While the Internet has altered and significantly enhanced our lives, this enormous network and its related tools have opened the door to an escalating number of security and privacy coercion from which individuals, families and business must protect themselves. The prominence on Internet Privacy has become more and more essential. The consequences of attacks can range from the placidly tiresome to the fully devastating.
Many concerned in online business assume that time alone will liquefy consumer concerns regarding the privacy and security of online shopping, yet people concerned argue that larger Internet experience and more prevalent promotion of the latent risks of online shopping will direct to amplified risk discernments. To date, no recognized research has scrutinized whether advanced levels of Internet practice are connected to higher or lower levels of apparent hazards and concerns about privacy and security of online shopping. In addition, the mounting body of consumer-oriented Internet research that is focusing on privacy- and security-related issues suggests that these issues may play a significant role in the development of online retailing. However, there has been little available research concerning how privacy and security issues relate to purchaser risk awareness and probable acquisition actions.
With the increase in convention of the Internet, certain concerns about security and privacy arise. In 1995 study of Kapowski, pornography, privacy violations, transaction security infringes, unsolicited e-mail and other questionable or illegal actions being conducted through internet have become hotly debated issues. Some see directives as the only answer to guard from unwelcome infringement; but due to the universal nature of the Internet, ruling will be tremendously difficult, if not impossible.
According to a survey conducted by Udo, security concerns are a major reason that users give for not shopping online. Many consumer organizations and government agencies provide tips on how to transact safely on the Internet by providing key information such as its return policy and privacy practices. In theory, consumers could choose not to patronize sites that fail to provide key information, but in practice, consumers do not search for this information, if at all, until after they have spent considerable time investigating a site’s product offerings.
The purpose of Udo’s study was to investigate the privacy and security concerns of internet users in order to establish a consensus among them. The survey data used in this study came from 158 participants. As indicated by the study findings, the majority of the online IT users today have serious concerns about their privacy and security while shopping on the Internet. They are also concerned about the safety and confidentiality of their e-mails. IT users do not only lose confidence in the technology but they also have very little hope that the government is capable of significantly reducing their concerns in the near future.
The majority of the internet users who participated in Udo’s study believed that the advancements in such technology as encryption and other security features are not sufficient to reduce their privacy and security concerns. Based on the responses of those who took part in the study, an overwhelming majority of employees prefer the organization to have policies for e-mail and Internet use and to also notify the employees of the policies.
Actually, the main security issue relevant to internet privacy is the people who sell private or personal information through the internet. This security issue is brought about by purchases or transactions made online. Individuals who access and sell private information are particularly dangerous as they are not concerned about confidentiality and protecting others’ privacy. While data brokers and hackers are known threats to internet security, people that develop profiles derived from illegally acquired personal data are big threats as well\. Illegal profiling has been occurring even before the internet was introduced. However, at that time, personal records are difficult to obtain. With online access, profiles containing various information, from the user’s activities, interests, location and contacts, can easily be acquired and sold to anyone who needs it for whatever purpose.
To a lesser degree, e-mail addresses and messages displayed on online groups are not private or secure and can be searched by anyone easily. The problem on Spam e-mailers is then the result. The main sources of information for spammers are postings on Usenet bulletin boards as well as mailing list servers. In some cases, spammers even extract e-mail addresses from user web browsers. Not only do spammers caused annoyance for users whose e-mail addresses had been extracted, but spam e-mails also cause significant costs to the users brought about by e-mail traffic.
In order to resolve these security issues, companies utilized various means of protection. One of which is through the installation of a firewall. A firewall is a means of securing internet users that is basically made up of a system of a group of systems, which serves as the enforcer of a control policy between two networks. In a way, a firewall works like a membrane of a computer system, wherein it could either block or permit traffic. Some firewalls however, emphasizes more on blocking traffic, while some are developed to stress more on permitting it. The main purpose of putting firewalls on computer systems is to hinder unauthorized internet users from accessing the user’s private networks, particularly the networks of major organizations or companies whose data are highly confidential.
Apparently, Schafer has noted that aside from firewalls, encryption is another useful measure in preventing internet security issues. Encryption is actually a process which changes a message into a sequence of coded numbers, which makes the message incomprehensible to users other than the intended recipient. The process of encryption utilizes mathematical algorithms for concealing private or confidential information. This is mainly used for protecting system files as well as e-mail messages (Levin). A number of other possible programs or software applications that could protect users for internet security problems are also used by organizations.
With respect to these discussions, security and privacy risks have been a common problem not only to individual but also to business organizations. Either caused by computer crimes or unethical work practices, security and privacy troubles direct to even greater unenthusiastic brunt such as organization losses, dwindled efficiency and abridged morale. Due to this dispute, organizations had picked to utilize a variety of crime preclusion schemes including encryption procedures, firewall installation and employee examination techniques. Based on discussions of this paper the use of technology to implement these crime preclusion techniques has been highlighted.
Despite the fact that schemes for checking internet privacy and security problems in organizational scenery are vital, appropriate management should be valued as well. Through appropriate or good management, the organization is able to converse efficiently with its internal and external associates concerning the implication of executing different security procedures. This practice also allows employers to hire successfully as well as build up distinct hiring guidelines and systems. Furthermore, appropriate management also allows organizations to monitor their security systems through established measures.
However, based on evaluation, both crime preclusion techniques and appropriate organization management have diverse roles in making security and privacy. Additionally, putting equivalent value on these two phases can direct to better organizational upshots such as sanctioned organizational members, protection of resources, ensured security and better work relations. Hence, rather than placing more assessment on organization management in consideration with the problem of modern security, organizations should give equal assessment to methods and knowledge. In this way, the attempts towards an improved security and privacy system are make the most of.
Credit:ivythesis.typepad.com
0 comments:
Post a Comment