We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Personal information shared on internet- risk or no risk - Essay Example

Comments (0)
Summary
The digital world is pushing an increased number of people into second lives. The masses have to battle with privacy of their information, as…
Download full paper
GRAB THE BEST PAPER

Extract of sample
Personal information shared on internet- risk or no risk

Download file to see previous pages... For example, information shared involves personal photos taken from smartphones and computers that are GPS embedded allowing other people to determine the individual’s location. Essentially, fraudsters and kidnappers can easily use this kind of information to locate where the owner resides, kidnaping them, and asking for ransom.
On the other hand, computer hacking involves infringement on the other peoples privacy and cause destruction of computer-based software, files and, website pages. The hackers have the belief that sharing information is paramount. Hence, it is their ethical duty to facilitate the process of sharing information. The hackers also have a conviction that system cracking is fun. Therefore, exploitation is ethically acceptable. They hold that so long as they have not committed theft or vandalism, the practice is reasonable. Many dangers prevail in the privacy issues. Such dangers include data misuse, unauthorized access to information, child safety risks and bullying, and harmful psychological impacts of OSNs. Despite the dangers associated with internet platforms, people still disclose massive quantities of personal information, which is a risky behaviour.
Boyd (2007, p.20), argues that OSNs are public networks with four main properties that do not embrace face-to-face communication, public life, replicability, diligence, searchability, and unseen audiences. These social dynamics in this context are fundamentally different and sophisticate the manner in which people interact. Although the OSNs all have online interfaces that aim for interactions and common communications, patterns of usage and specific goals, differ across varied services (Acquisti and Gross, 2006, p.36). Acquisti and Gross (2006, p.37), note that the commonly used models depend on the presentation of the contributors profiles. They also rely on visualization of the network to others and location of ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Risk Management
We can identify how effective the risk process was and what possible outcomes could happen and nothing could identify all this issues like scenario base evaluation, would be essential to complete the risk plan and look at all possible outcomes from both business or client aspect.
40 Pages(10000 words)Essay
Risk Assessment
Risk for individual occurrence is measured as a function of relevant statistics and data pulled from child advocacy studies and current media. The resulting data shows that privacy concerns are the most likely to occur with cyber bullying, identity theft, and sexual exploitation rounding out the list.
5 Pages(1250 words)Essay
Managing information risk and security
However,as much as it has fared sophistication in this knowledge-based economy,organizations have likewise put up imperative measures to safeguard critical IS assets from system abuse and misuse by constantly upgrading and installing firewalls,anti-virus,use of encryption keys,protectors,use of comprehensive monitoring system
17 Pages(4250 words)Essay
Information Risk Management
Human beings make use of various methods to protect themselves from these risks. Due to the improvement and advancement in the technology the risk has taken various forms. These technical advancements have improved the way people look at risks. The existing society is considered to be the one with plenty of risks.
14 Pages(3500 words)Essay
Information System Risk Management
As a result of the implementation of an ERP by an organization, the security risks of the organization are increased due to their nature of implementation where different modules are intergraded together in order to achieve the organization mission. Risk management is a strategic issue in the implementation of ERPs systems in any organization.
7 Pages(1750 words)Essay
Information System Risk Management Paper
The value of the computers and the IS is well recognized not just by the managers and executives. It has also not escaped the attention of hackers and cyber-criminals who attempt to damage the system and
6 Pages(1500 words)Essay
Risk investment in Construction industry
This paper will review systematic management approaches to risk. It discusses the allocation of risk and suggests that risk needs to be identified and managed early in
40 Pages(10000 words)Essay
Risk
The actual meaning of the word ‘risk’ is difficult to explain despite the different definitions by different scholars as in their definition risk meant different things in their situation. It is worth noting that risks and
6 Pages(1500 words)Essay
Risk
Any single member’s complaints against procedures adopted in conducting the group’s affairs is taken seriously and consideration and acted on to minimize dissonance. Consideration of member’s views increases assonance in the group. A self-aware team, therefore,
1 Pages(250 words)Essay
Personal Health Risk
The presence of many manufacturing plants like Pepsi cola factory explains the high level of toxins in my locality. The release of toxic air pollutants from the industries into the environment can be through air, water, or land. FRITO-LAY INC released 347 lbs of toxins through the air (EPA, 2015).
2 Pages(500 words)Essay
Let us find you another Essay on topic Personal information shared on internet- risk or no risk for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us