Saturday, January 4, 2020

Security and Consumer Protection in the Information Age...

Abstract: At this point in time the ubiquity of personal and sensitive information of businesses and individuals who participate in the world economy is greater than ever. As in the past, your information could be found on an old credit card statement inside your garbage can at the end of your driveway; just waiting to be plucked by the next crafty criminal who can get his hands on it. Now your sensitive personal information is inside not only in your garbage can but as a result of the last couple of decades, information technology now has the ability to send your personal information in packets of data and over telephone wires. Extensive research has come up with empirical evidence that Internet Identity theft is on the rise in the†¦show more content†¦There are several key points and underlying themes that I have hinted to already but I will take the chance to further elucidate the main objectives for the rest of the paper: ul li The progressive compression of space and time as a result of the globalization phenomenon has had significant implications on businesses and individuals and has brought together in ways they never thought possible (Stromquist 2000). li Globalization has led to innovation in information technology, more specifically, with the invention of the Internet, information can be sent around the world at lightning fast speeds. li Within the new international data transmission infrastructure money can be exchanged in the form of data, giving birth to what is now the booming industry E-commerce. li The data required by E-commerce not only attracts businesses and consumers globally, but because of the profitable nature of the data used to exchange money, Internet criminals known as hackers electronically probe and loiter networked pathways with the intention of intercepting this valuable information. li The nature of newer, wireless technology has many more security issues because rather than data transmission through wire as before, the air is being used as the medium of transmission allowing less discrete areas for possible network access. li The most recent security measures are those in the practices of data encryption and electronic payment systems. /ul ConsumerShow MoreRelatedInternet Privacy : How Much Privacy Do We Really Have Anymore? Essay1706 Words   |  7 Pagesborn and introduced into our society. A lot of these technologies have something to do with tracking and monitoring the consumer or user of a product or service. I am okay with having my personal information shared with the Internet but only to a point. While Americans claim to care about their privacy, they seem to really care about convenience more. If giving up personal information will make things easier, Americans seem to be all for it. According to Google’s chief economist Hal Varian, â€Å"EveryoneRead MorePublic or Private?798 Words   |  3 Pagesus from acquiring the latest and greatest technology. Designers are building technology with no consideration of the security and privacy of their consumers. People are purchasing these new iPhones with fingerprint recognition and downloading different apps everyday with the thought of privacy and security in the back of their minds. Cell phones are becoming so advanced that consumers are able to complete multiple tasks ranging from turning their lights off at home to checking their blood pressureRead MoreHow Laws Affects The Travel Industry In British Columbia1367 Words   |  6 Pages Business Law in Canada All businesses in Canada are bound by laws reflective of the nature of the business. There are laws that protect the consumer, laws that protect the business owner, and laws that protect suppliers. Although many laws are regulatory in nature across the board for all businesses, some are specifically geared to industries. Below I will outline three ways in which the law affects the travel industry in British Columbia, specifically. This will be outlined from the perspectiveRead MoreMeasures for the Protection of E-Consumers1710 Words   |  7 PagesMEASURES FOR THE PROTECTION OF E-CONSUMER In this electronic age there is a need to protect consumers‟ interest and following are the areas of central importance for the effective protection of e-consumers. 1. Correct Information An informed consumer is self sufficient to look after her/his own interests than an uninformed consumer. Appropriate information on the products is very important for e-consumers as that can help the consumers to assess the benefits and risks of entering into a particularRead MoreCyber Security And The Digital Age1457 Words   |  6 Pagesfrom National Security Agency (NSA), triggering a global debate about national security and citizens’ rights to privacy on the Internet (Philippens, 2013). The development of Internet provides great convenience for the companies and consumers, such as e-commerce and social networking. Meanwhile, it poses certain risks to some extent, such as leakage of corporate secrets and personal privacy. Thus, multinational companies should find their ways to respond to the problem of cyber security in the digitalRead MoreSecurity Legislations And Standards Of The Internet1407 Words   |  6 PagesIt can be difficult to make security legislations and st andards since the Internet became more affordable enough and easy enough to access. It’s what you would say when everything is â€Å"free game† for anyone or anything. Even though there are plenty of laws on the books, enforcing them is another challenge (Shinder, 2011). While information security plays an important role in protecting data and assets of an organization, this changing world of technology comes with an increase in threats posing moreRead MorePrivacy Is The Freedom From Unauthorized Intrusion Essay1308 Words   |  6 Pagesunifying theme for common law protection rights (â€Å"Development of the†). As consumers, we have a right to be left alone under the law, but we currently are subject to many forms of tracking, data collection, and surveillance. Many citizens are concerned that government data collection and use violates their privacy preferences as data collection can be intrusive and used in a harmful way (). Being in the 21st century, techno logy wise we are part of the data age. With the data age comes with an increasedRead MoreCustomer Satisfaction : A Dynamic Platform For Big Data Analytics Based On Goods And Services And Shopping Habits1450 Words   |  6 PagesCompanies like Amazon collect granular customer information and looks at every transactional activity, so allowing them the liberty to do almost anything with it. Now, companies such as these can run user-based reports in minutes, especially with cloud-based services. Businesses such as Google and Amazon facilitate the chain between supply and demand in a ubiquitous digital world. Success within a multilayered platform is incumbent upon assimilating all necessary processes into a recipient-drivenRead MoreBig Data Is An Emerging Term1674 Words   |  7 Pagesuse big data to analysis individual consumption level or income , then confirm their target consumer and put advertising which is aimed at them so that more wealthy people will buy their commodity. T hus, big data attract more and more enterprises and institutions to do research in it. Meantime, the usage of data spread widely in this age of technology. In 2000, about 15% of all the world’s stored information was digital, by 2013, the proportion of that was more than 98% (Mayer-Schà ¶nberger CukierRead MoreThe Sharing of Personal Data by Mobile Phone Companies924 Words   |  4 Pagessurprisingly large quantities of personal information that would normally be considered private by consumers. Companies are constantly looking toward changes that will make private data infinitely diverse from that which defined pre-digital society. Individuals have voiced specific worries about how phone and internet companies can be trusted to manage the threats to private data in the online world, specifically financial loss and social reputation. Many consumers believe that phone companies have a moral

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.