Security and privacy on the Internet - Research Paper Example

Comments (0) Cite this document
Notions of Security and Privacy on the Internet Your Name Your College/University Notions of Security and Privacy on the Internet The revolutions in communication and relationships caused by the worldwide shift to utilizing the resources provided by the internet pose unprecedented and special kinds of ethical issues…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Security and privacy on the Internet
Read TextPreview

Extract of sample
"Security and privacy on the Internet"

Download file to see previous pages Individuals generally assume that such information is kept secret by the websites and resources that they entrust with these details; however, data mines like those on the internet can easily be manipulated and used such that compromising information can be turned over. The roles of organized parties in the relationship between individual data provider and collectors of data are not as clear as they should be. For example, one might wonder what the role of internet service providers are, or what the government’s role is, or what the websites themselves are obligated to do in these circumstances. Although these other parties may, in fact, have a role in ensuring internet privacy and security, ultimately the responsibility lies on the part of the individual person or entity in protecting his or her (or its) information. In terms of the government’s role in regulating for internet privacy and security, it seems that the United States has not lived up to the international standards of privacy protection and comprehensive regulation, which creates a logistical problem for managing the use and abuse of internet resources between borders. Although new laws have started to address issues such as children’s privacy, financial privacy, and medical privacy, “privacy and security regulations related to the internet are likely to be issues in the future” (Hiller, 2010, p. 263). Clearly, the government perceives for itself a role in managing the privacy and security concerns of a dynamic technological environment. Understandably, this role ought to be kept at a minimal stage, given the inability of governments to react fast enough to changes in technology. A more relevant perspective for understanding the roles of the parties involved in internet privacy and security is analyzing individuals from the perspective of psychological research. Psychology plays a central role in the issue of privacy because of social attitudes toward the prospect of an individual self, which entitles individuals to a certain degree of space from others (Buchanan, Paine, Joinson, & Reips, 2007, p. 157). In addition, this separation of the self from others trains people, in general, to avoid disclosing personal information about themselves, particularly because this information might be useful in an ever-connected society that modern people live in. For instance, something as mundane as a routine eye exam, if discovered by an employer by some means that violated its employee’s privacy, could be used to raise that employee’s insurance premiums through the company fund and thus causing him a disadvantage. Of course, the value of privacy differs from person to person but generally as a society, people tend to agree that privacy is a concern when it comes to dealing with interactions online (Buchanan, Paine, Joinson, & Reips, 2007, p. 160). This kind of attitude is ever more prevalent amongst older generations, who treat their private information as secrets. According to Reeves, Rowe and Gallaher (2007), a better solution when compared to putting individual interests wholly in charge of managing their online privacy and security or entrusting that responsibility to the government is giving some responsibility to internet service providers (ISPs). Some companies that provide internet services to thousands or millions of customers are, according to this report, responsible for making sure privacy is secured. While it is ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Security and privacy on the Internet Research Paper”, n.d.)
Retrieved from
(Security and Privacy on the Internet Research Paper)
“Security and Privacy on the Internet Research Paper”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Privacy and Internet Policy
.... The threat in this case is that personal data is collected and certain companies sell this information to other firms without the consent of consumers. Thus, the internet exposes individuals to the threat of leaking their private information. Therefore, protecting consumer data is a significant concern while using the internet for various purposes. Though all companies have a privacy statement, explicitly given on their websites, one cannot rule out the possibility that “existing privacy enhancing technologies fail in the event of a vendor operating against their stated privacy policy, leading to loss of customer privacy and...
7 Pages(1750 words)Research Paper
Privacy and Internet Policy
...of systems; this has been the case for websites too. Due to the chances of access by unauthorized agents, websites often develop web privacy policies. Internet policies can be used by a number of bodies ranging from companies and schools to web based sellers and vendors. Regardless of how dedicated or vaguely controlled the web servers, the level of risk that these bodies are exposed to and their adherence to an Internet privacy policy is not the same. If companies do not observe a concrete security system for the protection of information, then the gap between the intended level of security and identity theft protection system is...
4 Pages(1000 words)Essay
Privacy & Security
...attacks by hackers, impacts of social networking sites if they misuse information or not provide correct security measures. Solutions and suggestions section discuss the solution of issues related to data privacy, SNS impacts and online attacks in order to steal the confidential information of employees. 1 Introduction The Internet continues to modernize the world’s economy. It is apparently changing the way people live, study, work, participate, and devour. At the hub, of this rebellion is technology. Technology has moved from the "back office" to the leading edge. Namely, the interface between customer and the organization has changed spectacularly. Increasingly, technology is shifting...
26 Pages(6500 words)Essay
Privacy and Internet Policy
.... Further, take a caution of not using the same password to access all your accounts. According to Gina (2011), the network administrators are supposed to ensure that the network of the company is protected. This is done by following the important rules that are set so as to offer maximum security level and protecting the confidential section of the company. Analyze protection of identity theft both on the internet activities, authorized access and its application to use of the Internet to maintain both privacy and compliance with an Internet use policy. A person using the internet has to ensure that his or her identity is not stolen by...
5 Pages(1250 words)Essay
Internet Privacy monitoring of email and web usage by ISPs or the government for security purposes. Government, security agencies all have the right to accessing information over the internet. It often becomes the matter of security not just for an individual but for the whole nation as well. For them it is extremely crucial and also the matter of life and death to have access to information and find criminals and terrorists. However various laws are in place for internet privacy and more are being formulated as vulnerability constantly increases online. Activities that reveal personal information online: 1) Signing up for an ISP: Every person is...
8 Pages(2000 words)Research Paper
Internet Privacy
...? (Teacher’s Internet Privacy is Necessary (For the audience unsure about internet privacy) Aaron Olson, a Minnesota man, took his uncle Randall Labrie to court on the charge of harassment after Labrie posted in Facebook Olson’s childhood photos taken in front of a Christmas tree. The Minnesota district court judge Natalie Hudson threw out the case as silly, for no harm was done to Olson by the posting of the pictures. At the other end, last year, fraudsters emptied the bank account of a close friend of mine because one of the firms with which he had to share his personal information online to obtain services had passed it to the fraudsters. Faced with such cases, people...
3 Pages(750 words)Essay
Internet Security this modern generation and have been an improvement from the time the internet was introduced. This paper looks at a form of web security known as the network layer security. There are different layers of communication, which have different stratums of communication and they contain different and unique security challenges. This form of security also known as the layer 3 in the OOSI model is mostly vulnerable for many denials of service attacks and information privacy problems. There are several protocols, which are used in this network layer commonly known as internet protocol (Blaze et al, 1996; Blaze et al,...
5 Pages(1250 words)Essay
Internet Privacy --private individual some individuals who have no qualms about destroying the lives of other people. In this regard, this paper discusses and tackles the important issues involved in Internet privacy of individuals. a) Background – the rapid spread of Internet use due to lower broadband connections had led to problems regarding the issue of privacy and security in the Web space (Hora, 2008:91). Incidents of identity thefts are on the rise, despite the development in Internet security Style and modus of Internet hackers had also evolved markedly (Poulsen, 2012:5). Rise of Internet-enabled transactions such...
3 Pages(750 words)Essay
Internet Privacy
...Internet privacy. College: Internet security involves aspects of internet privacy and set up. Such privacy is guarded by terms and policies of information creation, ownership and rights to intellectual property. Internet access uses network set up in various settings such as home, office or work. For work places, internet privacy encloses staff and third parties that may be invited by the firm or allowed to access internet by that firm. Public place internet such as library is accessible through provisions created by such bodies. Home...
1 Pages(250 words)Essay
Internet privacy
...INTERNET PRIVACY Introduction Internet privacy is a growing concern in modern society with the proliferation of social media platforms. Although people acknowledge that whatever they post on these sites may be public, many do not know that user information is also becoming easily accessible to others. Overtime, the social media platforms have made more changes to their privacy policies making this important information accessible for companies so they can use it for their own purposes. Public awareness is continually being made on matters such as cyber security, hackers, viruses, firewalls and Trojan horses in order to protect the public from unwanted exposure of private information. People are encouraged to ensure timely update... of their...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Research Paper on topic Security and privacy on the Internet for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us