Identity thieves because you have a large online presence

Assignment Help Computer Engineering
Reference no: EM132388816

Question: Delete yourself from the internet (is it possible and how it can be accomplished?)

Do you feel you are vulnerable to hackers or identity thieves because you have a large online presence? Have you ever thought of removing your personal data from the net? Well, it's not quite as simple as it should be. There are a few easy-to-follow steps that should point you in the right direction that can be found online, but the story does not end there. How can you make sure your personal information or financial data will not be exposed on sites that do not have your written permission? Is it possible to completely remove yourself from the web?

Facebook's practices were under scrutiny when it was revealed that the data of more than 50 million Facebook users found its way into the hands of UK-based Cambridge Analytica, which reportedly used it to better target political ads for the Trump campaign during the US 2016 presidential election.

The more troubling aspect of the story is that your personal data on these free services is often somewhat exposed because you opted-in to all sorts of onerous provisions when you first signed up for these "free" services. That's exactly why some users are choosing to completely delete or deactivate accounts when and where possible.

So, how can deleting yourself from the internet prevent these companies from acquiring your information? Some say there is no sure way to completely remove your information, but there are ways to minimize your online footprint, which would lower the chances of your data getting compromised.

Project Plan

In this case project, we will determine the many options and the companies that collect your personal information. They're called data brokers and they have names like Spokeo, Whitepages.com, PeopleFinder, BeenVerified, as well as plenty of others.

1) In addition to the sites named above, list 5 additional agencies you find that collect this type of personal data. Hint: Many claim to be marketing agencies.

2) Provide a list of the companies that you find that claim to be able to remove your personal information from the data broker sites and the methods they use to delete this information.

3) Write a report on these findings with a step-by-step written summary of the processes and the methods discovered.

Reference no: EM132388816

Questions Cloud

How can the dark web be used in a positive way : Write a brief Discussion on the following topic: How can the Dark Web be used in a positive way? How can be used by law enforcement and the intelligence.
Why is an impartial third-party so important : Why is an impartial third-party so important in conflict assessment?
Describe a culture or diversity-based conflict : Describe a culture or diversity-based conflict? What made it culture-based?
Hardest thing about communicating during a conflict : What in your view is the hardest thing about communicating during a conflict?
Identity thieves because you have a large online presence : Do you feel you are vulnerable to hackers or identity thieves because you have a large online presence? Have you ever thought of removing your personal data.
Provide a full analysis of the reasons : Provide a full analysis of the reasons there are an increasing number of mergers with companies in different industries?
Define what is meant by outsourcing : Explain how Peter Drucker's statement about how one company's back room is another company's front room pertains to outsourcing. Use an example.
Write a brief topical description of information : Provide a written example of a cloud computing topic in a brief topical description of information (1-2 pages) double spaced that shows in-text citation.
Enhance or hinder a boundary-less organization : Does the "Google effect" enhance or hinder a boundary-less organization? In what ways?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd