C04295 Information Technology | Leakage of Personal Information
Questions:
Task
Proposals can be fun to write, as long as you have a topic that truly engages your interest and you can locate materials for research. The psychology is like this: you skate out over thin ice, but you are confident because you have done enough research already to know you can do the job.
Getting Started:
Your first step will be to locate a topic that will serve for both the proposal and the recommendation report. The topic should be researchable, problem based, and directed toward workable solutions to issues and concerns in the workplace. You will need a main idea (like a thesis statement for an essay).
Suggested topics might include:
- harassment, sexual discrimination, and racism at work (descriptions of situations, definitions of terms and problems, and ways to deal with and prevent occurences);
- shrinkage in retail outlets (definitions, examples, systems to track it, ways to prevent it)
- motivating employees in challenging workplaces (ways to handle potential downsizing, closures, firings, unfair promotions, negative attitudes, and depression/discouragement in workers)
- weight watchers or recovery groups at work: a good idea?
- community violence as it impacts workplace (for example, employees being attacked en route to places of employment)
- bad weather conditions and jobs that require driving or flying ( how to deal with situations of lost revenue or vehicle/aircraft mechanical failure)
- secrets of the best customer service (is this a lost cause? Have businesses forgotten the need for courtesy?)
As with any research tasks, you will need to start with a few basic research questions relating to the topic and then search for information that will help you to answer these questions.
Describing situations and then analyzing problems will be your focus in this task. Make best use of both academic and practical research skills. Your own experience is also relevant.
Answers:
Introduction
Leakage of personal information is a major issue that is faced by most of the users while utilizing the social media platforms. In this connection, the interconnectedness that is offered by the different social media platforms are affected through the lack of proper data privacy measures (Dey et al., 2012). Therefore, the concerned organization must take steps to bring in change in the security systems in order to prevent data theft and piracy. It will be helping the organization in safeguarding the interests of the community stakeholders relating to the privacy and security concerns (Zhang et al., 2013). The leakage of the personal information of the users also affects the ethical perspectives of the organizations. Therefore, the organization must take steps to bring in changes in the data privacy setting in order to maintain the efficacy and thereby secure the privacy of the users. Data breaches affect the loyalty and the trust factors of the users, which adversely affects the situation of the organizations. Therefore, the organizations must take initiatives in order to prevent data breach through suitable utilization of technologies.
Problem statement
The problems that are faced by the users of the social media platforms are due to lack of data privacy resulting to leakage of personal data, which is adversely affecting the security of the concerned people.
Solutions outlined for the problem
The solutions for the problem faced by the people are through the restriction of the access for the unused apps, which will be helping the organization in maintaining the proficiency of the data management. On the other hand, the organization might also use firewall for protecting the personal data of the users and thereby prevent data piracy and theft. Communication from the end of the organization to the different community stakeholders will be helping the business in making the consumers aware of the different circumstances, which might permit data theft. Consumer engagement in the processes of data security and feedbacks from the same will be helping then organization in debugging the different applications that might cause data theft (Xu, Chang & Zhou, 2013).
Scope of the research
The scope of the research is restricted to the identification of the different issues that are faced by the people relating to the leakage of their personal data in the web. The identification of the different situations that permits data breaches and thereby formulate different strategies in order to mitigate the issues.
Survey of initial research
The survey of the initial research will be conducted through the primary data collection method, which includes an interview with the different consumers who are affected by the data scandal of Facebook (Hori, Claycomb & Yim, 2012). The primary data collection method will be helping the research in identifying the different aspects of the issues that are faced by the people due to the data breach. The interview will be conducted through the formulation of different open ended questions (Hauer, 2015). The open ended questionnaire will be helping the study in identifying the different viewpoints of the people while conducting the study. The research will be making use of small amount of samples in order to identify the different issues that are faced by the people due to the breach of information. The random sampling technique will be facilitating the research in identifying the unbiased aspects of the impact of data breach. The sampling will be helping the study in maintaining the efficacy of the study as per the objectives of the same. The conduction of the initial survey will be based on the efficacy of the questionnaire and the selection of the sample size as per the objectives of undertaking an unbiased outcome of the study. The random survey will be helping the study in providing equal opportunities to the samples in order to maintain the unbiased outcome. The random survey undertaken in the research will facilitate in identifying different issues and thereby propose recommendations in order to prevent data breaching acts.
Research approach
The Research approach will be helping the research in arriving at desired and unbiased outcome. Flick (2015) stated that research approach helps in identifying the different steps that might be undertaken in order to conduct an unbiased study. Research approach is basically of two types, namely, inductive approach and deductive approach. As per the case, the research will be undertaken through the inductive approach, as it will be allowing to culminate into a new set of models and frameworks assuming the relevant outcomes of the research. The research requires a strong standpoint on the recommended actions that might be undertaken by the organizations in order to bring in changes in the data security techniques for preventing the rate of data piracy. On the other hand, the identification of the issues that are faced by the people due to the data thefts will be studied in order to culminate into the assorted recommended actions. The inductive approach will be helping to induce different models that will be helpful for the future research works (Flick, 2015). The proper functioning of the research approach will be helping in culminating into an unbiased outcome of the study.
Work Breakdown Structure
Costs as appropriate
The cost that might be incurred while undertaking the study will be based on the conduction of the interviews with the relevant samples. On the other hand, the transportation costs that might be incurred while conducting the survey will be affecting the prospects of the research (Perez, Birregah & Lemercier, 2012).
Summary of own experience
The issues that are faced by the people due to the leakage of the personal information affects the security priorities of the people. The modern era is dependent on the social media platforms for communicating and interacting with the relevant stakeholders. However, data breach has affected the interests of the people due to lack of security. Therefore, the organizations must take steps in order to bring in changes in the data protection techniques from being breached. It will be helping the organization in adhering to the interests of the people as per the ethical consideration of the businesses. The data breach has affected the personal interests of the people on ethical standpoints.
Conclusion
Therefore, from the above analysis it can be stated that the study on the different issues that are faced by the people due to the data breach has affected the interests of the people. The Facebook case of leakage of personal data of most of the users and thereby utilization of the data for identifying the preferences of the people relating to their federal voting rights. The users face different issues due to the leakage of their personal data as their location, bank details and even their schedules being compromised. The different issues that are faced by the people due to the breach of personal data affect the security concerns. On the other hand, the research will be enumerating the recommended actions that might be undertaken by the organizations in order to prevent the data breach circumstances.
References
Chae, C. J., Shin, Y., Choi, K., Kim, K. B., & Choi, K. N. (2016). A privacy data leakage prevention method in P2P networks. Peer-to-Peer Networking and Applications, 9(3), 508-519.
Hauer, B. (2015). Data and information leakage prevention within the scope of information security. IEEE Access, 3, 2554-2565.
Hori, Y., Claycomb, W., & Yim, K. (2012). Guest Editorial: Frontiers in Insider Threats and Data Leakage Prevention. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 3(1/2).
Zhang, X., Liu, C., Nepal, S., Pandey, S., & Chen, J. (2013). A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Transactions on Parallel and Distributed Systems, 24(6), 1192-1202.
Flick, U. (2015). Introducing research methodology: A beginner's guide to doing a research project. Sage.
Dey, R., Tang, C., Ross, K., & Saxena, N. (2012, March). Estimating age privacy leakage in online social networks. In INFOCOM, 2012 Proceedings IEEE (pp. 2836-2840). IEEE.
Perez, C., Birregah, B., & Lemercier, M. (2012, June). The multi-layer imbrication for data leakage prevention from mobile devices. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 813-819). IEEE.
Gugelmann, D., Schatzmann, D., & Lenders, V. (2013, May). Horizon extender: long-term preservation of data leakage evidence in web traffic. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security (pp. 499-504). ACM.
Xu, J., Chang, E. C., & Zhou, J. (2013, May). Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security (pp. 195-206). ACM.
Buy C04295 Information Technology | Leakage of Personal Information Answers Online
Talk to our expert to get the help with C04295 Information Technology | Leakage of Personal Information Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.