Report: Network Management and Personal Privacy in Organizations
VerifiedAdded on 2020/10/04
|12
|1516
|35
Report
AI Summary
This report delves into the realm of network management within organizations, with a specific focus on the threats to personal privacy posed by emerging networking technologies. It highlights key issues such as online shopping scams, social media scams, and the interception of email messages. The report analyzes these issues, discussing the prevalence of online fraud, the misuse of social media, and the ethical concerns of email monitoring. It evaluates the impact of these issues on individuals and businesses, concluding that there is a growing need for increased data security. The report provides an overview of the challenges and consequences of network management and the importance of protecting personal information in the digital age.

Network Management in
Organisations
Organisations
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
INTRODUCTION..............................................................................................................................1
TASKS............................................................................................................................................. 1
Most important issues to personal privacy...........................................................................1
Analysation of personal privacy issues.................................................................................3
Evaluation of above mentioned issues.................................................................................4
CONCLUSION................................................................................................................................. 4
REFERENCES................................................................................................................................. 10
INTRODUCTION..............................................................................................................................1
TASKS............................................................................................................................................. 1
Most important issues to personal privacy...........................................................................1
Analysation of personal privacy issues.................................................................................3
Evaluation of above mentioned issues.................................................................................4
CONCLUSION................................................................................................................................. 4
REFERENCES................................................................................................................................. 10

INTRODUCTION
A network involves two or more computers that are connected with each other in order to share
resources (like CDs and Printers), exchanging files or allowing to do electronic communications.
Computers on a network might be connected via radio waves, cables, infrared light beams, satellites,
telephone lines, etc. In information technology, networking is the construction, design and uses of a
network that involves physical (hub, router, cabling, etc.), the selection and use of telecommunication
protocol for utilising and managing the network (Blaschke, Schoeneborn and Seidl, 2012). In this
technological era , every thing is connected to network. Most of the sophisticated data are stored in
clouds so that it can be used from anywhere. But there are various issues associated with the storing as
well as transferring the data. As all of these activities are happening on network, there is a threat to the
security of those data because hacking is increasing day on day and important information of people are
hacked by hackers. This creates varuious serious problems. . The present report is based on the network
management in organisation whereby threats to personal privacy posed by the emerging networking
technologies is explained.
TASKS
Most important issues to personal privacy
There are various issues to the personal privacy that is being posed by emerging networking
technologies. Some of the important ones are listed below:
Online shopping scam: People commonly do online shopping. There are several security related
threats available there. Theft and fraud are increasing over internet day by day. Intruders easily
steals the debit card number and take money from the accounts of people (Cross, Smith and
Richards, 2014). This has been shown in different cases when people share their bank details to
certain websites. Those websites may be fake or information of people are leaked due to less
secure web page.
1
A network involves two or more computers that are connected with each other in order to share
resources (like CDs and Printers), exchanging files or allowing to do electronic communications.
Computers on a network might be connected via radio waves, cables, infrared light beams, satellites,
telephone lines, etc. In information technology, networking is the construction, design and uses of a
network that involves physical (hub, router, cabling, etc.), the selection and use of telecommunication
protocol for utilising and managing the network (Blaschke, Schoeneborn and Seidl, 2012). In this
technological era , every thing is connected to network. Most of the sophisticated data are stored in
clouds so that it can be used from anywhere. But there are various issues associated with the storing as
well as transferring the data. As all of these activities are happening on network, there is a threat to the
security of those data because hacking is increasing day on day and important information of people are
hacked by hackers. This creates varuious serious problems. . The present report is based on the network
management in organisation whereby threats to personal privacy posed by the emerging networking
technologies is explained.
TASKS
Most important issues to personal privacy
There are various issues to the personal privacy that is being posed by emerging networking
technologies. Some of the important ones are listed below:
Online shopping scam: People commonly do online shopping. There are several security related
threats available there. Theft and fraud are increasing over internet day by day. Intruders easily
steals the debit card number and take money from the accounts of people (Cross, Smith and
Richards, 2014). This has been shown in different cases when people share their bank details to
certain websites. Those websites may be fake or information of people are leaked due to less
secure web page.
1
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

(Source : How to deal with online scams and other scenarios, 2017)
Social media scam: In this world, everyone is using various types of social media for connecting
with their friends and relatives like Facebook, Twitter, What's app, etc. ( Garrigos-Simon,
Lapiedra Alcami and Barbera Ribera, 2012) at those social media platforms. people share their
images and various messages with one another. The accounts of people are hacked and their
personal information are used by malicious users like their images or some messages. This is
commonly done in the case of female users. Their accounts get hacked and their images are
used by others. They do editing on it and make their nude pictures and upload to various sites
(Alexander, 2013). This causes a serious damage to their status. Sometimes private moments
spend by any couple get viral on some official websites. This is done by other who may be their
friends or relatives. They make their video and leak in various official websites. This is a serious
threat to personal privacy. Girls do suicide in such cases.
2
Illustration 1: How to deal with online scams and other
scenarios
Social media scam: In this world, everyone is using various types of social media for connecting
with their friends and relatives like Facebook, Twitter, What's app, etc. ( Garrigos-Simon,
Lapiedra Alcami and Barbera Ribera, 2012) at those social media platforms. people share their
images and various messages with one another. The accounts of people are hacked and their
personal information are used by malicious users like their images or some messages. This is
commonly done in the case of female users. Their accounts get hacked and their images are
used by others. They do editing on it and make their nude pictures and upload to various sites
(Alexander, 2013). This causes a serious damage to their status. Sometimes private moments
spend by any couple get viral on some official websites. This is done by other who may be their
friends or relatives. They make their video and leak in various official websites. This is a serious
threat to personal privacy. Girls do suicide in such cases.
2
Illustration 1: How to deal with online scams and other
scenarios
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

(Source : Aaron stem, 2017)
Interception and reading of email messages: The interception and monitoring of Email
messages. This creates an ethical issue which is related to the private communication of an
individual (Laudon and Laudon, 2013). It is possible technically to intercept message that are
send via Email and their monitoring or reading. This is generally done in corporations as they
check that their employees are using their resources for doing job or using those facilities for
their private gossips.
3
Interception and reading of email messages: The interception and monitoring of Email
messages. This creates an ethical issue which is related to the private communication of an
individual (Laudon and Laudon, 2013). It is possible technically to intercept message that are
send via Email and their monitoring or reading. This is generally done in corporations as they
check that their employees are using their resources for doing job or using those facilities for
their private gossips.
3

Analysation of personal privacy issues
Online shopping is being done by approx. more than half of the population of Australia. This
offers golden opportunities to the malicious users or hackers to do online shopping scams. Different
users make their fake e-commercial websites and attract consumers by giving their offers related to
price or some additional gifts. People gets attracted as a result and purchase various commodities from
those websites and pay them money (Levine, Thompson and Messick, 2013). But their order they do
not receive their purchased commodities. And when they cross check and try to contact them, they see
there is no such company present at that link. Such type of fake e- commercial websites exists only for
one or two days and collect large amount of money by making people fool. Some times when users buy
anything from online websites, they share their bank details. Those details are hacked by malicious
users. They use those information for their own works.
Online social media scam is also increasing day by day . All of the people use various social
networking sites like Face book, Instagram, Pinterest, Flickr, etc. and share their images there.(Reisig
and Holtfreter, 2013) Intruders hack their accounts and take their images from there and do editing on
it. Sometimes, they make nude images by doing editing and leak on various websites. . This is commonly
done to take revenge. Nowadays, videos of people spending their personal moments with their
girlfriends, wives, etc. are getting viral very rapidly.
Most of the companies checks the emails of their employees for monitoring their day to day
activity. This is a threat to their personal privacy (Peppard and Ward, 2016). They are not having
permission to use resources of office for their personal use as corporation wants only official work from
their workers.
Evaluation of above mentioned issues
Online shopping and social networking sites scam has been affecting the personal privacy of
civilians adversely. Now people live in a fear that they can be cheated by anyone and due to that they
are taking minimum use of such websites. This creates a negative impact on the business of e-
commercial websites as they are facing loss in their businesses. In various firms, employees are getting
fired from their jobs as their personal talks or gossips are being detected by their owners. Girls mostly
commit suicide when their images or video gets leaked or become viral.
CONCLUSION
From the above report, it has been concluded that there is a rapid growth in networking
technologies. In-spite of its various benefits, there are some limitation also. The threat to personal
4
Online shopping is being done by approx. more than half of the population of Australia. This
offers golden opportunities to the malicious users or hackers to do online shopping scams. Different
users make their fake e-commercial websites and attract consumers by giving their offers related to
price or some additional gifts. People gets attracted as a result and purchase various commodities from
those websites and pay them money (Levine, Thompson and Messick, 2013). But their order they do
not receive their purchased commodities. And when they cross check and try to contact them, they see
there is no such company present at that link. Such type of fake e- commercial websites exists only for
one or two days and collect large amount of money by making people fool. Some times when users buy
anything from online websites, they share their bank details. Those details are hacked by malicious
users. They use those information for their own works.
Online social media scam is also increasing day by day . All of the people use various social
networking sites like Face book, Instagram, Pinterest, Flickr, etc. and share their images there.(Reisig
and Holtfreter, 2013) Intruders hack their accounts and take their images from there and do editing on
it. Sometimes, they make nude images by doing editing and leak on various websites. . This is commonly
done to take revenge. Nowadays, videos of people spending their personal moments with their
girlfriends, wives, etc. are getting viral very rapidly.
Most of the companies checks the emails of their employees for monitoring their day to day
activity. This is a threat to their personal privacy (Peppard and Ward, 2016). They are not having
permission to use resources of office for their personal use as corporation wants only official work from
their workers.
Evaluation of above mentioned issues
Online shopping and social networking sites scam has been affecting the personal privacy of
civilians adversely. Now people live in a fear that they can be cheated by anyone and due to that they
are taking minimum use of such websites. This creates a negative impact on the business of e-
commercial websites as they are facing loss in their businesses. In various firms, employees are getting
fired from their jobs as their personal talks or gossips are being detected by their owners. Girls mostly
commit suicide when their images or video gets leaked or become viral.
CONCLUSION
From the above report, it has been concluded that there is a rapid growth in networking
technologies. In-spite of its various benefits, there are some limitation also. The threat to personal
4
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

privacy is increasing day by day. . The impacts of social networking sites, online shopping and email
checking in offices are described in this report.
5
checking in offices are described in this report.
5
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

6

7
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

8
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

9

10
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.