How can you trust that this information is being placed

Assignment Help Computer Engineering
Reference no: EM133368959

There are many issues of cyber breaches concerning security and privacy we encounter in various circumstances every day. The one that has recently stood out to me the most is location tracking. We all get on many apps and websites, whether on our phones or computers that would like for us to share our location to make sure they can supply us with the best service so and so. But how can you trust that this information is being placed in the proper hands and secured?

A lot of fo companies utilize location tracking such as shopping and many social media sites for them to connect you with your area. Yes, the site may have pure intentions, but you never know when that network can undergo an attack and this personal information can be exploited into the wrong hands.

Location tracking is a huge invasion of privacy. It's something we do with our families but with strangers brings about another fear. When you use many of these applications they ask your permission to use these tracking methods to personalize the site to your liking to fit your needs, this is beneficial to their marketing strategy to make sure they supply us with the best experience.

Google just suffered from a 391.5 million settlement with 40 states concerning their company tracking users' locations. The company was using the location data to target the consumers with specific ads that fit their daily activities. Google violated its policy by violating state consumer protection law. They didn't supply users with a detailed statement on what location information was being exploited when and to whom. Google mislead their users thinking that once they turn their location off they are somewhat invisible which wasn't the case and resulted in a huge lawsuit with 40 states and Arizona was the first to file against Google 2020.

Location privacy is a big part of a person. You never know who is exactly behind these devices it could be our children and once they get on these trusted websites that everyone uses every day and think they are secure are pretty scared. A site that has been around for a while that many have used is exploited for not protecting users' location and misleading them at that.

Reference no: EM133368959

Questions Cloud

Would you like to convert another measure : Make main program in C++ that calls the function ConvertToFootInchMeasure. The program should continue to ask the user for measures to convert
Oligarchy masquerading as democracy : How did the government of the Roman Republic work? Was the Roman Republic democratic or just an oligarchy masquerading as a democracy?
Works of art have both form and content : Works of art have both form and content. In this statement, form refers to visual characteristics, while content means ____.
Describe what this was and why it occurred : Describe what this was and why it occurred. You can use technical jargon and assume the reader understands the basics of blockchains and consensus mechanisms.
How can you trust that this information is being placed : how can you trust that this information is being placed in the proper hands and secured?
How much did the money supply measured as m2 increase : By how much did the money supply measured as M2 increase between February 2020 and April 2020? Please utilize FRED's M2 (Monthly, in Billions of Dollars
Calculates and displays amount of dollars paid : Calculates and displays amount of dollars paid for each grocery, with fractional digits. The format and the spaing of the output should be similar to the sample
Identify and explain two organisational policy changes : Identify and explain two organisational policy changes in a typical retail company reflecting current developments in the credit management sector. (Australia)
Portraiture serves important roles in ancient art : Portraiture serves important roles in ancient art, but almost universally, it serves to create the presence of the person.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write about attack indicating what type of hack was involved

Use the Web to search for examples of hacks that made the news. Write a brief description of the attack indicating what type of hack was involved. Cite sources.

  What is a real-world example of how an application developed

What is a real-world example of how an application developed for a uniprocessor can impact the performance of executing the same application on a multiprocessor

  Is np closed under complement

Is NP closed under Complement ? In P , we can prove that it is closed under Complement. Why doesn't that analysis work for NP ?

  Cloud computing management

As we selecting Google Docs as the SaaS provider Proper actions are to be upheld when handling Google Docs servers as the software service providers. This is a challenge posed from several grounds, starting from its vulnerability to hacking and ea..

  Difference between systems analysis and systems design

What is the difference between systems analysis and systems design? What is the difference between architectural design and detail design

  Research results that multiple organization have experienced

Read the case study titled, "Why Does Cryptographic Software Fail? A Case Study and Open Problems," original article. Use the Internet to research.

  What reviews would be planned and the schedule

design a Quality Assurance Plan for the project (Keep the QA Plan at about 11 pages or less).What reviews would be planned and the schedule.

  Calculate the average stock price stored in the prices array

Create a Program that will calculate the average stock price stored in the prices array.

  What is time estimate

How does an estimator arrive at a time estimate for a particular task.

  How course research has connected within your own career

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines.

  Write a program in assembly language

CSMT 2003 University Of Chicago Write a program in assembly language which will find the sum of the whole numbers from 20 through 40, inclusive

  Discussing electronic innovation and the government

Discussing electronic innovation and the government. Complete review of the article by writing a two or three page overview of the article.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd