Critical Analysis: Privacy, Web Data, and Case Studies - WEB302

Verified

Added on  2023/04/20

|8
|2159
|393
Essay
AI Summary
This essay delves into the critical aspects of web data privacy, examining its multifaceted dimensions including data protection, information privacy, and data security. It explores the relationship between data use, collection, and broadcasting, considering the ethical, technological, and legal challenges surrounding web data. The essay defines privacy in the context of the internet, emphasizing its significance in e-commerce and the risks associated with data breaches. It discusses various threats like phishing, spyware, and malware, and suggests preventative measures. Furthermore, the essay presents real-world case studies, including the Ashley Madison data breach and the SingHealth cyberattack, illustrating the consequences of privacy violations and the importance of robust security protocols. The analysis extends to the broader social context, considering the role of web metrics, data retention policies, and the implications of surveillance. The essay concludes by highlighting the need for comprehensive data protection practices, faultless security protocols, and continuous employee training to prevent privacy breaches, emphasizing the costly consequences of neglecting data security.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ESSAY 0
WEB COMMUNICATIONS
FEBRUARY 8, 2019
STUDENT DETAILS:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ESSAY 1
The privacy related to use and collection of web data also known as data protection,
information privacy, and data privacy. It is considered as relation between use and collection
of data, broadcasting of data, the general expectations of the privacy, technologies, and
administrative and legal problems surrounding them. The privacy concern presents where
own recognised data or other confidential data is composed, stored, utilised and lastly ended
in digital procedure or other procedure. The inappropriate, inadequate, or missing discovery
control may be the reason for the issue of privacy of data. In the following parts, the
definition of term privacy, case study related to privacy of web data and the contribution of
privacy to the broad understanding of web data and web metrics is discussed and critically
examined.
The privacy refers to the protection level of the information or data issued by way of internet.
The privacy term is comprehensive expression. This expression refers to the varieties of
elements, technologies and tool utilised to secure the personal information, confidential data,
communication, and choices. The privacy of web data or internet privacy is also called as
online privacy (Fu 2018). The data privacy and secrecy are supreme for the users, specifically
as e-commerce keeps continue to get traction. The breach of privacy and warning risks are
usual deliberations for the websites under development. The privacy related to web data
involves the phishing, spyware, pharming, and malware. The risks related to internet privacy
can be reduced by using defensive software applications like firewall application, anti-virus
application and anti-malware application. The users should ignore to shop on untrustworthy
website. The users should ignore to expose private information on sites with low protection
level. It is required to clear the cache of browser constantly. It is also required to clear the
browsing history on regular basis. The users should make very secure password containing
the special character, letters, and the numerical (Bretas 2017).
Document Page
ESSAY 2
The issues of privacy are increasing day by day, particularly as technologies and net have
created private data more accessible and simpler to gather and alter. The issues related to data
privacy can arise regarding the data from the wider range of resources like record related to
health, the proceeding and investigation related to the criminal justice, breaching privacy,
financial organisations, transaction related to finance, geographical records, records of
residence, locational service, research study of education and web surfing conduct. The
challenges of data privacy are to utilise the information securing the security preference of
persons and their own recognised data. The rules and regulations in respect of the data
security and privacy are continually modifying, so it is significant to keep well informed of
these amendments in the privacy rules and regulations ("Nilpotency of derivations" 2017).
There are various expressions used to define the science of making record and understanding
website data and figures. Web analytics, web stats, web metrics, and site stats are good
illustrations. The web analytics refers to the procedure of evaluating the conduct of people to
the Website. The practice of Web analytics is said to make able the business to attract more
people, keep, and influence the different clients for the service or product, or to enhance the
dollar volume every person expends. With the help of web metrics, business can be tracked
easily. The term metrics of web metrics refers to the extent, the science of making the
measurement of websites. Specially, determining the event related to website, and taking out
the tendencies. On behalf of open trackers, those events are social connects (Parker 2017).
The Internet privacy argument is mainly centred on tracing the cookies. The web metrics and
data ensures the privacy. For an example, Google Analytics only traces aggregated and
anonymous traffic to the particular website for the advantages of the owners of website. This
data is not passed nearby web. When the visitors leave the website, the Google Analytics
tracing on the site end. Even if the visitors go to other sites, which use the Google Analytics.
It is also required to know what information the site is gathering and reduce security
Document Page
ESSAY 3
implications by decreasing the tracking encouragements to the minimum. In the case where
taking Personally Identifiable Information, then it is required to end or discontinue. There is
very slight value in tracing the particular people on web (Niggli and Maeder 2014). Though,
reason of corporations that regulate the net window, which people access like Firefox, Apple,
Google, Yahoo, MS office, Twitter and other emerging organisations such as Samsung for
android mobiles, LED and Smart television, all have ability to link the unconnected data
dot. On condition that the data stays unidentified and aggregate, there is no damage in that
(Taleqani 2018).
Further, the data retention scheme of central government formally came into effect for some
times, implicating metadata of mobile of everyone and online interactions have begun to be
composed and would be kept for minimum 2 years and put at inspection of central protection
organizations or authorities (Filonov 2016). As per the changes, the criminal law
administration and intelligence organisations like Australian Security Intelligence
Organisation and Australian Federal Police would be capable to rapidly self-authorise access
to collected metadata in best interest of the central protection (Ha 2017).
These debateable laws have been passed in year 2015. The governments have passed these
debateable laws to make compulsion for the telecommunication provider to keep the
metadata from the operators for minimum 2 years (Lobato 2014). The AG, George Brandis
made the comparison between letter in the post and metadata. It is stated by him that the
metadata refers to the address and name on cover. It is not the letter’s contents. To ensure the
privacy, the fields of data to be kept, and provided to government involve the recognising
data connected to account subscribers with service provider, contact number, and mail id of
people according with detail of bills of telecommunication organisations. It also involves
location of communication and means of the communication. The dates, period and durations
of interaction or details recognising the connections to internet services like Wi-Fi and
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
ESSAY 4
Asymmetric Digital Subscriber Line (Stewart 2007). This also includes kinds of
communication and services related to internet.
Furthermore, Ashley Madison leak case is milestone case. This case is the most disreputable
cyber-attack in the history. Ashley Madison agonised the major security violation in year
2015 that discovered over three hundred GB of operator data, involving real name of
operators, data related to banking, transaction through credit card. However, the concerns of
this cyber-attack were poorer. The case of Ashley Madison was the good illustration of the
security management negligence. After the Ashley Madison leak case, the messages have
been sent to the owner of site by hacking groups ‘control team’ to threaten them and
condemning the bad faith or corporation (Blyth 2004). However, the website did not provide
in to demand of hacker and these made responses by making release of private information of
the various operators. They made justification of the actions on grounds, which Ashley
Madison lied to the operators and did not secure the information appropriately.
For an illustration, it is claimed by Ashley Madison that the operators can have the private
accounts totally removed for nineteen dollars. The information related to purchasing were not
deleted and involved the actual name and real address of the operators. Hence, as per these
reasons, it is decided by the hacking team to give the punishment to the organisation. The
hacking team imposed fine of 30$ million. It is required by the organisations to use all the
essential resources to ensure that they did not make any error or blunder related to the
security and privacy of personal data ("ANZCA News" 2016).
The other example of cyber-attack is case of Sing Health, which is biggest healthcare
institution group in Singapore. The data of the patients, who visited the clinic from 1st May
2015 to 4 July 2018, had unlawfully accessed. The Integrated Health Information Systems
detected it and instantly take measures such as block the connection to stop more copies,
Document Page
ESSAY 5
review the database properly, enforcing the restriction on the regulating access, and change
the passwords of database. After conducting the forensic enquiry in respect of this cyber-
attack, information was given to Cyber Security Agency and Ministry of Health. After this,
Sing Health filed the FIR in police station and established the connection with those patients
and notified them about the violation. Further, Sing Health has made separation of the net
suffering for short-term on the laptops and computers of all the workers. CSA also took the
steps to increase the complex data structure system instantly. Various technologies have been
introduced to monitor the cyber-security ("Singapore’s Worst Cyber Attack: How It
Unfolded" 2019).
As per the above analysis, it can be concluded that the operators are required to get education
in respect of the great protection practices. The requirement for the companies to make
faultless protection protocols and the approaches is marked. The only method to stop the
issues related to privacy is to apply the exact protocols to check and review the acts of
employees. The organisation should not miss the vision of the significance of making the
complete system protected. Otherwise, it can be very much costly consequences.
Document Page
ESSAY 6
References
"ANZCA News". 2016. Media International Australia 160 (1): 5-5.
doi:10.1177/1329878x16662109.
"NILPOTENCY OF DERIVATIONS". 2017. IRAQI JOURNAL OF SCIENCE 58 (2C).
doi:10.24996/ijs.2017.58.2c.12.
Blyth, Andrew. 2004. "Secure Coding — Principles And Practices". Infosecurity Today 1 (3): 46.
doi:10.1016/s1742-6847(04)00071-0.
Bretas, Arturo S. 2017. "Smart grids cyber-physical security as a malicious data attack: An
innovation approach." Electric Power Systems Research 149 (2): 210-219.
Filonov, Pavel. 2016. "Multivariate industrial time series with cyber-attack simulation: Fault
detection using an lstm-based predictive data model." arXiv preprint arXiv:1612.06676.
Fu, Jian. 2018. "A Sequential Coordinated Attack Model for Cyber-Physical System
Considering Cascading Failure and Load Redistribution." In 2018 2nd IEEE Conference on
Energy Internet and Energy System Integration (EI2), pp. 1-6. IEEE.
Ha, Louisa. 2017. "Outstanding Research Article Award And Reader Participation In
Journalism & Mass Communication Quarterly". Journalism & Mass Communication
Quarterly 94 (1): 5-11. doi:10.1177/1077699017691518.
Lobato, Ramon. 2014. "Piracy And Promotion: The Double-Edged Power Of Crowds". SSRN
Electronic Journal. doi:10.2139/ssrn.2568469.
Niggli, Marcel Alexander, and Stefan Maeder. 2014. "Punishment And Security". Asian
Journal Of Criminology 9 (3): 189-203. doi:10.1007/s11417-014-9185-7.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ESSAY 7
Parker, Thomas W. 2017. "System and method for forensic cyber adversary profiling,
attribution and attack identification." U.S. Patent 9,661,003, issued May 23, 2017.
"Singapore’S Worst Cyber Attack: How It Unfolded". 2019. The Straits Times.
https://graphics.straitstimes.com/STI/STIMEDIA/Interactives/2018/07/sg-cyber-breach/
index.html.
Stewart, Tom. 2007. "New Forms Of Organisation And Communication". Behaviour & Information
Technology 26 (5): 353-354. doi:10.1080/01449290701597548.
Taleqani, Ali Rahim. 2018. "Machine Learning Approach to Cyber Security in Aviation."
In 2018 IEEE International Conference on Electro/Information Technology (EIT), pp. 0147-
0152. IEEE.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]