online privacy discussion

answer the questions on the discussion, please. there are 4 questions answer them clearly. see the attached file.please do not do it as Essay. I need you to answer each question by order you put the qestion and the answer under it. do not use contractions when you write like ” don’t, can’t, couldn’t etc..”thank you
how_protected_is_your_online_privacy.docx

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
online privacy discussion
Just from $13/Page
Order Essay

How Protected Is Your Online Privacy?
“Solitude and privacy have become more essential to the individual; but modern
enterprise and invention have, through invasions upon [personal] privacy, subjected
[individuals] to mental pain and distress. In this, as in other branches of commerce,
the supply creates demand.”
This quotation appeared in the Harvard Law Review. Besides the sobering sentiment
ex-pressed, the more startling fact is that it was written in 1890, more than 120 years
ago! Technology, whether it is in the 1890s or 2010s, can violate our sense of privacy
as individuals. Consider these examples:
• Malicious programs launched by hackers spread through Facebook and Twitter accounts in 2009, taking over people’s accounts and sending out messages to the users’
friends and followers. One user found out five days later that his account had been
sending out lingerie ads to all of his professional acquaintances.
• When Google introduced Buzz, its answer to Facebook and Twitter, in 2010, users
found themselves with an instant, and in many cases unwelcome, collection of
“friends,” automatically selected by Google from their e- mail contact lists. The users
complained that their e- mail information contained names of personal physicians
and illicit lovers, as well as the identities of whistle- blowers and antigovernment
activists, most of whom would not want their identities made available to these
“friends.”
• In 2010, a Wall Street Journal investigation discovered that Facebook regularly
trans-mitted identifying information— providing access to peoples’ names and in
some cases their friends’ names— to dozens of advertising and Internet tracking
companies. These firms used the information to build user profiles to market new
apps or games. The use of apps was a growing source of revenue for Facebook since it
sold virtual currency that could be used to pay for games. This activity affected tens of
millions of Facebook users, including people who set their profiles to Facebook’s
strictest privacy settings.
• The Wall Street Journal probe revealed that MySpace also had been transmitting
information to advertising companies that could be used to identify users. Users’
information was sent, without their knowledge, once they clicked on ads on the
MySpace website. At that time, MySpace had 58 million visitors monthly in the
United States.
As this epidemic of privacy violations became public, many organizations, including
the social network companies and the U. S. government, pledged to correct the
situation. Some businesses, such as Microsoft and McAfee, saw this situation as an
opportunity to offer online consumers software to protect them from online
monitoring. Other companies offered users a commission every time their personal
details were shared with marketing companies. “Data is a new form of currency,” said
a technology executive. The reasoning seemed to be that if the online advertising
industry was bringing in $ 26 billion a year in sales from accessing this information,
the consumers should share in the profits.
Apple, Facebook, and Google also took the offensive and created plans to better
protect their customers. In 2011, Apple announced it would no longer automatically
track an iPhone’s location, but download a subset, or cache, of the database from each
phone. This limited access to data prohibited Apple from locating the user who was
using WiFi or a cell phone. While Apple needed to track its users to provide better
service— for example, to identifying WiFi hotspots and cell towers— the new
software would reduce the size of the data-base cached on the phone, cease backing
up the cache, and delete the cache entirely when the location tracking feature was
turned off.
Facebook acknowledged the security vulnerabilities found in the Wall Street
Journal investigation and reported that they had addressed the problem in 2011.
“We’ve conducted a thorough investigation, which revealed no evidence of this issue
resulting in user’s private information being shared with unauthorized third parties,”
the company stated. “[Facebook has a] strong policy enforcement and technical
measures that allow us to quickly catch and take action against suspicious behavior on
the platform.”
Google also was caught up in the Wall Street Journal investigation. It had allegedly
used a special computer code that tricked the Safari web- browsing software to allow
Google to monitor users’ activities. Safari was designed to block such tracking by
default. Google reported in 2012 that it had disabled its code after being contacted by
theWall Street Journal, although the company maintained that “ The [Wall Street]
Journal [investigation] mischaracterize[ d] what happened and why.”
Finally, legislators also took action. Senators John Kerry and John McCain introduced
a “privacy bill of rights,” which included a “do not track” provision patterned after the
“do not call” law that allowed people to block telemarketing calls to their phone. The
pro-posed law would impose strict rules on companies that gather personal data,
including requiring that people be given the right to access data collected about them
and to block the information from being used or distributed. Although the Internet
industry had resisted legislative controls for more than a year, a coalition of Internet
giants joined the White House in support of the Kerry- McCain “do not track”
provision. This provision allowed for a button to be embedded in most web browsers
to give people greater control over the personal data collected about them.
Yet, some experts questioned whether these measures would be enough. They
pointed to powerful new methods of tracking, such as ones found on MSN.com and
Hulu.com, that were almost impossible for computer users to detect. These new
techniques were called “supercookies.” These supercookies were similar to a
traditional cookie, a small file routinely installed on users’ computers to track their
activities online, but were capable of recreating users’ profiles after people deleted
regular cookies.
Sources: “Technology Outpaces Privacy (Yet Again),” The New York Times,
December 11, 2010, www.nytimes.com; “Crooks Hijack Facebook Accounts, Injuring
Dignity,” The New York Times, December 14, 2009, www.nytimes.com; “Critics Say
Google Invades Privacy with New Service,” The New York Times , February 13, 2010,
www.nytimes.com; “Facebook in Privacy Breach,” The Wall Street Journal, October
18, 2010, online.wsj.com; “MySpace, Apps Leak User Data,” The Wall Street Journal,
October 22, 2010, online. wsj.com; “Internet Gets New Rules of the Road,” The Wall
Street Journal, December 22, 2010, online.wsj.com; “Web’s Hot New Commodity:
Privacy,” The Wall Street Journal, February 28, 2011, online.wsj.com; “Apple Plans
Fix for iPhone Location Data,” The Wall Street Journal, April 27, 2011,
online.wsj.com; “Facebook Security Flaw Exposed User Accounts,” The Wall Street
Journal , May 11, 2011, online.wsj.com; “ Google’s iPhone Tracking,” The Wall Street
Journal, February 17, 2012, online.wsj.com; “Web Firms to Adopt ’ No Track’ Button,”
The Wall Street Journal, February 23, 2012, online.wsj.com; “Senators Offer Privacy
Bill to Protect Personal Data,” The Wall Street Journal, April 13, 2011,
online.wsj.com; “F. T. C. Backs Plan to Honor Privacy of Online Users,” The New
York Times, December 1, 2010, www.nytimes.com; and “Latest in Web Tracking:
Stealthy ’Supercookies,’” The Wall Street Journal, August 18, 2011, online.wsj.com.
Discussion Questions
1. How much privacy should people expect when using a social networking site or
going online for information, shopping, or other tasks?
2. Who should be responsible for protecting Internet users’ personal information? In
your response, please address the appropriate role of the government, business, and
individuals.
3. Should consumers share in the revenue generated from sales created by accessing
the personal information from social networking and other Internet sites?
4. Do you believe there is a conflict between the economic interests of companies
such as Facebook, MySpace, or Google, and their obligation to protect the personal
information of their users? If you were an executive of one of these companies, how
would you resolve that conflict?

Purchase answer to see full
attachment

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency

Order your essay today and save 15% with the discount code ESSAYHELP