Lotus Marketplace

Last updated

Lotus Marketplace was a database program developed jointly by Lotus Development Corporation (as the software developer) and Equifax (as the information provider), announced on April 10, 1990, but cancelled shortly after on January 23, 1991, mainly due to massive protests and lawsuit threats, citing invasion of privacy. This program was rather large (even by today's standards), as it was supposed to be released on several CD-ROMs.

Database organized collection of data

A database is an organized collection of data, generally stored and accessed electronically from a computer system. Where databases are more complex they are often developed using formal design and modeling techniques.

Computer program Instructions to be executed by a computer

A computer program is a collection of instructions that performs a specific task when executed by a computer. A computer requires programs to function.

A software developer is a person concerned with facets of the software development process, including the research, design, programming, and testing of computer software. Other job titles which are often used with similar meanings are programmer, software analyst, and software programer.

Contents

Lotus Marketplace was to be released in two editions, Lotus Marketplace: Business (containing information about businesses) and Lotus Marketplace: Households (containing information about peoples and households).

The Business edition of this program contained information about 7 million businesses in the United States, just like Yellow Pages, but could quickly and flexibly be searched. Unlike the Households edition, this edition was not so controversial and was released in October 1990, but was cancelled along with the Households edition; concerns about profitability were cited.

Business organization involved in commercial, industrial, or professional activity

Business is the activity of making one's living or making money by producing or buying and selling products. Simply put, it is "any activity or enterprise entered into for profit. It does not mean it is a company, a corporation, partnership, or have any such formal organization, but it can range from a street peddler to General Motors."

United States Federal republic in North America

The United States of America (USA), commonly known as the United States or America, is a country comprising 50 states, a federal district, five major self-governing territories, and various possessions. At 3.8 million square miles, the United States is the world's third or fourth largest country by total area and is slightly smaller than the entire continent of Europe's 3.9 million square miles. With a population of over 327 million people, the U.S. is the third most populous country. The capital is Washington, D.C., and the largest city by population is New York City. Forty-eight states and the capital's federal district are contiguous in North America between Canada and Mexico. The State of Alaska is in the northwest corner of North America, bordered by Canada to the east and across the Bering Strait from Russia to the west. The State of Hawaii is an archipelago in the mid-Pacific Ocean. The U.S. territories are scattered about the Pacific Ocean and the Caribbean Sea, stretching across nine official time zones. The extremely diverse geography, climate, and wildlife of the United States make it one of the world's 17 megadiverse countries.

The Households edition of this program became infamous and the object of considerable opprobrium because it was supposed to contain private information about 120 million people and 80 million households in the United States. Information such as names, addresses, telephone numbers, demographic information, and prior purchasing behavior were contained in the program and could be searched quickly and flexibly. This program was strongly protested by many, who cited customer privacy issues (because using this program telemarketers could get hundreds of names and addresses, and mass mail those addresses without addressees' discretion). The backlash online was particularly intense, with a new Usenet newsgroup formed to discuss it. Information was circulated online about how to contact Lotus and request the removal of one's information from the database; more than 30,000 people would eventually so contact Lotus. The decision to not release it was seen as a victory for online activism. [1]

Privacy the ability of an individual or group to seclude themselves, or information about themselves

Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. When something is private to a person, it usually means that something is inherently special or sensitive to them. The domain of privacy partially overlaps with security (confidentiality), which can include the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity.

Household group of one or more people living in the same dwelling and sharing meals or living accommodation; may consist of a single family or other grouping of people

A household consists of one people who live in the same dwelling and share meals. It may also consist of a single family or another group of people. A dwelling is considered to contain multiple households if meals or living spaces are not shared. The household is the basic unit of analysis in many social, microeconomic and government models, and is important to economics and inheritance.

Telephone number unique sequence of digits assigned to a telephone subscription

A telephone number is a sequence of digits assigned to a fixed-line telephone subscriber station connected to a telephone line or to a wireless electronic telephony device, such as a radio telephone or a mobile telephone, or to other devices for data transmission via the public switched telephone network (PSTN) or other public and private networks.

See also

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:

  1. The individual's own personal code.
  2. Any informal code of ethical conduct that exists in the work place.
  3. Exposure to formal codes of ethics.

Telemarketing is a method of direct marketing in which a salesperson solicits prospective customers to buy products or services, either over the phone or through a subsequent face to face or Web conferencing appointment scheduled during the call. Telemarketing can also include recorded sales pitches programmed to be played over the phone via automatic dialing.

Further reading

Related Research Articles

Cyberspace notional environment in which communication over computer networks occurs

Cyberspace is widespread, interconnected digital technology. The term entered the popular culture from science fiction and the arts but is now used by technology strategists, security professionals, government, military and industry leaders and entrepreneurs to describe the domain of the global technology environment. Others consider cyberspace to be just a notional environment in which communication over computer networks occurs. The word became popular in the 1990s when the uses of the Internet, networking, and digital communication were all growing dramatically and the term "cyberspace" was able to represent the many new ideas and phenomena that were emerging. It has been called the largest unregulated and uncontrolled domain in the history of mankind, and is also unique because it is a domain created by people vice the traditional physical domains.

Mitch Kapor entrepreneur,  founder of the Lotus Development Corporation, co-founder of the Electronic Frontier Foundation, founding chair of the Mozilla Foundation

Mitchell David Kapor is an American entrepreneur best known for his work as an application developer in the early days of the personal computer software industry, later founding Lotus, where he was instrumental in developing the Lotus 1-2-3 spreadsheet. He left Lotus in 1986. In 1990 with John Perry Barlow and John Gilmore, he co-founded the Electronic Frontier Foundation, and served as its chairman until 1994. In 2003, Kapor became the founding chair of the Mozilla Foundation, creator of the open source web browser Firefox. Kapor has been an investor in the personal computing industry, and supporter of social causes via Kapor Capital and the Kapor Center. Kapor and his wife, Freada Kapor Klein, invest in social impact tech startups that seek to narrow gaps in opportunity and access for underrepresented communities and attempt to eliminate barriers to full participation across the tech ecosystem. Kapor and Klein take a comprehensive approach to removing barriers in education and the workplace for all and fixing the leaks at every stage of the tech pipeline. Kapor serves on the board of SMASH, a non-profit founded by Klein to help underrepresented scholars hone their STEM knowledge while building the networks and skills for careers in tech and the sciences.

Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet. The monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies.

Lotus Software was an American software company based in Massachusetts; it was "offloaded" to India's HCL Corporation in 2018.

Crypto-anarchism is a form of anarchy accomplished through computer technology. Crypto-anarchists employ cryptographic software to evade persecution and harassment while sending and receiving information over computer networks, in an effort to protect their privacy, their political freedom, and their economic freedom.

Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones (Bluetooth/SMS/MMS)". Cybercrime may threaten a person or a nation's security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding hacking, copyright infringement, unwarranted mass-surveillance, sextortion, child pornography, and child grooming. There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the perspective of gender and defined 'cybercrime against women' as "Crimes targeted against women with a motive to intentionally harm the victim psychologically and physically, using modern telecommunication networks such as internet and mobile phones". Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation state is sometimes referred to as cyberwarfare.

Clipper chip chipset that was developed and promoted by the NSA

The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured “voice and data messages" with a built-in backdoor. It was intended to be adopted by telecommunications companies for voice transmission. It can encipher and decipher messages. It was part of a Clinton Administration program to “allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions." “Each clipper chip ha[d] a unique serial number and a secret ‘unit key,’ programmed into the chip when manufactured." This way, each device was meant to be different from the next.

Internet culture, or cyberculture, is the culture that has emerged, or is emerging, from the use of computer networks for communication, entertainment, and business. Internet culture is also the study of various social phenomena associated with the Internet and other new forms of the network communication, such as online communities, online multi-player gaming, wearable computing, social gaming, social media, mobile apps, augmented reality, and texting, and includes issues related to identity, privacy, and network formation.

Internet activism is the use of electronic communication technologies such as social media, e-mail, and podcasts for various forms of activism to enable faster and more effective communication by citizen movements, the delivery of particular information to large and specific audiences as well as coordination. Internet technologies are used for cause-related fundraising, community building, lobbying, and organizing. A digital activism campaign is "an organized public effort, making collective claims on a target authority, in which civic initiators or supporters use digital media." Research has started to address specifically how activist/advocacy groups in the U.S. and Canada are using social media to achieve digital activism objectives.

Internet privacy right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via of the Internet; a subset of data privacy

Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing.

<i>Neuromancer</i> (video game) video game

Neuromancer is an adventure video game developed by Interplay Productions and published by Mediagenic. It was released in 1988 for the Amiga, Apple II, Apple IIGS, Commodore 64, and MS-DOS. It was loosely based on William Gibson's 1984 novel of the same name and set within both the fictional "real world" and the extensively realized and detailed world of cyberspace. It has a soundtrack based on the Devo song "Some Things Never Change" from their album Total Devo. The gaming rights at the time were owned by Timothy Leary, who brought the project to Interplay to develop.

G Suite is a brand of cloud computing, productivity and collaboration tools, software and products developed by Google, first launched on August 28, 2006 as "Google Apps for Your Domain". G Suite comprises Gmail, Hangouts, Calendar, and Google+ for communication; Drive for storage; Docs, Sheets, Slides, Forms, and Sites for collaboration; and, depending on the plan, an Admin panel and Vault for managing users and the services. It also includes the digital interactive whiteboard Jamboard and the app development platform App Maker.

Cyberethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society. For years, various governments have enacted regulations while organizations have defined policies about cyberethics.

<i>Code and Other Laws of Cyberspace</i> book

Code and Other Laws of Cyberspace is a 1999 book by Lawrence Lessig on the structure and nature of regulation of the Internet.

Information technology law concerns the law of information technology, including computing and the internet. It is related to legal informatics, and governs the digital dissemination of both (digitalized) information and software, information security and electronic commerce. aspects and it has been described as "paper laws" for a "paperless environment". It raises specific issues of intellectual property in computing and online, contract law, privacy, freedom of expression, and jurisdiction.

The United States Federal Trade Commission's fair information practice principles (FIPPs) are guidelines that represent widely accepted concepts concerning fair information practice in an electronic marketplace.

Google Buzz was a social networking, microblogging and messaging tool that was developed by Google which replaced Google Wave and integrated into their web-based email program, Gmail. Users could share links, photos, videos, status messages and comments organized in "conversations" and visible in the user's inbox.

The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a US government initiative announced in April 2011 to improve the privacy, security and convenience of sensitive online transactions through collaborative efforts with the private sector, advocacy groups, government agencies, and other organizations.

Since the arrival of early social networking sites in the early 2000s, online social networking platforms have expanded exponentially, with the biggest names in social media in the mid-2010s being Facebook, Instagram, Twitter and SnapChat. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion regarding the database's ability to safely store such personal information. The extent to which users and social media platform administrators can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and boundaries of subsequent privacy violations are critical concerns in advance of the technological age.

Network Sovereignty is the effort of a governing entity, such as a state, to create boundaries on a network and then exert a form of control, often in the form of law enforcement over such boundaries.

References

  1. "In the end, many acknowledged the role of online action in stopping the release of MarketPlace. Some subsequently called it a "victory for computer populism" (Winner 1991)." from "The promise and the peril of social action in cyberspace: ethos, delivery, and the protests over MarketPlace and the Clipper chip", Laura J. Gurak; as published in Communities in Cyberspace, edited by Marc A. Smith and Peter Kollock; ISBN   0-415-19140-8

Lance J. Hoffman is Distinguished Research Professor of Computer Science at The George Washington University (GW) in Washington, DC. He initiated and taught the first course on computer security in a regular accredited degree program in the United States at the University of California, Berkeley in 1970 and established the computer security program there and at GW and led GW’s to national recognition as a Center of Academic Excellence in Information Assurance Education.