptosystems 48
2.4 Digital Signatures 49
2.5 Random number generators 49
3 Cryptographic Protocols 50
3.1 Identification Protocols 50
3.2 Electronic Cash Protocols 51
4 Further Possibilities and Impossibilities 52
5 Concluding Remarks 53
6 References 53
Chapter 4
Dennis Abrazhevich
Importance of User related Factors in Electronic Payment Systems 55
1 Introduction 55
Table of Contents vii
2 Classification of Payment Mechanisms: State of the Art 57
2.1 Classification of Payment Mechanisms 57
2.1.1 Basic Classification: Account and Token based Mechanisms 57
2.1.2 Mediating Systems vs. Payment Systems 58
2.2 Identifying the Characteristics of Payment Systems 59
2.2.1 Description of the Characteristics of Payment Systems 60
2.3 Examples of Classification of Payment Systems 63
2.3.1 Electronic Currency or Token based Systems 63
2.3.2 Credit debit Instruments or Account based Systems 65
3 Overview of Internet Payment Mechanisms 67
3.1 Account based or Credit and Debit Systems 67
3.1.1 Generic Account based Systems 67
3.1.1.1 E mail Systems 68
3.1.2 Specialized Payment Solutions 68
3.1.2.1 Digital Content 68
3.1.2.2 Payment Systems for Mobile Commerce 69
3.2 Electronics Cash and Smart Card Systems 69
3.2.1 Online Cash Systems 69
3.2.2 Smart Cards Systems 71
3.2.3 Specialized Payment Solutions 71
3.2.3.1 Prepaid Systems/Cards 71
3.3 Mediating Systems 72
3.3.1 Mediating Systems: Credit Card Protection Solutions 73
3.3.2 Other Mediating Systems 73
3.3 Theoretical and Development Frameworks 74
4 Problems with User Acceptance of Electronic Payment Systems 76
5 Survey of User of Payment Systems 78
6 Discussion 80
6.1 Conclusions 83
7 References 83
8 Appendix: Summary Of The Survey
Organizational
Chapter 5
Kaiyin Huang
A Managerial Perspective of Security in Electronic Business 91
1 Introduction 91
2 The Framework of Inter Organisational Systems and the Management
of Electronic Business 93
3 Security Challenge in Communication 96
3.1 Safety of Communication Channels 97
3.2 The Vulnerable Network 98
3.3 Safety of Messages 99
4 Security Challenge in Organisational IT Resources 100
4.1 Computer Systems are Vulnerable 100
viii Table of Contents
4.2 Internet Hackers are on the Rise 102
4.3 Computer Virus Threat on the Rise 103
4.4 System Quality Problems 104
4.5 Building a Security Infrastructure 105
5 Security in Human Resources 105
5.1 The Internal Threat 106
5.2 The Weakness of Security Consciousness 106
5.3 The Change of the Organizational Structure and Culture 108
5.4 Maintaining Organizational Coherence 108
6 Protection from Business Environment 109
6.1 Time based Competition 109
6.2 Cultural challenges 109
6.3 Different Legal Protections and Constraints 111
6.4 Poor Social Trust 114
6.5 Many Other Uncertainties in the Market 114
6.6 Business Cooperation 115
7 Conclusions 116
8 References 116
Chapter 6
Mike Papazoglou, Piet Ribbers, Alea M. Fairchild
Integrated Value Chains in E Commerce and their IT Implications 119
1 Introduction 119
2 New Internet Oriented Business Models 121
2.1 Teleworking Model 122
2.2 Virtual Organization Model 122
2.3 Process Outsourcing Model 123
2.4 Collaborative Product Development Model 123
2.5 Value Chain Integration Model 124
3 Enabling Technologies: Business Objects and Processes 124
3.1 The Integrated Enterprise Framework 125
3.2 Business Processes and the Impact of Integrated Value Chains 127
3.2.1 Global Coordination Approach 128
3.2.2 Loosely Coupled Approach 128
3.2.3 Tightly Coupled Approach 130
4 Business Interoperability at the Cross Enterprise Level 131
5 Change Management 134
5.1 Leveraging Legacy Assets for E Commerce Activities 135
5.2 Adaptability of Business Processes 136
5.3 Managing Changes at the Business Object Level 137
6 The Role of the Infrastructure 139
7 Summary 143
8 References 143
Table of Contents ix
Chapter 7
PietRibbers, Alea M. Fairchild, Eric van Heck,, Jack Kleijnen
Creating Alternative Electronic Trading Mechanisms in Time Sensitive
Transaction Markets 147
1 Introduction 147
2 Review of Research Literature 148
3 Descriptive Framework 150
4 The Dutch Flower Industry 154
4.1 Industry Background 154
4.2 Price Discovery by 'Dutch Auction' 154
4.3 Imports: Volumes and Restrictions 155
5 The Teleflower Auction (TFA) Case 15 6
5.1 EAF Reaction to Import Restrictions: The Creation of TFA 156
5.2 TFA Case Description 157
6 Comparison of TFA with other Electronic Markets initiatives in the
Financial Securities Sector 160
6.1 Differences with the Flower Industry 160
6.2 Industry developments 161
6.3 Electronic Market Initiatives in Securities Industry 162
7 Observations 164
8 Conclusions 167
9 Acknowledgement 168
10 References 168
Legal
Chapter 8
Paul De Hert
European Data Protection and E Commerce: Trust Enhancing? 171
1 Introduction 171
2 European Data Protection Law 172
2.1 Data Protection 172
2.2 The Council of Europe Convention (Treaty 108 of 1981) 174
2.3 The Directive 95/46/EC of the European Union 176
2.4 A Brief Presentation of the Core Provisions of Directive 95/46/EC 177
2.5 Major Differences with Older Texts 180
2.6 The Additional Protocol to the Council of Europe Convention
(Treaty 108 of 1981) 183
2.7 Practical Effects of European Data Protection on E Commerce
(in general) 184
3 Can the Consumers Trust the Internet? 187
3.1 Introduction 187
3.2 Indirect Privacy Threats 187
3.3 Direct Privacy Threats 189
3.4 Are These Features Really Threats and If Yes, to What? 190
3.5 Collective and Societal Privacy Dimensions Should Be Considered
x Table of Contents
in the Harm debate 196
3.6 Two Further Remarks About the Actual Harm 198
3.7 European Data Protection Has No Problems with the Internet Context 201
3.8 Opting Out 203
3.9 Some Problems Remain 205
3.10 European Data Protection Has No Problem with the Internet In
Europe 208
3.11 European Data Protection Has No Problem with the Internet
Outside Europe 210
3.12 Safe Harbor 211
3.13 Do These Directive Provisions Achieve International Trust? 213
3.14 Contractual Provisions to Establish International Trust, Are Used to
By pass Safe Harbor 215
3.15 Some Problems Remain 218
4 Can the Americans Trust the European Approach to Data Protection? 219
4.1 The American Critique on European Data Protection 219
4.2 Self regulation 220
4.3 The Debate Concerning Data Protection Authorities 221
5 Conclusion 225
6 Bibliography 227
Chapter 9
Rik Geurts
Legal Aspects of Software Agents 231
1 Introduction 231
2 What Are Software Agents? 232
2.1 Characteristics of Software Agents 233
2.2 Examples of Software Agents 233
3 What People Are Involved? 234
4 Legal Aspects of Software Agents 235
4.1 Non contractual Liablity 235
4.1.1 The Wrongful Act (Article 6:162 Dutch Civil Code (DCC)) 235
4.1.1.1 Characteristics 236
4.1.1.2 The Wrongful Act and SAs? 237
4.1.2 Privacy and Data Protection 238
4.1.2.1 Characteristics 239
4.1.2.2 Privacy, Data Protection and SAs 242
4.1.3 Intellectual Property Rights 243
4.1.3.1 Characteristics 244
4.1.3.2 Dutch Copyright Act 244
4.1.3.3 European Copyright Directive 246
4.1.3.4 Intellectual Property Rights and SAs 248
4.1.4 Products Liability 249
4.1.4.1 Characteristics 249
4.1.4.2 Software a Product? 250
4.1.4.3 Products Liability and SAs 251
4.2 Contractual Liability 251
Table of Contents xi
4.2.1 What Is a Contract? 251
4.2.2 Obligations 252
4.2.3 International Dimensions 253
4.2.4 Contractual Liability and SAs 254
5 Overview of Regulatory Initiatives Regarding Software Agents in the
United States, Canada and Europe 256
5.1 Regulatory Initiatives in the USA 256
5.1.1 Applicability of the Uniform Computer Information Transaction Act
(UCITA) 256
5.1.2 Relevance of UCITA for Software Agents 257
5.1.3 Applicability of the Uniform Electronic Transactions Act (UETA) 259
5.1.4 Relevance for of UETA for Software Agents 260
5.1.5 Applicability of Electronic Signatures in the Global and National
Commerce Act (E Sign) 261
5.1.6 Relevance of E Sign for Software Agents 262
5.1.7 Conclusion 262
5.2 A Regulatory Initiative in Canada 262
5.2.1 Applicability of the Uniform Electronic Commerce Act (UECA) 262
5.2.2 Relevance of UECA for Software Agents 263
5.2.3 Conclusion 264
5.3 Overview of Regulatory Initiatives of the EU 264
6 Conclusion 265
7 Bibliography 267
Chapter 10
Maurice Schellekens and Leo van der Wees
ADR and ODR in Electronic Commerce 271
1 Outline 271
1.1 Introduction 273
2 What is ADR? 273
2.1 Introduction 273
2.2 Arbitration 273
2.3 Mediation 275
2.4 Consumer Complaints 276
3 ADR Systems in an On line Environment (ODR) 277
3.1 Introduction 277
3.2 E arbitration 278
3.3 E mediation 279
3.4 E complaints 281
4 ODR: Nature and Key Issues 285
4.1 Nature 285
4.1.1 Information and Communications Technology 285
4.1.2 Standardization of ODR systems 287
4.2 Meeting Face to face 288
4.2.1 Key Issues 289
4.2.2 Trust 290
xii Table of Contents
4.2.3 Privacy 290
4.2.4. Shadow of Law 290
4.2.5 Compliance 291
5 Legal Bottlenecks in Introducing ADR systems in an On line
Environment 291
5.1 Introduction 291
5.2 Some Preliminary Observations Concerning B2C Relations 291
5.3 ODR Awareness 292
5.4 Agreeing on ODR 292
5.5 What Neutral Party? 293
5.6 What Law is Applicable? 294
5.7 The Proceedings Before a Neutral Party 295
5.8 Should a Decision By an ODR Provider Be Binding? 297
5.9 Recognition and Execution of Decisions 298
6 Conclusion 299
General
Authors 301
Index 305 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV021453454 |
ctrlnum | (DE-599)BVBBV021453454 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01425nam a2200337 c 4500</leader><controlfield tag="001">BV021453454</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20030225 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020829s2002 a||| |||| 00||| ger d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9041118454</subfield><subfield code="9">90-411-1845-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021453454</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">ger</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Trust in electronic commerce</subfield><subfield code="b">the role of trust from a legal, an organisational and a technical point of view</subfield><subfield code="c">edited by J.E.J. Prins ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">The Hague ; London</subfield><subfield code="b">Kluwer Law International</subfield><subfield code="c"><<c>>2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 309 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Law and electronic commerce</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Vertrauen</subfield><subfield code="0">(DE-588)4063290-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Vertrauen</subfield><subfield code="0">(DE-588)4063290-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prins, C.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014673691&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014673691</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV021453454 |
illustrated | Illustrated |
index_date | 2024-07-02T14:05:48Z |
indexdate | 2024-07-09T20:36:19Z |
institution | BVB |
isbn | 9041118454 |
language | German |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014673691 |
open_access_boolean | |
owner | DE-M382 |
owner_facet | DE-M382 |
physical | XII, 309 S. Ill. 25 cm |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Kluwer Law International |
record_format | marc |
series2 | Law and electronic commerce |
spelling | Trust in electronic commerce the role of trust from a legal, an organisational and a technical point of view edited by J.E.J. Prins ... [et al.] The Hague ; London Kluwer Law International <<c>>2002 XII, 309 S. Ill. 25 cm txt rdacontent n rdamedia nc rdacarrier Law and electronic commerce Vertrauen (DE-588)4063290-8 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 s Vertrauen (DE-588)4063290-8 s 1\p DE-604 Prins, C. Sonstige oth HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014673691&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Trust in electronic commerce the role of trust from a legal, an organisational and a technical point of view Vertrauen (DE-588)4063290-8 gnd Electronic Commerce (DE-588)4592128-3 gnd |
subject_GND | (DE-588)4063290-8 (DE-588)4592128-3 |
title | Trust in electronic commerce the role of trust from a legal, an organisational and a technical point of view |
title_auth | Trust in electronic commerce the role of trust from a legal, an organisational and a technical point of view |
title_exact_search | Trust in electronic commerce the role of trust from a legal, an organisational and a technical point of view |
title_exact_search_txtP | Trust in electronic commerce the role of trust from a legal, an organisational and a technical point of view |
title_full | Trust in electronic commerce the role of trust from a legal, an organisational and a technical point of view edited by J.E.J. Prins ... [et al.] |
title_fullStr | Trust in electronic commerce the role of trust from a legal, an organisational and a technical point of view edited by J.E.J. Prins ... [et al.] |
title_full_unstemmed | Trust in electronic commerce the role of trust from a legal, an organisational and a technical point of view edited by J.E.J. Prins ... [et al.] |
title_short | Trust in electronic commerce |
title_sort | trust in electronic commerce the role of trust from a legal an organisational and a technical point of view |
title_sub | the role of trust from a legal, an organisational and a technical point of view |
topic | Vertrauen (DE-588)4063290-8 gnd Electronic Commerce (DE-588)4592128-3 gnd |
topic_facet | Vertrauen Electronic Commerce |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014673691&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT prinsc trustinelectroniccommercetheroleoftrustfromalegalanorganisationalandatechnicalpointofview |