How can you trust that this information is being placed

Assignment Help Computer Engineering
Reference no: EM133368959

There are many issues of cyber breaches concerning security and privacy we encounter in various circumstances every day. The one that has recently stood out to me the most is location tracking. We all get on many apps and websites, whether on our phones or computers that would like for us to share our location to make sure they can supply us with the best service so and so. But how can you trust that this information is being placed in the proper hands and secured?

A lot of fo companies utilize location tracking such as shopping and many social media sites for them to connect you with your area. Yes, the site may have pure intentions, but you never know when that network can undergo an attack and this personal information can be exploited into the wrong hands.

Location tracking is a huge invasion of privacy. It's something we do with our families but with strangers brings about another fear. When you use many of these applications they ask your permission to use these tracking methods to personalize the site to your liking to fit your needs, this is beneficial to their marketing strategy to make sure they supply us with the best experience.

Google just suffered from a 391.5 million settlement with 40 states concerning their company tracking users' locations. The company was using the location data to target the consumers with specific ads that fit their daily activities. Google violated its policy by violating state consumer protection law. They didn't supply users with a detailed statement on what location information was being exploited when and to whom. Google mislead their users thinking that once they turn their location off they are somewhat invisible which wasn't the case and resulted in a huge lawsuit with 40 states and Arizona was the first to file against Google 2020.

Location privacy is a big part of a person. You never know who is exactly behind these devices it could be our children and once they get on these trusted websites that everyone uses every day and think they are secure are pretty scared. A site that has been around for a while that many have used is exploited for not protecting users' location and misleading them at that.

Reference no: EM133368959

Questions Cloud

Would you like to convert another measure : Make main program in C++ that calls the function ConvertToFootInchMeasure. The program should continue to ask the user for measures to convert
Oligarchy masquerading as democracy : How did the government of the Roman Republic work? Was the Roman Republic democratic or just an oligarchy masquerading as a democracy?
Works of art have both form and content : Works of art have both form and content. In this statement, form refers to visual characteristics, while content means ____.
Describe what this was and why it occurred : Describe what this was and why it occurred. You can use technical jargon and assume the reader understands the basics of blockchains and consensus mechanisms.
How can you trust that this information is being placed : how can you trust that this information is being placed in the proper hands and secured?
How much did the money supply measured as m2 increase : By how much did the money supply measured as M2 increase between February 2020 and April 2020? Please utilize FRED's M2 (Monthly, in Billions of Dollars
Calculates and displays amount of dollars paid : Calculates and displays amount of dollars paid for each grocery, with fractional digits. The format and the spaing of the output should be similar to the sample
Identify and explain two organisational policy changes : Identify and explain two organisational policy changes in a typical retail company reflecting current developments in the credit management sector. (Australia)
Portraiture serves important roles in ancient art : Portraiture serves important roles in ancient art, but almost universally, it serves to create the presence of the person.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd