• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Data privacy is the relationship between collection and distribution of data and the public expectation of privacy and the legal issues surrounding them. There are many policies and ordinance that protect our data, but the big question is who is in contro

Extracts from this document...

Introduction

Who will be responsible for your personal data and will you have any control over how it will be used? What is privacy? Privacy is the ability of individual and groups to determine for themselves when, how and to what extend information about themselves is shared with others. In today's world where the rapid growth of technology is questioning the privacy of our personal and sensitive data, how do we make sure our data is secure? Data privacy is the relationship between collection and distribution of data and the public expectation of privacy and the legal issues surrounding them. There are many policies and ordinance that protect our data, but the big question is who is in control of these rules and regulations? ...read more.

Middle

These sites are mostly used by the young generation, who live their lives in public and are not usually aware of the security issues. All of us know that it is very simple to view information on sites like Face book, this way their personal life is more vulnerable to abuse like deception, cyber bullying, stalking and deviancy. Now can you control who shares your personal data? Not just social networking sites but also other internet databases, the increased broadcasting of information has lead to greater accountability from organizations. Forums allow user generated discussions and opinions which often involve malicious or mischievous information being posted, exaggeration and untruth. Data and information that you enter in these sites is often permanent and could be used against you later. ...read more.

Conclusion

As mentioned before, that teens are most vulnerable to data privacy dangers. Over 55 percent of online teens between 12 and 17 use social networks, and older teens are even more likely to have profiles. The vast majority of teens use the Internet. To protect this vast population from data privacy dangers, we need to raise awareness of the issues related to data privacy. Choose a prepared presentation or group of materials and use them to help educate teens about how to protect the privacy of their personal information online. Alternatively, search the useful links and resources below to find a video or website that speaks to your particular audience. The important thing is to get teens talking and thinking critically about privacy. As innovative and creative users of technology, teens can be the first and best protectors of their privacy online. ?? ?? ?? ?? Ananya Huria ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

The student immediately defines online privacy in the introductory paragraph for this document, which is very helpful to the reader as it outlines what the essay is based on. The student goes on to describe modern issues surrounding data protection ...

Read full review

Response to the question

The student immediately defines online privacy in the introductory paragraph for this document, which is very helpful to the reader as it outlines what the essay is based on. The student goes on to describe modern issues surrounding data protection and website content management systems i.e. database-driven social networking sites which store sensitive information, and briefly mentions the advantages of implementing relational database management systems (RDBMS).

However, the content of the document is largely one-sided towards fear of information storage and fails to discuss security measures in place to prevent unauthorised access of data. The consequence of this is an overly opinionated essay and therefore not an accurate representation of online privacy in reality.

Level of analysis

The writer has not considered or even mentioned IT legislation which governs the information over the internet, nor permission masks or security measures in place for public forums and social networking sites, and therefore has not demonstrated an appropriate level of analytical skills.

The final paragraph contains statistics without any citations and further directs the user to external sources as referenced at the end of the document; however, no such references are included.

Quality of writing

The document contains a number of grammatical errors throughout, mainly incorrect use of certain words e.g. ‘extend’ instead of ‘extent’.

The writer has used the expected technical terms at this level of qualification; however, they should consider a more formal approach to the style of writing and consider using fewer rhetorical questions in order to make their point. This in turn will produce a more clear and concise piece of writing.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by finalfantasy 01/03/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    In today's terms there are estimated to be in the region of 1.1 Billion internet users which at 13% identifies a staggering 143 Million cases of identity theft.( http://www.identitytheftspy.com) Geographically many scams are reported to originate from Eastern Europe and some African Countries with the majority of victims being located in Western Europe and the United States of America.

  2. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    With the current system there is a difficulty in trying to record all data when there is a bigger order. Luki would like to be able to have an ordering system along with a database system to which data can be stored in a secured manner.

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Data transmission is inexpensive and reliable. Sharing a connection is easy as well because it allows direct connectivity. A WAN also allows sharing of software and resources to other workstations connected on the network. Disadvantage of a WAN network is that the signal strong all the time so anyone trying

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    tapestreamer worthwhile, and the old cassette tape is an antique by now. Consequently, a tape device does not fit the application given. Notice, also, the way that the justification for each of the devices was linked to the application, for a floppy drive, the answer did not just say that

  1. The impact of the availability of electric information on individuals and society

    Another good example how the availability of electronic information has affected our society and is making paper-based information sources unnecessary is a facility to make self diagnosis. The NHS now offers a self diagnosis tool on their website in order for you to diagnose yourself or someone else.

  2. Social Networking

    to be creative, to promote their online student newspaper which just over a year from launch is pulling in progressively rising traffic. No doubt all the blog, Facebook and MySpace mentions are helping. He had students who use social networking sites to build and promote projects on fighting poverty and

  1. Form and Function In Design Technology

    The first large-scale machines to take advantage of this transistor technology were early supercomputers, Stretch by IBM and LARC by Sperry-Rand. These computers, both developed for atomic energy laboratories, could handle an enormous amount of data, a capability much in demand by atomic scientists.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    must be processed fairly and lawfully and at least one of the conditions for processing sensitive personal data is met. The conditions for each of these categories would usually be that the subject has given consent. Personal data processing conditions: The subject's consent may not be required if the processing

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work