Avoiding Online Privacy Threats

Verified

Added on  2019/09/16

|5
|651
|167
Essay
AI Summary
The assignment content discusses various legal commercial threats to privacy, including spamming, and the importance of personalization of information online. It also touches on piracy practices and suggests ways to avoid them, such as supporting anti-piracy innovations, encouraging joint industry actions, and pursuing international frameworks for intellectual property protection.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Writing Assignment #10

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
Table of Contents
Question 1...................................................................................................................................................2
Question 2...................................................................................................................................................2
Question 3...................................................................................................................................................3
References...................................................................................................................................................4
Document Page
2
Question 1
There are many legal commercial threats to your privacy that the other businesses pose in order
to gain profit. This is generally done by monitoring your activity, selling your information to
other companies, or by controlling what you see by manipulating search engines.
Out of all these ways, I personally find Spamming as the most irritating kind of threat.
Spamming is generally considered as using the media to send you unwanted messages
deliberately.
Spam is mostly referred to unwanted emails, and also includes those unwanted ads, text
messages, and other things which pop-up in between of your search. This way the businesses try
to irritate us with that information which we don’t want to read, or view.
Many Internet company technicians have set up "honey pots," or spam traps, in order to collect
spam and find out what spammers are doing so that they are able to develop anti-span software
In order to avoid such problems, you must not list your email addresses directly (Ferreira, 2016).
Even if you list it, then you must use some creative measures in order to make it difficult for
spambots to get to your emails. You can, therefore, use web forms which don't expose your
emails openly and are rather embedded in a form processing management solution which is
generally not visible to a spambot.
Question 2
You must go for personalization of your information. It means that you need to make a balance
between what you want to disclose online and what you do not want to disclose. For this, it is
Document Page
3
advisable that you must remember that anything that you want to keep as private and over which
you want to maintain some control should not be posted on any social media platform (Roth,
2014). Also, it is recommended that you must not disclose any such information related to your
business over the internet which can be beneficial for your competitors and which might cause
your business a serious harm.
Question 3
Some people think that they can stop piracy practices by going under a different name or by
quitting to disclose anything on all social media. But this is not considered to be the best solution
(Delport, 2016). This can rather create problems for you as it might be possible that your
employees are not able to find you while searching for your name as you have already changed
your name. Some of the possible solutions to avoid such problems are as follows:
Supporting anti-piracy innovations which include the development of new technical
means
You must also encourage joint industry actions taken to fight against piracy, like ISP
implementation of a graduated response system.
You must pursue actively the international frameworks and action which are there to
protect intellectual property, including all digital content.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
References
Roth, S. (2014). The eye-patch of the beholder: introduction to entrepreneurship and piracy.
International Journal of Entrepreneurship and Small Business, 22(4), 399-407.
Ferreira, C. (2016). How can efficiently and effectively align its e-mail marketing efforts to
create engagement and avoid spam? (Doctoral dissertation).
Delport, P. M., Gerber, M., & Safa, N. S. (2016, August). An interactive visual library model to
improve awareness in handling of business information. In Information Security for South Africa
(ISSA), 2016 (pp. 18-26). IEEE.
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]