Assignment Document

Cyber Crime - Privacy Aspects

Pages:

Preview:


  • "RUNNING HEAD: PRIVACY ASPECTS1Privacy AspectsStudent NameUniversityInstructor Name RUNNING HEAD: PRIVACY ASPECTS2Privacy AspectsWith the growth of internet and information technology, most of the assets are convertedinto digitalized form. This impli..

Preview Container:


  • "RUNNING HEAD: PRIVACY ASPECTS1Privacy AspectsStudent NameUniversityInstructor Name RUNNING HEAD: PRIVACY ASPECTS2Privacy AspectsWith the growth of internet and information technology, most of the assets are convertedinto digitalized form. This implies that the important information and resources such as creditcard information and other personal details are present online. Everyone has access to the onlineworld, and it creates issues such as privacy and security of personal information (Sicari, 2015). Most of the organizations are using cloud computing these days, where many tenantsutilize the shared cloud resources according to their usage. Here, the risks of privacy increases asmany users are using the same set of resources. It becomes the primary responsibility of thecloud service provider to use such technologies so that the user’s data remains private andprotected. These days banking, healthcare, and other important services are accessed through theinternet and this suggests that the sensitive personal details are present online (Sadeghi, 2015). Privacy is the capability to protect one’s information from the others. For example, if anemployee is suffering from cancer then he has the right to keep this information confidential andnot make it to public as it may affect his job prospects. Privacy is very important as it may revealpersonal details of people which can result in losing of name, fame, and money (Abomhara,2014). Yes, the law affords privacy expectations for computer/network / Internet users. Differentprivacy laws are defined which are used to provide the guidelines that deal with managing, usingand storing the personal information of the users. For example, for protecting the privacy of thepatients using health care services, HIPAA privacy act is followed (Solove, 2015).RUNNING HEAD: PRIVACY ASPECTS3In case, a person is willing to share all his details on the internet without taking anyprivacy measures then he cannot expect any privacy. For example, if a person is posting hisevery detail on social media such as Facebook and Twitter then he cannot expect any privacybecause he is making his information public."

Related Documents

Start searching more documents, lectures and notes - A complete study guide!
More than 25,19,89,788+ documents are uploaded!

Why US?

Because we aim to spread high-quality education or digital products, thus our services are used worldwide.
Few Reasons to Build Trust with Students.

128+

Countries

24x7

Hours of Working

89.2 %

Customer Retention

9521+

Experts Team

7+

Years of Business

9,67,789 +

Solved Problems

Search Solved Classroom Assignments & Textbook Solutions

A huge collection of quality study resources. More than 18,98,789 solved problems, classroom assignments, textbooks solutions.

Scroll to Top