Discuss about the Professional Research and Communication for Internet Privacy.
Internet privacy involves the correct or mandate or personal privacy that is concerned with the storing, repurposing as well as provision to third parties. It is considered as a subset of privacy of data. Concern related to privacy has been articulated from the start of large-scale computer sharing. Privacy can involve either Personally Identifying Information (PII) as well as non-PII information such as behavior of site visitor on a website (Young & Quan-Haase, 2013). Internet privacy is viewed in a different way as compared to traditional expectation of privacy and it is also concerned with the protection of user information.
The purpose of the study is to provide an overview about intense spotlight on online privacy as well as security. The report shows the growth of digital footprints and the requirement to take personal act in order to safeguard the online freedoms. The purpose is to highlight the threats from hackers as well as cybercriminals that have increased in relation to the dependence on the internet.
According to Bernal (2014), in the daily usage of internet, every individuals either makes a conscious as well as unconscious trade-off between convenience as well as privacy. The most common example is that of Gmail that is considered as a hugely popular email service used by more than 1 million individuals all over the world. Although most of the individuals recognizes, however; few individuals might not identify the fact that they receive advertisements that are somewhat associated to the subject of their emails. This is mostly because, the subject of email of the individual is sent to several advertising engines to come up with appropriate content to serve back to the user of Gmail. As a result, the user is likely to receive ads if someone sends an email related to vacation with vacation in the subject line. This is also termed as targeted advertisement that takes place when customers search for several things on the internet.
As opined by Sicari et al., (2015), both privacy and security set diverse as well as complementary domains of action that requires a particular level of specialty in order to enhance a set of practices that conceptualize as well as become visible the exercise of access and control. Information security and internet privacy generates a challenge for engineering and corporate practice that should attend the statements of corporate governance of a company. Internet privacy is an implication of larger markets that requires a comprehensive understanding of the law that supports populace against the law of nation. On the other hand, information security is described as a practice of the protection of information that provides care for the acknowledged tactical asset. On the other hand, Dinev et al., (2013), stated that the privacy of information has been addressed as a lawful issue that has not been handled properly by standards of information security. At present, most of the internet security and privacy companies provides solution that is too complicated for IT administrators as well as most of the customers to use them.
There are several disciplines that have examined the concept of privacy and have made the use of several definition of privacy. The invasion of privacy is mostly viewed as the unlawful compilation use as well as transfer of individual information as a direct consequence of e-commerce transaction. Internet privacy is the right of individuals to manage their personal information with respect to its compilation, use and transfer over the internet. According to Cavico & Mujtaba (2016), most of the large and small companies make the use of e-commerce websites in order to reach to probable customers. The companies seek to distinguish themselves through enhanced customer relationships as well as personalized services. The easiest way to collect personal information is during a ordering or a registration procedure. While registering in an e-commerce website, the individuals are asked for personal information such as their name, e-mail address as well as number of credit card. The personal information of the customers is also captured with the help of IP (Internet Protocol) address that is mostly used to track precise web pages that are viewed by the customers. This has raised a question related to internet privacy as well as information security of the individuals (Tucker, 2014).
However, Kokolakis (2017), stated that there are three strategies that mostly deals with privacy of internet. The strategies include governmental regulation, self-regulation of the industry as well as enhancing technologies. With the help of the self-regulation strategy, most of the company decides the degree of information that is gathered and used to develop statement related to privacy policy. Internet privacy is a murky as well as complicated issue that is full of contradictory interests and technology messes. There are plenty of other frightening tales from the world of internet privacy. It was reported that a hacker posted thousands of credit card numbers stolen from CD Universe on a web site; he offered a share more for $1 respectively. However, privacy concern related to internet do not only takes place from criminal action. Most of the advertising network tracks customers secretly as they move around the internet (Park, 2014).
On the basis of the research objectives, the research questions are prepared that are as follows:
H0: Participants in the privacy information circumstance will be more probable as compared to those in the no privacy gauge circumstance to acquire from websites interpreted with symbols
H1: Participants in the privacy information circumstance will be more probable as compared to those in the no privacy gauge circumstance to acquire from websites interpreted with four-green-boxes symbols
Methodology is described as the systematic as well as theoretical analysis of the methods that are applied to a field of study. It involves the theoretical investigation of the body of methods as well as principles that are associated with a branch of knowledge. Research is a simple term that refers to hunt for knowledge. It is referred to as technical as well as methodical search for information on a particular topic or issue. Research methodology is described as the way by which research problems are solved methodically. It is also described as the science of studying the way in which a research is conducted technically (Charnes et al., 2013). The research questions are used to collect data that consists of a combination of multivariate and univariate measurements. The dependent variable is used as a single-item measure that indicates how many times an individual has made purchase of a product.
Research Design: It is described as a policy of a research study that helps to define the type of study, research problem, hypothesis as well as dependent and independent variables. Research design is described as a framework that has been generated to find answers to research questions (Creswell, 2013).
Qualitative and quantitative approaches: The qualitative approach mostly collects information that focus on describing an observable fact in a deep wide-ranging way. This approach is mostly used while taking interviews as well as for open-ended question. Mostly small number of participants performs this research and in order to carry out this research, various resources are required. Interviews can mostly vary from being highly structured to less structured and are guided by open-ended question (Taylor, Bogdan & DeVault, 2015). On the other hand, quantitative approach is used to gather information that focus on describing an observable fact across a huge number of participants thereby providing the opportunity of summarizing traits across groups. This type of approach mostly makes the use of a huge number of individuals and applies statistical methods to distinguish entire pattern in the relation of procedures.
Conceptual and empirical approach: While conducting empirical research, data is collected with the help of observation as well as experimentation. It is mostly used to gain knowledge with the help of direct and indirect observation. On the other hand, conceptual analysis is considered as the preferred method of analysis in both social sciences as well as philosophy. A researcher mostly breaks down a theorem or concepts into its constituent parts in order to gain a better knowledge of the theoretical issue that is concerned with the theorem (Meriac, Hoffman & Woehr, 2014).
Descriptive and Analytical approach: Descriptive approach includes analysis as well as fact-finding enquiries of diverse types. The major objective of this approach is to describe the situation, as it exists at the time of the study. The descriptive approach mostly comprises of observation method, case study method as well as survey method. The observation method deals with the observation of subject in both natural and laboratory methods in order to draw conclusion on the research. Case study method on the other hand, deals with in-depth research on the issues discussed. The survey method is however; based on the questionnaire made for the participants (Vaismoradi, Turunen & Bondas, 2013). The analytical approach on the other hand, comprises of regression analysis approach, grouping analysis approach as well as multiple equation methods. The regression analysis approach is mostly affected by the one or more individual components of the experiment. Grouping analysis approach on the other hand, is based on the grouping of variables. The multiple methods describes about the path of individual components in an experiment.
There are two types of variables that are used to carry out the research proposal, such as the dependent variable and the independent variable. The dependent variable is the variable that interests a researcher. Changes in the dependent variable take place when a researcher tries to measure with all its interpret techniques. On the other hand, an independent variable is a variable that is believed to affect the dependent variable. A researcher mostly manipulates an independent variable to see whether it makes any changes to the dependent variable (Hanmer & Ozan Kalkan, 2013).
Data collection is the method by which data is collected and it is used to measure information on targeted variables in an ascertained methodical fashion. This in turn enables an individual to answer relevant question as well as evaluated outcomes. The proposal is conducted by making the use of secondary analysis that mostly analysis all the variables. The lack of confidentiality grows with the increase of e-commerce. As a result, customers have little control over the way their personal information is used. At present, personal information has become a commodity to be purchases, sold and traded. The sources that are used to gather the secondary data mostly includes published sources as well as unpublished sources. The unpublished sources mostly includes records that are obtained from several maintained by several government as well as private offices (Field, 2015).
Conclusion
It can be concluded that internet has been a magnificent technological invention however, with its innovation several issues related to privacy while using internet. The benefits that are related to internet and privacy are that is facilitates individuals to communicate with each other. However, invasion of privacy is one of the major disadvantages that are associated with internet privacy. According to the research, most of the individuals are not aware of privacy associated with internet. The research illustrates that internet privacy and information security acts as a key concern. As a result, the law requires taking more action and protecting individuals from the invasion of privacy while using the internet.
References
Bernal, P. (2014). Internet privacy rights: rights to protect autonomy (No. 24). Cambridge University Press.
Cavico, F. J., & Mujtaba, B. G. (2016). The Intentional Tort of Invasion of Privacy in the Private Employment Sector: Legal Analysis and Recommendations for Managers.
Charnes, A., Cooper, W. W., Lewin, A. Y., & Seiford, L. M. (Eds.). (2013). Data envelopment analysis: Theory, methodology, and applications. Springer Science & Business Media.
Creswell, J. W. (2013). Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications.
Dinev, T., Xu, H., Smith, J. H., & Hart, P. (2013). Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. European Journal of Information Systems, 22(3), 295-316.
Field, T. (2015). The benefits and limitations of quantitative data collection to the literature review data collection.
Hanmer, M. J., & Ozan Kalkan, K. (2013). Behind the curve: Clarifying the best approach to calculating predicted probabilities and marginal effects from limited dependent variable models. American Journal of Political Science, 57(1), 263-277.
Kokolakis, S. (2017). Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & Security, 64, 122-134.
Meriac, J. P., Hoffman, B. J., & Woehr, D. J. (2014). A conceptual and empirical review of the structure of assessment center dimensions. Journal of Management, 40(5), 1269-1296.
Park, S. (2014). Employee Internet Privacy: A Proposed Act that Balances Legitimate Employer Rights and Employee Privacy. American Business Law Journal, 51(4), 779-841.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
Taylor, S. J., Bogdan, R., & DeVault, M. (2015). Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.
Tucker, C. E. (2014). Social networks, personalized advertising, and privacy controls. Journal of Marketing Research, 51(5), 546-562.
Vaismoradi, M., Turunen, H., & Bondas, T. (2013). Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & health sciences, 15(3), 398-405.
Young, A. L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The Internet privacy paradox revisited. Information, Communication & Society, 16(4), 479-500.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download