logo

Research Methods for Privacy and Security Breaches Due to Readability of Terms and Conditions

   

Added on  2023-06-04

11 Pages2518 Words88 Views
Data Science and Big Data
 | 
 | 
 | 
METHOD REVIEW
1
Research Methods for Privacy and Security Breaches Due to Readability of Terms and Conditions_1

Table of Contents
Introduction......................................................................................................................................3
Description of Research Methods....................................................................................................3
Comparison of methods...................................................................................................................4
Critical analysis...............................................................................................................................7
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
2
Research Methods for Privacy and Security Breaches Due to Readability of Terms and Conditions_2

Introduction
The readability issues of terms and conditions are one of the significant areas related to privacy
and security breaches among the customers all users. The use of information technology has
various policies regarding the privacy and protection of user’s information but due to the process
of unreadable terms and conditions breaches are increasing every day. Most of the online
organisations have the policies to collect personal information about the customers which are
being stored and process and sometimes also analysed for gaining knowledge about the customer
for adding up more value for the services or products. Collection of this information is counted
within the organisational business model. This information has specific terms and conditions
which are documented and all online service providers provide these terms and conditions to
their customers (Abdulkadiroğlu et al. 2017). However, these terms and conditions generally
time consuming for reading which is the main reason behind most of the customer avoid to read
out. The purpose of this research review is to understand the specific research methods which
have used for reviewing the knowledge about this topic area.
Description of Research Methods
For this research, on the privacy and security breaches due to the visibility of terms and
conditions, a survey on the Peer-reviewed scholarly articles has done. The peer review scholarly
article refers to the academic or professional piece of writing written by the scholars with the
relevant source of information. For the complete research, the secondary data is used for
understanding the research area (Carter et al. 2014). Mainly, the secondary data is used for this
research review. The secondary data refers to directly the information which is collected by other
3
Research Methods for Privacy and Security Breaches Due to Readability of Terms and Conditions_3

than the user of the data currently. The secondary data is commonly sourced from the various
recorded documentation. This recorded documentation might include from the organisational
records, books, journals, government department data, etc. However, most of the secondary data
are authorised, and therefore the authenticity of the work related to secondary data information
provide the best quality of research. There is also the advantage of using secondary data because
the information is collected from legally documented areas like the government department, tax
records, social security, etc. (De Coninck and Helsen, 2016). In addition to that, the progress of
the data is continuously gained from this secondary data because of its necessity in the society
and national level. In addition to that most of the libraries and internet resources of data are
counted among the secondary data. However, within the secondary data, both the quantitative
and qualitative data can we find out which is more valid and reliable than any other type of data.
For research on this topic, the survey method is used as part of the secondary data. This survey is
done in the peer-reviewed scholarly journals which contain both statistical data and descriptive
data (Hair et al. 2015). However, surveying the secondary data collection increases the
authenticity of the data by providing proper cost-effectiveness.
Comparison of methods
The research methods refer to the scientific and systematic procedure of data gathering,
completion, analysis of the data, interpretation and also using them for different purpose of
solving the problem. The general classification of research method and mainly two different
types doors are qualitative research and quantitative research (Kratochwill, 2015). The
qualitative research refers to gathering the information which did not contain mathematical
techniques but includes the descriptive type of data which is not at all numerical. However, the
4
Research Methods for Privacy and Security Breaches Due to Readability of Terms and Conditions_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethics and Information Security Research Paper 2022
|13
|2659
|20

IEEE Transactions on Information Theory
|12
|2817
|14

Privacy Issues of IoT
|12
|3390
|89

Disadvantages of Cloud Services and Outsourcing Sensitive Data
|2
|636
|80

Application for Ethics Approval
|5
|505
|432

One of the Privacy Violation Incidence of Yahoo
|6
|2097
|434