Question

In: Computer Science

You have been asked to give a speech at a conference relating to your own personal...

You have been asked to give a speech at a conference relating to your own personal concerns about privacy issues in cyberspace. Your speech should focus on one (or more, if you prefer) of the following topics that relate to privacy:

  • Phishing

  • Identity theft

  • Workplace monitoring

  • Social networks and privacy

  • Organizations collecting information about Web browsing behaviors (big data)

  • Privacy versus national security issues

Make the speech somewhat personal, speaking in the first person, about your personal concerns and reactions to the privacy issue (or issues) that you chose to speak about. Discuss those aspects of the topic that you chose that interest you the most and explore those aspects in some depth.  

Make sure your speech includes both a good introduction to the topic and a good discussion of the ethics, privacy and security issues relating to that topic. Also, discuss possible solutions for the privacy and security issues that you discuss. Solutions might include technological solutions as well as issues in public education and public policy (legislation). Of course, you are to hand in the text for your speech.

Solutions

Expert Solution

With the advent of technology since the last decade there has been a tremendous potential increase in the methodologies and techniques we used to communicate. Now there are in numerous ways in which people can get connected to each other and remain in contact with the help of internet and social media. Moreover, 21st century is an era of digital data where most of our personal informations as well as other data are stored in the form of bits in the computer or the server which are hosted over the internet. We are now in the world of online internet banking system, online education system, online digital identification system and online medical consultation and information system which in fact has reduce the human efforts by accumulating the data and the services at a single point of reach within a click of mouse. This has enable human beings to take advantages of such services without compromising with the quality and do saves or huge amount of time and money as well. But as we know every good thing do also have its disadvantages associated with it. This has led us to a whole new generation of digital information where the paper work has almost reduced to negligible. The information stored in the form of digital data do also contain private data related to people which they would never want anybody else to come across. Such digital private information can be exposed two other human whom they are not intended to reach. This is called a breach of privacy. As the internet communication and technology have grown, the cyber crimes and security issues have always grown since the inception of digital data and internet.

Unreasonable intrusion into personal seclusion, public disclosure of private facts, publicity that places a person in a false light or appropriation of a person name are the prime attempt which are considered under the disclosure of privacy. Such information exposure may lead to loss of property, life as well as dignity.

The above-mentioned attempts or procedures which leads to disclosure of of private information which in turn do harm to someone life and property in one way or the other is known as breach of privacy and they are punishable according to law based on country in which the privacy breach has occurred.

Such loss of privacy and data exposure are done under the motivation of criminal intent, political intent, animosity against the other or for the intent of showing oneself to the world. The threat to privacy include a huge range of tools and techniques which breaks into you are human personal space stealing their data and using for an inappropriate purposes. Some of the examples of threat to privacy are Phishing, social network privacy issues, identity theft or security data breach compromising the national security.

First I will talk about Phishing. Is a kind of cyber attack in which people are are manipulated to unknowingly or unintendedly giving up their private information on the websites, in the messages or on the phone calls. Such private information may be used by the attacker to steal money from the bank account or to masquerade the victim on the various social media and other digital platforms and this is known as identity theft. Phishing on the phone calls are known as Vishing.

Another breach of data can take place on the social media as a result of Identity theft where by the help of social engineering or other human manipulation the attacker get the username and password for a human personal social media account and post things on the internet masquerading as a victim. This can highly effect a person by placing him in a false light. Such kind of cases have occurred in past and has been proven to be deadly for the victim.

Search threat to privacy are needed to be addressed and have been addressed in the past too but due to invention of innovative technologies in the field of hacking there is a breach of all those patches possible. It is said in the the field of cybersecurity that humans are the weakest link in the chain of privacy and securing infrastructure. Since if machines have been programmed in a way to not allow any unintended person into a private space but still humans can be manipulated and so do their mind. Therefore in addition to the technological advances to secure our are private domain and infrastructure, there is a need for humans to be trained and well informed do not be deceived by such at of hacking. There is a lot work to do in the field of cyber security in space to prevent the breach of private information to the unintended audience and they are being done on a large scale. We hope that such efforts will bring us to the world where loss and breach in privacy of personal data is reduced to negligible.


Related Solutions

You are attending a conference of business leaders in Vancouver and you have been asked to...
You are attending a conference of business leaders in Vancouver and you have been asked to defend the high tax regime in Canada. In the form of a speech, beginning with “Dear Ladies and Gentlemen,...” defend the high taxation of 31% national average in the country. Use the cost/benefit analysis discussed in class as part of your defense. In the course of your defense, be sure to discuss at least two tax categories in support. You can also use the...
You are the risk manager of a hospital and have been asked to make a speech...
You are the risk manager of a hospital and have been asked to make a speech to doctors and nurses about how to prevent malpractice claims. draft a short speech outlining the most important guidelines and best practices for healthcare providers to limit medical mistakes and reduce potential liability. Provide specific steps they can take to protect themselves and the organization from malpractice and other kinds of claims against providers.
You have been asked to make a presentation to the international environmental conference 2009. describe the...
You have been asked to make a presentation to the international environmental conference 2009. describe the three keyponits that you would make in your presentation. Would kindly appreciate if answers are in text form not handwritten. Thank you.
You have been asked to make a presentation to the International Environmental Conference 2009. Describe the...
You have been asked to make a presentation to the International Environmental Conference 2009. Describe the three key points that you would make in your presentation.
You have been asked by your CEO to evaluate, analyse and calculate commonly used ratios relating...
You have been asked by your CEO to evaluate, analyse and calculate commonly used ratios relating to a company’s profitability, liquidity, solvency and management efficiency. Requirement: Complete the balance sheet and sales data (fill in the blanks), using the following financial data:                 Debt/net worth                                                        60%               Acid test ratio                                                            1.2               Asset turnover                                                           1.5 times               Day sales outstanding in accounts receivable     40 days               Gross profit margin                                                   30%               Inventory turnover                                                    6 times                                                                            Balance sheet Cash                               ________                      ...
You have been asked by your CEO to evaluate, analyse and calculate commonly used ratios relating...
You have been asked by your CEO to evaluate, analyse and calculate commonly used ratios relating to a company’s profitability, liquidity, solvency and management efficiency. Requirement: Complete the balance sheet and sales data (fill in the blanks), using the following financial data:                 Debt/net worth                                                        60%               Acid test ratio                                                            1.2               Asset turnover                                                           1.5 times               Day sales outstanding in accounts receivable     40 days               Gross profit margin                                                   30%               Inventory turnover                                                    6 times                                                                            Balance sheet Cash                               ________                      ...
Suppose that you have been asked to present a speech to an elderly audience. What topic...
Suppose that you have been asked to present a speech to an elderly audience. What topic will you develop and what story will you present? You must refer to the process of storytelling included in the learning
You have been asked to give a presentation to your co-workers in the digital marketing department...
You have been asked to give a presentation to your co-workers in the digital marketing department of Reebok on what factors should be considered in assessing the effectiveness of your firm’s search and display ads more accurately. Using the two key questions below, discuss how you would guide them: a) How are online clicks to display ads/search as and sales related? What should they expect? b) Reebok is placing ads such as offline along with online ads. How can they...
You are a medical assistant at a local hospital. You have been asked to give a...
You are a medical assistant at a local hospital. You have been asked to give a presentation on the diagnosis and treatment of latent tuberculosis infection. The presentation will be open to the public so instead of presenting a real patient case, you decide to create a fictional sample case. Create a single case and list the characteristics of the person you will be testing and treating. Describe basic information about the patient including age, sex, lifestyle, and pertinent medical...
You have been asked for your advice in selecting a portfolio of assets and have been...
You have been asked for your advice in selecting a portfolio of assets and have been supplied with the following​ data:. You have been told that you can create two portfolios—one consisting of assets A and B and the other consisting of assets A and C—by investing equal proportions ​(50%​) in each of the two component assets. f. What would happen if you constructed a portfolio consisting of assets​ A, B, and​ C, equally​ weighted? Would this reduce risk or...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT