18 May 2022

67

Security, Privacy and Abuse Prevention

Format: APA

Academic level: College

Paper type: Coursework

Words: 597

Pages: 1

Downloads: 0

Introduction

World technology has been on the rising edge which has led to a radical change in most formal sectors globally. Technology has brought communication and further advancement in research and education. The emergence of the internet has significantly attributed to a lot of changes in people's lives. In all that, misuse and abuse have been escalating leading to much advocacy in demand for privacy and security. The right for a person to request privacy in online forums as well as communication is indisputable due to the sensitivity of personal information as well as his or her transactions over the internet. Many reports of security and privacy breach have been reported with cases of financial fraud, ransom and identity theft rising at an astonishing rate. Social platforms such as Google, Facebook and Twitter have led to the campaign of offering privacy due to the unending identity theft crisis. Due to the rise of online threats, research reports indicate a significant rise of many online security and antivirus enterprises in the offering of online protection to internet users and companies. 

Basis of the argument

The majority of countries clearly defined privacy as a right to every person. In many of the networking social sites policies and roles of the company and the user are clearly outlined. Many challenges have been raised in the use of online services on the internet. For instance, Jakubiak, (2010) research indicates the policies involving the use of customer information to improve services is widely abused in many mobile applications. Research recommends that company policies should undergo a much comprehensive review about the information acquired from the client and how it can be disposed of in the request of the customer. Based on Frackman, Martin, & Ray, (2002) research, they argued that many mobile applications are accessing a lot of vital data such as call records differing with the primary use of the form, taking an example of a weather application having permissions to access call records is evidently outrageous.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Past recent events have reported of massive government surveillance on the internet. Contrary to that, research shows that many of internet users are much wary of hackers, criminals and advertising companies than law enforcement agencies. In the case of a technical failure or a security breach happens to any of the social networking platforms extensive data relating to the customers would be in jeopardy of being used negatively towards the client. Dhanjani, (2015) outlined that abuse of customer's data can be seen in many of the interactive social platforms. Currently allowing advertisements that closely relate towards a given user which speculates extensive sharing of a customer acquired data with other third party companies which are done without the consent of the client. Well definition of consumer rights in the terms of using customer data should be advocated and implemented. Google has stepped up in implementing user and marketing policies that do not infringe abuse of user privacy. In Facebook, the tracking of close related friends and the uploading of contacts and location should be well defined to the users where the customer should be made to understand the level of information being accessed by the company. 

Conclusion

The Internet and online services are highly welcomed to ease the daily activities of every person in the world. The regulations show that it is the right of every individual to privacy and security. Young & Abreau, (2011) supported that preventive measures against internet abuse should be spearheaded by the relevant authorities and internet corporate to the creation of a safe online environment. The public should be made aware of the information that they disclose to social platforms and online mobile applications and the effects of disclosure. Many findings have confirmed that internet users are spending massively to protect themselves from crimes in the internet.

References

Dhanjani, N. (2015). Abusing the internet of things. Sebastopol: O'Reilly.

Frackman, A., Martin, R. C., & Ray, C. (2002). internet and online privacy. New York: ALM publishers.

Jakubiak, D. J. (2010). A smart kid's guide to internet privacy. New York: Powerkids press.

Young, K. S., & Abreau, C. N. (2011). Internet addiction. Hoboken: John wiley & Sons.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Security, Privacy and Abuse Prevention.
https://studybounty.com/security-privacy-and-abuse-prevention-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Climate Change Pattern around the World

Running head: CLIMATE CHANGE PATTERN AROUND THE WORLD 1 Climate Change Pattern around the World Name Institutional Affiliation Climate Change Pattern around the World It is now an accepted fact that the world’s...

Words: 690

Pages: 2

Views: 93

Autism Myths: Debunking the Misconceptions

The patient portal is a 24-hour internet application that the patients use to access their personal health information. The first patient’s website was established in 1998 but the patient portal was rolled out in...

Words: 1480

Pages: 5

Views: 155

Pros and Cons of Cancer Treatment

The project is about the pros and cons associated with the treatment of cancer patients. Patients who have cancer may benefit from the advantages of cancer treatment and suffer the consequences of the treatment...

Words: 359

Pages: 1

Views: 453

Human Mitochondrial DNA: Functions, Mutation, and Inheritance

2 Summary of Three Papers Human mitochondria DNA is characterized by circular double-stranded molecules that are separable through the process of configuration density. The comprehension of the various roles and...

Words: 1377

Pages: 5

Views: 134

What is Team Learning?

Teamwork is becoming paramount in organizations to achieve their objectives, but there are concerns that collaboration may limit individuals from reaching their career goals. Most teams are based on ensuring that a...

Words: 408

Pages: 1

Views: 199

What is Gentrification? Causes, Effects & Solutions

Gentrification refers to the conversation of farm buildings to dwelling places. The wealthy people mostly do gentrification by moving in from the outside community leading to the rise of the socio- economic status of...

Words: 293

Pages: 1

Views: 126

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration