Internet Privacy Essays

Filter results by:

 

View Full Essay

Internet Security Risks Internet Security Presents Field Essay

Words: 4724 Length: 15 Pages Document Type: Essay Paper #: 20437974

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date.

Internet security

In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing. There are many tools that are employed online that breach a user's privacy without their knowledge Dinev & Hart, 2005.

Web tracking software is used by malicious companies to access a person's online behavior and information, which the company will sell to other marketing companies. Corporations and government institutions are constantly been hacked for their information. Banks have lost millions as the hackers access customer accounts and withdraw funds illegally Dinev & Hart, 2005.

The reasons for these attacks could be system weaknesses, or user carelessness. A user who is not careful when browsing online could divulge information that can be used by a hacker to access sensitive information online.

Introduction

The way people live today has been revolutionized by the internet. Majority of activities like financial services, socializing, information access, entertainment, and product purchase all take place online. People are now relying on the internet for these activities and more due to its pervasive information collection and wide coverage. With continuous and frequent use people have come to trust the internet as a gateway to home, personal, and office convenience Dinev & Hart, 2005.

The internet is vulnerable to many risks due to its simple nature based on host servers and a host of backbones. The hosts will vary from personal computers to supercomputers that make use of different software and hardware. The main linkage in all these hosts is the Transport Control Protocol/Internet Protocol (TCP/IP). This…… [Read More]

Sources:
Anderson, R., & Moore, T. (2009). Information Security: Where Computer Science, Economics and Psychology Meet. Philosophical Transactions: Mathematical, Physical and Engineering Sciences, 367(1898), 2717-2727. doi: 10.2307/40485617

Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers. International Journal of Electronic Commerce, 9(1), 69-104. doi: 10.2307/27751132
View Full Essay

Privacy for High School Students Essay

Words: 12892 Length: 40 Pages Document Type: Essay Paper #: 13864282

Internet: Privacy for High School Students

An Analysis of Privacy Issues and High School Students in the United States Today

In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of a mouse. In this environment, can anyone, especially high school students, reasonably expect to have any degree of privacy? High school students, after all, are not protected by many of the same constitutional guarantees as adults, but their needs for privacy may be as great, or greater, than their adult counterparts. To determine what measure of privacy, if any, high schools students can expect at home and school today, this paper provides an overview of the issue of privacy, followed by an analysis of its various dimensions as they apply to this segment of the population. A discussion of current and future trends is followed by a summary of the research in the conclusion.

Review and Discussion

Background and Overview. In his essay, "The Costs of Privacy," Kent Walker (2001) advises that "Privacy is both an individual and a social good. Still, the no-free-lunch principle holds true. Legislating privacy comes at a cost: more notices and forms, higher prices, fewer free services, less convenience, and, often, less security. More broadly, if less tangibly, laws regulating privacy chill the creation of beneficial collective goods and erode social values" (p. 87). Likewise, Jeffrey Rosen suggests that "privacy protects us from being misdefined and judged out of context in a world of short attention spans, a world in which information can easily be confused with knowledge" (p. 209). Yet, while the headlines are replete with reports concerning privacy issues and how they are playing out in the workplace and school, there are some profound differences in what can reasonably be expected in terms of privacy from one society to the next.

In the West, privacy assumes a more important role for many people, perhaps, than their counterparts in the East simply by virtue of the social emphasis on individuality in the former and the emphasis on the needs of the group first in the latter; nevertheless, people everywhere seem to agree to privacy is an important component of the human existence.…… [Read More]

References:
Alarming Number of Teens Addicted to the Internet. (2001, February 1). Korea Times, 3.

Albanes, R., Armitay, O., Fischer, B., & Warner, J. (1998). Marijuana, Juveniles, and the Police: What High-School Students Believe about Detection and Enforcement.
View Full Essay

Internet Laws Essay

Words: 3271 Length: 8 Pages Document Type: Essay Paper #: 57050261

Internet Ethics and the consumer's private existence in an unstable regulatory environment -- untapped economic waters in a wild, wild west of identity theft and chronic consumption

When it comes to Internet ethics, even in the absence of legal requirements, businesses must themselves self-regulate when it comes to consumer privacy. If they do not, it is likely that the government will step in to do so, as the government has done in the European Union. This will only hurt businesses economically, and do damage to the equal ethical obligation corporations owe to shareholders. Furthermore, good business sense is about trust between the consumer and the business, and this is not honored when businesses unfairly spy upon casual surfers of their websites, or use consumer data for their own profit as well as research and marketing purposes.

Americans, according to a recent poll cited by J. Hodges in the journal of the Internal Auditor, now consider the Internet to be a more important source of information than radio or television, yet distrust its intrustive potential in their daily lives. This was the conclusion of the 2001 study "Surveying the Digital Future," a recent University of California at Los Angeles (UCLA) area of long-time research. In addition, more than two-thirds of U.S. residents have regular, continuous access to the Internet in their homes, fifty give percent report frequently using e-mail, and fifty two percent have made purchases online. (Hodges, 2001) Ever since the age of direct mail, of course, consumers have had access to targeted advertising they may reject or accept. (Ewald, 2003) But the plurality of uses, of personal, business, and commerce, that most Americans deploy the Internet, makes the use of the Web particularly ethically dicey -- a business intrudes into the office of another business when an employee surfs for products online at work, and spam…… [Read More]

Resources:
Ewald, Helen. (April 1, 2003) "You're a Guaranteed Winner: Composing the You of Consumer Culture" Journal of Business Communication.

Hodges, J. (Feb 2001): No Faith in the System - consumer service shows Internet users concerned about privacy." Internal Auditor. Retrived 8 Jan 2005 at http://www.findarticles.com/p/articles/mi_m4153/is_1_58/ai_71268466
View Full Essay

Internet Profiling and Privacy This Essay

Words: 3885 Length: 12 Pages Document Type: Essay Paper #: 31745337

Ethics is an essential part of the individual condition. As an important person who starts up a large business as well as deals on a daily basis with other corporation at all arena of expansion so basically business ethics is lively and glowing plus hotly chat about in boardrooms all over the world. Furthermore for the majority of administration and boards know their accountability goes well beyond periodical results. These corporations consist of one component of a much larger arena that has lost its cooperative acceptance for unprincipled actions. Moreover, if an individual is in scripting copy and keeping a client's electronic business or electronic commerce website think about the consumer confidentiality and legal issues which includes publishing and copywriting for a customer is an evidence of how they are out looked to the rest of the earth. pessimistic or offensive piece of writing published as regards a variety of populace and corporations on other websites and if not correctly investigate could perhaps have legal penalty of libel that can broaden across state Also think carefully what is published or in print on Weblogs or Blogs for undersized. A blog is just a website where on a daily basis, weekly, or monthly individual or communal thoughts, ideas, as well as activities can be published plus shared with and by others. Communication with person who reads can be set up in the form of commentary from visitors. Characteristically blog sites can be set up for at no cost. If webmasters execute unethical optimization of a customer's website, it possibly will have long lasting harmful business consequences for that customer that can not be easily patch up penalty that at first glance may seem of no consequence. People are getting savvier online. They are preliminary to see the e-business false publicity that is upon populace. So,…… [Read More]

Works Cited:
Graham JH Smith, Partner Bird & Bird, et al. Internet Law and Regulation. Thomson Sweet & Maxwell, 2007.

David R. Johnson and David G. Post, et al. Law and Borders - the Rise of Law in Cyberspace. Standford Law Review, 1996.
View Full Essay

Internet Service Provider ISP Web Content Law Essay

Words: 1109 Length: 4 Pages Document Type: Essay Paper #: 81533387

Internet Service Provider (ISP) Web Content Law and Ethics

The objective of this work is to answer whether Internet service providers have a responsibility to regulate the content that is available on the World Wide Web? This work will additionally answer as to whether the presence and ease of availability of pornography to the general public a tribute to free speech and a reflection of social maturity or an example of the potential damage that unregulated markets and the hegemony of technology have reaped upon society?

The Internet is such that allows consumers, businesses, and industry, alike to "do many new things in unique and efficient ways." (Tekxam, nd) There are however, reported to be areas of both legal and ethical concern with regards to the responsibilities of Internet Service providers. Some of those areas include protection of intellectual property, fraud prevention, protection of freedom of expression, protection of privacy, control of Internet indecency vs. free speech, and spamming controls. (Tekxam, nd, paraphrased)

I. Free Speech

The Internet is reported to have become the "great equalizer" and specifically stated is in terms of enabling the individual "regardless of background, location, income, etc. To access and provide information and to make their views known." (Tekxam, nd) The Internet too has been used to spread material that is offensive to many individuals including such as "pornographic, hate and other potentially dangerous material." (Tekxam, nd) These sites may possibly be accessed by children creating a general agreement among the public that some method should be used to ensure that children do not access such material.

II. Provisions of Law

There are reported to be several Acts passed by the Congress that focus on concerns surrounding use of the Internet by children. (Turban, et al., 2000, p.359 in Tekxam, nd) Included in laws that address these issues are the following:

(1) The Child Online Protection Act of 1998 -- this act makes a requirement that the adult's age is verified prior to their accessing material online that is deemed as 'harmful to minors'. This Act also makes a requirement of parental consent prior to the solicitation of personal information from a minor child;

(2) The Family Friendly Internet Access Act -- makes a requirement that ISPs offer screening software when the…… [Read More]

Sources:
Black, Justice (1965) in: Study Guide: Legal and Ethical Aspects of the Internet (nd) Tekxam. Retrieved from: http://www.tekxam.com/StudyGuide/concepts/Ethics-and-Legal/TekXam_Legal_and_Ethical_Study_Guide.html

Cohen-Almagor, R. (2011) Freedom of Expression, Internet Responsibility, and Business Ethics: The Yahoo! Saga and Its Implications. Springer Science Business Media. B.V. 2011. Retrieved from: http://hull.academia.edu/RaphaelCohenalmagor/Papers/1074355/Freedom_of_Expression_Internet_Responsibility_and_Business_Ethics_The_Yahoo_Saga_and_Its_Aftermath
View Full Essay

Internet Vulnerability in Today's Fast Essay

Words: 1376 Length: 4 Pages Document Type: Essay Paper #: 40167241

Some programs are even able to track keystrokes and take snapshots of computer screens, allowing criminals even more information, such as credit card numbers and usernames (Bahl, 219).

While the obtaining of information through fraud is a problem related to Internet activity, there are other concerns with privacy that are still considered legal. For example, a company can obtain your personal information from transactions, and legally sell that information to the highest bidder (Sinrod, 17). While information traded between companies can increase competition, when the information is purchased by unscrupulous buyers, such transactions can threaten the security, privacy, and identity of consumers.

In addition, while restrictions exist on the government's collection of private and personal information from the Internet, loopholes exist that allow the government to obtain information without the knowledge of consumers. An example is the FBI's "Carnivore" system, developed to conduct surveillance of electronic communications by intercepting and collecting email and Internet searches (Dunham, 452). A portable device much like a phone tap, "Carnivore" was designed for court-ordered surveillance, but since the FBI controls the software, there is little civil regulation.

In addition to this form of privacy invasion, corporations are using employee tracking services more often in the workplace, as well. Numerous courts around the country have ruled that activities employees engage in on company Internets do not fall under the Constitutional protection of privacy. Companies are allowed the monitor phone calls, view all email messages, track online activities, including those believed deleted, and even track the number of keystrokes per day (Brin, 56).

While these clear vulnerabilities to identity theft, invasion of privacy, and fraud, are reasons for concern, consumers can protect themselves against such actions. The Center for Democracy and Technology lists several ways consumers can increase their online privacy. First, when using an Internet commerce site, consumers should view and read privacy policies to ensure the company preserves the integrity on online data. Additionally, the CDT suggests obtaining a separate, secure email account for online transactions and for children within the household. Third, clearing…… [Read More]

References:
Bahl, Shalini. "Consumers' Protection of Online Privacy and Identity." Journal of Consumer Affairs 38.2 (2004): 217-235.

Bielski, Lauren. "Security Breaches Hitting Home: Phishing, Information Leaks Keep Security Concerns at Red Alert." ABA Banking Journal 97.6 (2005): 7-18.
View Full Essay

Internet Technology Marketing and Security Essay

Words: 1677 Length: 5 Pages Document Type: Essay Paper #: 93854055

Aer Lingus, 2012a ()

No security breach has even been recorded on the Aer Lingus website so the website can be thought to be tightly secure and that all the necessary steps have been taken to ensure that the personal information of their customers is kept safe.

Methods for ensuring greater security for customers

One of the ways which the company can ensure that they continue maintaining this record of security and providing greater security for customers is to make sure the company has a security work team. This will be a team that is involved in checking the security of the company's website and other online products as their daily activity.

The second method is to ensure they keep up-to-date with changes in the technological world. Technology changes pretty fast therefore the company needs to keep up with these changes especially in the online security field. This will ensure the company always has the capability to make sure their website has up-to-date technological instruments to ensure the security of the website and online products.

Conclusion

The internet has come to be a strong tool in terms of marketing of the various products of many companies and Aer Lingus has also benefitted largely from leveraging the use of the internet. The company provides detailed contact information on their website as well as detailed information on their various products and services. The security of customers and the information they provide to Aer Lingus is always a priority and is maintained at the highest level.… [Read More]

Bibliography:
Aer Lingus. (2010). Annual Report 2010: Aer Lingus.

Aer Lingus. (2011). Company Profile Retrieved February 23rd, 2012, from http://www.aerlingus.com/aboutus/aerlingusmedia/companyprofile/
View Full Essay

Internet Searching for Information on Google Is Essay

Words: 596 Length: 2 Pages Document Type: Essay Paper #: 56768974

Internet

Searching for information on Google is like trying to find a needle in a haystack. Is that true? Was the library of the 19th century more efficient? Explain.

Google makes searching easy by typing in search terms in the browser. When search terms are searched in the browser, it brings up a list of items from the search terms. This makes the searching in Google much easier to find what the user is looking for. The 19th century brought about revolution in the respect that the libraries introduced directories that were placed on the tables in the libraries to look for and find information more efficiently. Google has used the internet to search for information through data bases that come from all over the world. The libraries of the 19th century only had them on a table, which means that people still had to go to the library. Google can be accessed from any computer at any location from all over the world.

The information age might very well go down as one of the most influential movements of the last century. The term "revolution" refers to a drastic change. In what ways in this information age is so drastically different? Is it all good?

This information age has brought about a drastic change in the way the world communicates with each other. The internet is a global open network (A virtual counter-revolution, 2010) that allows users to communicate with others across the globe, not just in their own locations. It has also changed how the world does business. Any business can create a website and sell products from around the globe. Consumers no longer have to drive to go to the stores. They can shop online from around the world. The way college students search to…… [Read More]

References:
A virtual counter-revolution. (2010, Sept 2). Retrieved from The Economist:  http://www.economist.com/node/16941635 

Boswell, W. (2005, June 17). Google vs. Libraries. Retrieved from About.com Web Search: http://websearch.com.about.com/b/2005/06/17/google-vs.-libraries.htm