StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

About privacy and confidentiality in social applications - Essay Example

Comments (0) Cite this document
Summary
The paper therefore reviews past literature through a secondary research approach. The methods and results of past literature on the issue of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
About privacy and confidentiality in social applications
Read TextPreview

Extract of sample "About privacy and confidentiality in social applications"

Download file to see previous pages Legal frameworks and ethical standards of various nations protect the interests of the users of social applications such as search engines and wikis in regard to their privacy and confidentiality of personal information. This includes protection of user information from unauthorized access, use or sale of confidential data by hackers. The designers and administrators of social applications are therefore mandated to ensure that private data on users is treated with utmost confidentiality. Regardless of this, the privacy and confidentiality of user information has been infringed by being exposed to unintended or unauthorized parties and used for unintended purposes by system attackers. This essay gives a critical analysis and discussion of the privacy and confidentiality of data and information within social applications including blogs, social networking applications, blogs and wikis. The paper includes a comprehensive review of literature with an aim of giving a background analysis of the research on the topic. Past literature within journals, conference and workshop papers are analyzed including the methodologies used by the investigators on confidentiality and privacy within social applications. The proposed approach for an investigation into the privacy and confidentiality of data within social applications is also presented within this essay. The paper is based on the assumption that the breach of privacy and confidentiality of users is the greatest challenge that is facing social applications.
Surveys on privacy and confidentiality within social networking applications and text chats reveal that these two aspects are considered to be an ethical standard and the recognized around which the development, maintenance and use of social applications should be based (Belanger & Crossler, 2011). Qualitative studies on legal frameworks and regulations on privacy and confidentiality reveal that these aspects are considered as one of ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“About privacy and confidentiality in social applications Essay”, n.d.)
About privacy and confidentiality in social applications Essay. Retrieved from https://studentshare.org/miscellaneous/1609540-about-privacy-and-confidentiality-in-social-applications
(About Privacy and Confidentiality in Social Applications Essay)
About Privacy and Confidentiality in Social Applications Essay. https://studentshare.org/miscellaneous/1609540-about-privacy-and-confidentiality-in-social-applications.
“About Privacy and Confidentiality in Social Applications Essay”, n.d. https://studentshare.org/miscellaneous/1609540-about-privacy-and-confidentiality-in-social-applications.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF About privacy and confidentiality in social applications

The Fact about UK Chocolate Market

Chocolate is the UK’s favorite impulse snack. Consumer’s eating habits and lifestyles are constantly changing as people due to busy life schedules depend mostly on chocolates and short snacks to make up for missed meals. Even though few have concerns and awareness about sugar and fat in chocolate, they regard it to be an affordable daily treat. Women play a major role in the chocolate market as they are the largest purchasers of chocolates either for home consumption or for giving the gift. The most remarkable fact about the UK chocolate market is that people over 55years of age consume chocolate worth 700 pounds every year, which accounts to be 21% of the total chocolate consumption.

For a new chocolate bra...
9 Pages(2250 words)Case Study

Social Networking & Web Marketing

Furthermore, they offer a richness of communication that was possible through desktop applications (Lewis, 2010; Wamelen & Kool, 2008).
According to OReilly (2005), the Web 2.0 systems are developed by modern programmers by means of development of structures like that Ruby On Rails (this was developed for the programming language Ruby) as well as Django (intended for the programming language Python). In addition, the programming for web 2.0 also comprises the families of technologies similar to AJAX. For web 2.0, the technology developers support dynamic languages as they facilitate fast debugging, development as well as the deployment of the new web. On the other hand, the compiling of static languages needs additional t...
6 Pages(1500 words)Literature review

Using Law for Social Workers

The involvement of social work in society has always said to be highly contested. During recent years it has been seen that there is an unvarying attack on its ethics and values. Managerial controls have been increased a lot in social work and it has affected a lot at all levels of autonomy among social workers. This has bought some sort of crisis in the social work department. “The relationship between law and social work is complex.” (Brayne & carr 1). There are two facts to criticize this. The first one is these social workers are created by the government and are meant for public service and also to regulate various activities. A second obsession is these social workers are always very caring professionals. The...
7 Pages(1750 words)Assignment

Enterprise Information Security and Privacy

The PCI DSS was created primarily created by Master card and Visa but later on, we're joined by three other premium credit card companies to form an independent council to counter online credit card fraud. The American Express, discover financial services and JCB were the three other companies that decided to take an active part in the stand taken by Visa and MasterCard. To understand the effectiveness of PCI DSS it becomes crucial to understand its core functionality and the reasons it was devised. The objective of PCI DSS is to build a secure network, protect cardholder data, maintain a vulnerability management program and implement strong access control measures (Wright .2008.Page11). In today’s time when security has bec...
6 Pages(1500 words)Assignment

What Is So Valuable about Strategic Planning

It is concerned with the assessment of the background on which the business operates to understand the best actions that can assist in accomplishing the organization’s long term objectives and overall mission (Nolan, et al. 2008).
The strategic plan acts as the basis for the organization’s activities. It is important for successful operations for the business. The development of the techniques for management is usually based on the strategic plan. In the products and services business, the strategic plan will assist in maintaining competitiveness despite the existing competition. This is because all the actions will be carried out after a careful analysis carried out while developing a strategic plan. It sets out...
6 Pages(1500 words)Essay

The Social, Cultural and Political Consequences of Globalization in KSA


Globalization is considered to be the interconnectedness developed by the increased flow of capital, goods, images, people and their ideologies among various nations. It is the result of the free-market policy of the world economy. It is characterized by the introduction of new technologies and considers humanity to be one social community where social and cultural differences do not exist. Philip Cerny has defined the term as a set of economic and political structures which is the outcome of change in characteristics of goods and assets constituting the economy.

Cultural and social globalization denotes the extensive movement of goods, technologies, ideas, images and people around the entire world which has been...
6 Pages(1500 words)Coursework

Stereotyping: Social Psychology

There are different ways in which stereotypes, as depictions of groups, and stereotyping as an activity, have been built and comprehended within modern social psychology. These different theoretical paradigms include the leading social cognitive tradition, which shows stereotypes as cognitive schemas that make reality easy to understand. This means that the usage of stereotypes is a key method through which individuals simplify their surroundings; since they facilitate in reducing the amount of processing, that is, thinking that individuals have to do when meeting a new person or faced with a novel situation. Another theoretical paradigm is the self-categorization theory, which demonstrates stereotypes as psychologically...
7 Pages(1750 words)Article

Economic and Social Impact of Globalization

Global corporations are heightening their awareness of the nature of their business relationships with diverse governments considered of primary importance to manage factors influencing their performance. From among the elements that global organizations closely and continuously evaluate, the social and economic impacts are considered of significant importance. As the components and diverse perspectives of globalization affect both the host organizations and those nations they do business with, this research aims to proffer significant social and economic issues that impact global strategies.

The concept of globalization encompasses theories beyond the traditional view that global corporations merely do business abroad....
7 Pages(1750 words)Coursework

Analysis of Documentary about Jerusalem

The documentary is historically accurate and generally fair. There is a lot of room for error, but Jennings is careful to present a balanced perspective.

Religion clearly plays a dramatic role in the Middle East. The truth is that nationalism also plays a huge role. The conflict has a long and bloody history and many people have tried and failed to solve it before. Nothing new has happened in the last few years to make it any easier to solve. In fact, some things have gotten quite a bit worse. There is little visionary leadership available on either side. As things stand now, it is unlikely this conflict will be resolved. The two sides are intractably opposed to one other. Furthermore, the Arab world is poorly developed...
6 Pages(1500 words)Assignment

Social Networking Sites and Their Impact on Us

ng the developments and innovation in different ICT fields like computers and the internet, telecommunications and mobile telephone, mass media, traveling facilities and many more.
ICT has very strong and direct impacts on human development and society. It not only serves the society as a whole but also tends to improve and develop the individual position of the people. There are several aspects of human and social lives that are facing the ICT effects. ICT developments are reshaping the cultural values of societies. ICT does a lot of beneficial functions for the mental growth of humans. It facilitates the people to communicate in better ways, develop good understandings about different things and have deep knowledge and inst...
6 Pages(1500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic About privacy and confidentiality in social applications for FREE!

Contact Us