Leakage of personal information is a major issue that is faced by most of the users while utilizing the social media platforms. In this connection, the interconnectedness that is offered by the different social media platforms are affected through the lack of proper data privacy measures (Dey et al., 2012). Therefore, the concerned organization must take steps to bring in change in the security systems in order to prevent data theft and piracy. It will be helping the organization in safeguarding the interests of the community stakeholders relating to the privacy and security concerns (Zhang et al., 2013). The leakage of the personal information of the users also affects the ethical perspectives of the organizations. Therefore, the organization must take steps to bring in changes in the data privacy setting in order to maintain the efficacy and thereby secure the privacy of the users. Data breaches affect the loyalty and the trust factors of the users, which adversely affects the situation of the organizations. Therefore, the organizations must take initiatives in order to prevent data breach through suitable utilization of technologies.
The problems that are faced by the users of the social media platforms are due to lack of data privacy resulting to leakage of personal data, which is adversely affecting the security of the concerned people.
The solutions for the problem faced by the people are through the restriction of the access for the unused apps, which will be helping the organization in maintaining the proficiency of the data management. On the other hand, the organization might also use firewall for protecting the personal data of the users and thereby prevent data piracy and theft. Communication from the end of the organization to the different community stakeholders will be helping the business in making the consumers aware of the different circumstances, which might permit data theft. Consumer engagement in the processes of data security and feedbacks from the same will be helping then organization in debugging the different applications that might cause data theft (Xu, Chang & Zhou, 2013).
The scope of the research is restricted to the identification of the different issues that are faced by the people relating to the leakage of their personal data in the web. The identification of the different situations that permits data breaches and thereby formulate different strategies in order to mitigate the issues.
The survey of the initial research will be conducted through the primary data collection method, which includes an interview with the different consumers who are affected by the data scandal of Facebook (Hori, Claycomb & Yim, 2012). The primary data collection method will be helping the research in identifying the different aspects of the issues that are faced by the people due to the data breach. The interview will be conducted through the formulation of different open ended questions (Hauer, 2015). The open ended questionnaire will be helping the study in identifying the different viewpoints of the people while conducting the study. The research will be making use of small amount of samples in order to identify the different issues that are faced by the people due to the breach of information. The random sampling technique will be facilitating the research in identifying the unbiased aspects of the impact of data breach. The sampling will be helping the study in maintaining the efficacy of the study as per the objectives of the same. The conduction of the initial survey will be based on the efficacy of the questionnaire and the selection of the sample size as per the objectives of undertaking an unbiased outcome of the study. The random survey will be helping the study in providing equal opportunities to the samples in order to maintain the unbiased outcome. The random survey undertaken in the research will facilitate in identifying different issues and thereby propose recommendations in order to prevent data breaching acts.
The Research approach will be helping the research in arriving at desired and unbiased outcome. Flick (2015) stated that research approach helps in identifying the different steps that might be undertaken in order to conduct an unbiased study. Research approach is basically of two types, namely, inductive approach and deductive approach. As per the case, the research will be undertaken through the inductive approach, as it will be allowing to culminate into a new set of models and frameworks assuming the relevant outcomes of the research. The research requires a strong standpoint on the recommended actions that might be undertaken by the organizations in order to bring in changes in the data security techniques for preventing the rate of data piracy. On the other hand, the identification of the issues that are faced by the people due to the data thefts will be studied in order to culminate into the assorted recommended actions. The inductive approach will be helping to induce different models that will be helpful for the future research works (Flick, 2015). The proper functioning of the research approach will be helping in culminating into an unbiased outcome of the study.
The cost that might be incurred while undertaking the study will be based on the conduction of the interviews with the relevant samples. On the other hand, the transportation costs that might be incurred while conducting the survey will be affecting the prospects of the research (Perez, Birregah & Lemercier, 2012).
The issues that are faced by the people due to the leakage of the personal information affects the security priorities of the people. The modern era is dependent on the social media platforms for communicating and interacting with the relevant stakeholders. However, data breach has affected the interests of the people due to lack of security. Therefore, the organizations must take steps in order to bring in changes in the data protection techniques from being breached. It will be helping the organization in adhering to the interests of the people as per the ethical consideration of the businesses. The data breach has affected the personal interests of the people on ethical standpoints.
Conclusion
Therefore, from the above analysis it can be stated that the study on the different issues that are faced by the people due to the data breach has affected the interests of the people. The Facebook case of leakage of personal data of most of the users and thereby utilization of the data for identifying the preferences of the people relating to their federal voting rights. The users face different issues due to the leakage of their personal data as their location, bank details and even their schedules being compromised. The different issues that are faced by the people due to the breach of personal data affect the security concerns. On the other hand, the research will be enumerating the recommended actions that might be undertaken by the organizations in order to prevent the data breach circumstances.
References
Chae, C. J., Shin, Y., Choi, K., Kim, K. B., & Choi, K. N. (2016). A privacy data leakage prevention method in P2P networks. Peer-to-Peer Networking and Applications, 9(3), 508-519.
Hauer, B. (2015). Data and information leakage prevention within the scope of information security. IEEE Access, 3, 2554-2565.
Hori, Y., Claycomb, W., & Yim, K. (2012). Guest Editorial: Frontiers in Insider Threats and Data Leakage Prevention. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 3(1/2).
Zhang, X., Liu, C., Nepal, S., Pandey, S., & Chen, J. (2013). A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Transactions on Parallel and Distributed Systems, 24(6), 1192-1202.
Flick, U. (2015). Introducing research methodology: A beginner’s guide to doing a research project. Sage.
Dey, R., Tang, C., Ross, K., & Saxena, N. (2012, March). Estimating age privacy leakage in online social networks. In INFOCOM, 2012 Proceedings IEEE (pp. 2836-2840). IEEE.
Perez, C., Birregah, B., & Lemercier, M. (2012, June). The multi-layer imbrication for data leakage prevention from mobile devices. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (pp. 813-819). IEEE.
Gugelmann, D., Schatzmann, D., & Lenders, V. (2013, May). Horizon extender: long-term preservation of data leakage evidence in web traffic. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security (pp. 499-504). ACM.
Xu, J., Chang, E. C., & Zhou, J. (2013, May). Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security (pp. 195-206). ACM.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download