Entrepreneurship Writing Assignment #10
VerifiedAdded on 2019/09/16
|5
|651
|167
Homework Assignment
AI Summary
This document presents a solved homework assignment focusing on legal commercial threats to privacy, particularly spamming, and offers solutions to avoid such issues. It also discusses the importance of personalizing online information and balancing what to disclose, emphasizing the need to protect business information. Furthermore, it addresses piracy practices and suggests solutions such as supporting anti-piracy innovations, encouraging joint industry actions, and pursuing international frameworks for intellectual property protection. The assignment includes references to support the arguments presented.

Writing Assignment #10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
Table of Contents
Question 1...................................................................................................................................................2
Question 2...................................................................................................................................................2
Question 3...................................................................................................................................................3
References...................................................................................................................................................4
Table of Contents
Question 1...................................................................................................................................................2
Question 2...................................................................................................................................................2
Question 3...................................................................................................................................................3
References...................................................................................................................................................4

2
Question 1
There are many legal commercial threats to your privacy that the other businesses pose in order
to gain profit. This is generally done by monitoring your activity, selling your information to
other companies, or by controlling what you see by manipulating search engines.
Out of all these ways, I personally find Spamming as the most irritating kind of threat.
Spamming is generally considered as using the media to send you unwanted messages
deliberately.
Spam is mostly referred to unwanted emails, and also includes those unwanted ads, text
messages, and other things which pop-up in between of your search. This way the businesses try
to irritate us with that information which we don’t want to read, or view.
Many Internet company technicians have set up "honey pots," or spam traps, in order to collect
spam and find out what spammers are doing so that they are able to develop anti-span software
In order to avoid such problems, you must not list your email addresses directly (Ferreira, 2016).
Even if you list it, then you must use some creative measures in order to make it difficult for
spambots to get to your emails. You can, therefore, use web forms which don't expose your
emails openly and are rather embedded in a form processing management solution which is
generally not visible to a spambot.
Question 2
You must go for personalization of your information. It means that you need to make a balance
between what you want to disclose online and what you do not want to disclose. For this, it is
Question 1
There are many legal commercial threats to your privacy that the other businesses pose in order
to gain profit. This is generally done by monitoring your activity, selling your information to
other companies, or by controlling what you see by manipulating search engines.
Out of all these ways, I personally find Spamming as the most irritating kind of threat.
Spamming is generally considered as using the media to send you unwanted messages
deliberately.
Spam is mostly referred to unwanted emails, and also includes those unwanted ads, text
messages, and other things which pop-up in between of your search. This way the businesses try
to irritate us with that information which we don’t want to read, or view.
Many Internet company technicians have set up "honey pots," or spam traps, in order to collect
spam and find out what spammers are doing so that they are able to develop anti-span software
In order to avoid such problems, you must not list your email addresses directly (Ferreira, 2016).
Even if you list it, then you must use some creative measures in order to make it difficult for
spambots to get to your emails. You can, therefore, use web forms which don't expose your
emails openly and are rather embedded in a form processing management solution which is
generally not visible to a spambot.
Question 2
You must go for personalization of your information. It means that you need to make a balance
between what you want to disclose online and what you do not want to disclose. For this, it is
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
advisable that you must remember that anything that you want to keep as private and over which
you want to maintain some control should not be posted on any social media platform (Roth,
2014). Also, it is recommended that you must not disclose any such information related to your
business over the internet which can be beneficial for your competitors and which might cause
your business a serious harm.
Question 3
Some people think that they can stop piracy practices by going under a different name or by
quitting to disclose anything on all social media. But this is not considered to be the best solution
(Delport, 2016). This can rather create problems for you as it might be possible that your
employees are not able to find you while searching for your name as you have already changed
your name. Some of the possible solutions to avoid such problems are as follows:
Supporting anti-piracy innovations which include the development of new technical
means
You must also encourage joint industry actions taken to fight against piracy, like ISP
implementation of a graduated response system.
You must pursue actively the international frameworks and action which are there to
protect intellectual property, including all digital content.
advisable that you must remember that anything that you want to keep as private and over which
you want to maintain some control should not be posted on any social media platform (Roth,
2014). Also, it is recommended that you must not disclose any such information related to your
business over the internet which can be beneficial for your competitors and which might cause
your business a serious harm.
Question 3
Some people think that they can stop piracy practices by going under a different name or by
quitting to disclose anything on all social media. But this is not considered to be the best solution
(Delport, 2016). This can rather create problems for you as it might be possible that your
employees are not able to find you while searching for your name as you have already changed
your name. Some of the possible solutions to avoid such problems are as follows:
Supporting anti-piracy innovations which include the development of new technical
means
You must also encourage joint industry actions taken to fight against piracy, like ISP
implementation of a graduated response system.
You must pursue actively the international frameworks and action which are there to
protect intellectual property, including all digital content.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
References
Roth, S. (2014). The eye-patch of the beholder: introduction to entrepreneurship and piracy.
International Journal of Entrepreneurship and Small Business, 22(4), 399-407.
Ferreira, C. (2016). How can efficiently and effectively align its e-mail marketing efforts to
create engagement and avoid spam? (Doctoral dissertation).
Delport, P. M., Gerber, M., & Safa, N. S. (2016, August). An interactive visual library model to
improve awareness in handling of business information. In Information Security for South Africa
(ISSA), 2016 (pp. 18-26). IEEE.
References
Roth, S. (2014). The eye-patch of the beholder: introduction to entrepreneurship and piracy.
International Journal of Entrepreneurship and Small Business, 22(4), 399-407.
Ferreira, C. (2016). How can efficiently and effectively align its e-mail marketing efforts to
create engagement and avoid spam? (Doctoral dissertation).
Delport, P. M., Gerber, M., & Safa, N. S. (2016, August). An interactive visual library model to
improve awareness in handling of business information. In Information Security for South Africa
(ISSA), 2016 (pp. 18-26). IEEE.
1 out of 5
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




