Data Security, Privacy, and Online Threats: A Research Report

Verified

Added on  2023/06/06

|12
|427
|237
Report
AI Summary
This report presents a research analysis on cybersecurity and data protection, focusing on online threats and the importance of data privacy. The study involved a survey of 64 respondents, exploring their perceptions of online security, trust in social media, and awareness of data theft. Key findings include insights into the significance of financial data protection, the role of government in data security, and the impact of mobile applications on personal information. The report also outlines practical steps to enhance data security, such as using security shields, regularly updating passwords, and being aware of website security certificates and malware. Statistical analyses, including the Shapiro-Wilk test and discriminant analysis, were employed to interpret the data. The report concludes with a discussion of the limitations and implications of the research, providing a foundation for further exploration in this critical area of digital security.
Document Page
Presented By:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security and data protection refer to the
protection of online information.
Due to ever increasing Internet traffic, the trespassing
threats to access the personal and financial data have
a massive increase (Colombo, and Ferrari,
2015).
The importance of identifying the privacy of online
data and restricting the access to limited applications
has to be understood.
Introduction
Document Page
Trust on online
security
Access to
Protected Data in
Cyber World
Awareness about
data Privacy and
Access
Identifying the
Primary Factors
Document Page
Survey for response collection
on the research topic was done
in Survey MonkeyDemographical exploration revealed 58.1% male
and 40.3% female respondents.
Age distribution was highly skewed towards age
group of 10-25 and 25-40 with a total of 80.6%
response.
Total eight questions regarding
data security and privacy were
framed in order of difficulty.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Major Identified Areas
Trust on Social Media (43.6%)
Satisfaction with online security (36.1%)
Government as a stakeholder in data security (50.0%)
Allow mobile applications to collect personal information (29.0%)
Practices of online security (59.7%)
Awareness about sensitivity of data theft (80.6%)
Realising the importance of financial data theft (58.1%)
Document Page
Steps as Solution
Installation of a security shield to protect encrypted
data
Regular alteration of security data, e.g. passwords
Frequent cross check mobile application
permissions
Awareness about security
certificates of websites, particularly
for financial transactions
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Be Aware of
M a l w a r e
Permissions
Phishing
Document Page
Password Protection
Using alpha numeric passwords
Using unique password for different websites
Document Page
Conclusion
Data exploration was based on 64 responses, hence the
analysis was semi quantitative in nature (Chen, Mao,
and Liu, 2014).
The data was found to be normal with Shapiro-Wilk test
Discriminant analysis revealed female as a significant
function (Heeringa, West, and Berglund,
2017.)
Factor analysis identified three factors as primary
contributors
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Document Page
REFERENCES
Chen, M., Mao, S. and Liu, Y., 2014.
Big data: A survey. Mobile
networks and applications, 19(2),
pp.171-209.
Colombo, P. and Ferrari, E., 2015.
Privacy aware access control for
Big Data: a research roadmap. Big
Data Research, 2(4), pp.145-154.
Heeringa S.G., West, B.T. and
Berglund, P.A., 2017. Applied
survey data analysis. Chapman
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]