logo

The greater part of the current security

   

Added on  2022-08-20

28 Pages6341 Words11 Views
MSc
Informatio
n Systems
Manageme
nt
Pxxxxxxxx
De Montfort
University
DO NOT INCLUDE
YOUR NAME AS THE
Assignment - Project
Proposal
‘A study on role of privacy and anonymity in computing and
information technology in the context of Tesco’
IMAT5262 Research,
Ethics &
Professionalism in
Computing

P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
Abstract
The key aim of this investigation is to evaluate role of privacy and anonymity in computing
and information technology with respect to Tesco. This report addresses different chapters
such as introduction, LR (literature review), RM (research methodology), data analysis and
findings, conclusion and recommendation. Furthermore, introduction chapter supports to
know different chapters such as research background, significance of investigation, aim and
objectives of research. It supports to know the depth understanding of investigation issue.
The literature review chapter supports critically evaluates role of privacy and anonymity in
computing and information technology with respect to Tesco. In this study, quantitative
research methods have been practiced by incorporating survey through questionnaire method.
In addition, data analysis and findings chapter demonstrate privacy and anonymity in
computing and information technology plays an imperative role in meeting aim and purpose
of investigation issue. The conclusion chapter depicts that information technology has
positive impacts in making the privacy of data.
Key Words
Privacy, anonymity, information technology, data privacy, and computing
1

P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
Contents
1. Background.......................................................................................................................3
Research aim and objectives...................................................................................................4
2. Research questions............................................................................................................4
3. Literature Review.............................................................................................................5
Past developments and history...............................................................................................5
4. Methodology Review.........................................................................................................9
6. Conclusion.......................................................................................................................15
7. References........................................................................................................................16
APPENDICES........................................................................................................................19
8. Project Plan.....................................................................................................................19
10. Consent Form.....................................................................................................................2
11. Pilot study...........................................................................................................................5
2

P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
1. Background
In the retail sector, it is quite complicated for balancing data privacy by getting competitive
benefits. The retailer’s requisite the customer data for delivering products, evaluate the
customer profile, as well as offering modified services. In addition, the capability to survive
the organization in the marketplace is depending on how much they know about the existing
as well as new consumer’s needs. It could make differentiate the organization as compared to
other companies. Moreover, it is evaluated that current tools facilitate to easily understand the
needs of consumers and make their products and services.
With respect to getting higher benefits, the organization should need to which services are
more accessed by the customers. Moreover, it is illustrated that consumer cannot endure
anymore as well as data is subject to be shared with third parties named as advertisers. In
addition, it is examined that many researchers have identified data privacy as a sectorial as
well as national level phenomenon (Xu, et al., 2014). In addition, it is evaluated there is the
gap in our knowledge of company strategies which type of data is collected by instore as well
as online shopping, as well as how it can affect the data privacy.
It is illustrated that the organizational level of data privacy behavior as companies was
handling individual data. Since most of the study on privacy has not identified wider
managerial as well as organizational concerns. It seems to be the mismatch where the
companies are worried about data privacy but studies rarely reflect this level of evaluations in
its researchers. It is illustrated that the collection of individual data become an effective
theme during the 1970s before World wide web developed new sales methods for online
retailing in the 1990’s. Moreover, many firms tried to take benefit of this tool in reaching
customers as well as it was argued that a successful retailer has using both physical as well as
online stores. These sources would support to increase the profitability of the firm (Barocas
and Nissenbaum, 2014).
3

P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
Research rationale
This study is significant for gathering data regarding concepts as well as anonymity usually
misunderstood within the digital way. From the application of this tool, this investigation
would be significant to capture data related to investigation matter. This study supports
comprehending different research methods named as qualitative and quantitative technique.
This study could support to get the technical information that would support to effectively
conducting the study (Al Omar, et al., 2017).
Research aim and objectives
The key purpose of this investigation is to examine role of privacy and anonymity in
computing and information technology with respect to Tesco. Following research objectives
are considered by investigator to achieve the aim of research purpose:
To comprehend role of privacy and anonymity in computing and information
technology with respect to Tesco
To explore factors affecting privacy as well as anonymity in computing and
information technology with respect to Tesco
To recommends strategies in improving the privacy as well as anonymity in computing and
information technology with respect to Tesco
2. Research questions
The following research questions are considered by the investigator to meet the research
purposes:
What is the role of privacy and anonymity in computing and information technology
with respect to Tesco?
Which factors affecting the privacy as well as anonymity in computing and
information technology with respect to Tesco?
Which strategies are effective in collecting improving organizational performance?
4

P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
3. Literature Review
Past developments and history
Acquisti et al. (2015) stated that privacy is associated with the content. Refraining by public
eye as well as keeping confidentiality. Another method of privacy can be to record with the
cloud storage offers named as drop box. It will mean the individual will understand who is
long as have encrypted files as well as only have a key to decrypt such files then information
is private. In such a situation, an individual has privacy. It is illustrated that anonymity is
when an individual comprehend that they are but potentially they comprehend what are you
doing.
In such way, while an individual complete their practices and exercise something differs as
compared to their character. For example, there are large number of availability of
individuals but there are equivalent chances for each one to perform their tasks. This setting
can deal for assessing the content however it is not developed yet. In contrast to this, Kear et
al. (2014) addressed that the control of the interchanges and the progression of data are
obligatory for any substance that plans to oversee the general public. There are numerous
substances with such interests: governments, organizations, autonomous people, and so forth.
The majority of the exploration accessible on the subject cases that the primary originators of
the dangers against security and secrecy are legislative establishments and large corporations.
The inspirations driving these dangers are changed. All things considered, they can be
characterized under four classifications: social, political, mechanical and conservative. In
spite of the connection between them, the four classes have various foundations.
Social & political motivations
Zhang (2018) stated that human interaction is the best way of conducting the research in an
imperative way. Internet is best tool for social interaction as it is famous in the current time.
Popularity as well as enables that internet provides fundamental assent for society.
5

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Difference Between Professionalism And Ethics
|23
|5788
|12

IMAT5262 Research, Ethics & Professionalism in Computing : Assignment
|28
|4390
|18

IMAT5262 Research, Ethics & Professionalism in Computing
|25
|3691
|112

IMAT5262 : Research, Ethics & Professionalism in Computing
|25
|4532
|88

Exploring the Role of Ethics in Shaping Professional Responsibilities of ICT Professionals
|25
|5122
|448

Impact of Codes of Ethics on Professional Responsibilities
|25
|5103
|259