StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Privacy in Cyber Space - Essay Example

Cite this document
Summary
The use of basic services such as email, chat and web-surfing is now a part of our daily routine and we normally take them as very normal to our day to day chores. Despite the many benefits of using the internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Privacy in Cyber Space
Read Text Preview

Extract of sample "Privacy in Cyber Space"

Download file to see previous pages

The use of Internet as a basic mean of corporate usage has now become a critical business activity and therefore needs to be well-monitored as part of the important resources of any company (Cobb, 2002). However, the internet has also been of significant advantage to us in many ways. Where many of its services have benefited us in numerous ways, the email has had a significant character, besides other uses, in the commerce and trade sector. Email has proved to be the information and communication “Backbone” in most of the organizations (ColdSpark, 2007).

It has been successfully used to facilitate the day to day business activities & processes, shared working environment, document transfer, corporate communication (both internal and external) and memorandums. According to the statistics, more than 35 percent of critical business information is found in companies is transferred via emails. Such a high figure means a high stance of dependency on the email service(s) and thus the nature of the content that is being transferred through these emails has actually forced many organizations to re-evaluate the significance of managing the email throughout its whole lifecycle. (ML Inc., 2008) Traditionally, the common practice was to retain the backup of all emails as per the IT department’s needs and cost factor.

Now the environment has changed and therefore we need to manage this service as a strategic resource to take the best out of it. Email is considered now as a formal means of communication for any company, specially in a healthcare organizations where patients’ reports are treated with utmost confidentiality, which is no different from the traditional way of distributing the corporate information on the companies’ official letter head. This means that organizational or corporate emails are also bounded to abide by legal obligations of the state.

Understanding the whole process of the collection,

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Privacy in Cyber Space Essay Example | Topics and Well Written Essays - 1000 words - 1”, n.d.)
Privacy in Cyber Space Essay Example | Topics and Well Written Essays - 1000 words - 1. Retrieved from https://studentshare.org/miscellaneous/1544224-privacy-in-cyber-space
(Privacy in Cyber Space Essay Example | Topics and Well Written Essays - 1000 Words - 1)
Privacy in Cyber Space Essay Example | Topics and Well Written Essays - 1000 Words - 1. https://studentshare.org/miscellaneous/1544224-privacy-in-cyber-space.
“Privacy in Cyber Space Essay Example | Topics and Well Written Essays - 1000 Words - 1”, n.d. https://studentshare.org/miscellaneous/1544224-privacy-in-cyber-space.
  • Cited: 0 times

CHECK THESE SAMPLES OF Privacy in Cyber Space

Cyber Threat in a Finance Organisation

The report 6 Chapter 2: Identity Fraud in cyber space 6 Chapter 3: Are there enough safeguards?... This paper “cyber Threat in a Finance Organisation” will try to shed light on pertinent issues regarding identity fraud in the financial organization through cyberspace.... Identifying the loopholes in the existing regulatory framework for cyber crime will be the essence of the second part of this report.... In the final part, the paper will try to recommend a viable solution which can at least decrease the magnitude of cyber threat in terms of identity fraud for financial organizations....
12 Pages (3000 words) Essay

Freedom of Speech and Internet Privacy

The differences between existence in one's physical space and cyber space have been disputed for a while; many are skeptical about the extent of control that authorities have in cyber space, as they feel that their privacy is being undermined.... It would also mean that privacy and security is only limited to the physical space that people live in and cannot be extended to cyber space.... om, Msn My space, Facebook, etc.... Cyberspace needs to be treated as an extension of the very space we live and trade within (Speed & Ellis, 2001, 238-240)....
7 Pages (1750 words) Report

What Is Media Law

“It is less a distinct field of law in the way that property or contracts are as it is an intersection of many legal fields, including intellectual In spite, cyber law tries to integrate the problems caused by individual actions in the cyber space with better set of laws prevailing in the societies....
3 Pages (750 words) Essay

Cyber Security and Business

In addition, cyber security is important to the functioning of safety essential systems like the response to an emergency and to the guard of the government's infrastructure systems.... The private sector has been opposing governments efforts to impose stricter regulation of cyber security but it is of great significance to protect the telecommunication sector and electric grid that is in the hands of the private sector.... Such a situation will leave the United States of America infrastructure exposed and vulnerable in case of cyber war with its enemies (Kirby n....
6 Pages (1500 words) Term Paper

Role of Social Media on Cyber Stalking

They encroach on the private, virtual space or other peoples timeline on social media leading to sexual harassment.... The paper "Role of Social Media on cyber Stalking" highlights that as much as Facebook, Twitter and Instagram let others connect and share ideas socially through technology, cyberstalking is treated as a crime because the victims feel intimidated and insecure by the actions of the perpetrators.... Most of them upload photos and videos of other people making cyberstalking occur in both non-consensual and sexual fashions, and this leads to an invasion of the individual's privacy....
4 Pages (1000 words) Case Study

Cyber Crimes and Security on the Internet

This space is commonly referred to as cyberspace and is not affected by any geographical or physical barrier (Hofman, 17).... The paper "cyber Crimes and Security on the Internet" seeks to discuss various issues related to cybersecurity as well as to provide suggestions as to what can be done the curb these critical issues....
8 Pages (2000 words) Research Paper

Cyber Crime: Investigating Cyber Terrorism

"cyber Crime: Investigating cyber Terrorism" paper looks at cyber Terrorism in detail.... cyber terrorism refers to the use of Information Technology-based attacks in terrorist activities.... nbsp;… Besides the international challenges of investigating and prosecuting cyber terrorists, social media also has posed a real challenge in the investigation and prosecution of cyber terrorists....
10 Pages (2500 words) Coursework

Social Safety in the Real World and Cyber World

nbsp; Social safety in the digital era is an expansive undertaking since most citizens in different states are no longer participating “terrestrially” in the enforcement of laws, but are in “the third space” the internet, which falls outside the historical-geographical boundaries (Hughes, 2007).... Cybercrime though it occurs in the digital space, the consequences have an impact on real people and that is why online communities need to have a say in the condemnation of such kind of behavior....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us