Here is the synopsis of our sample research paper on Universities And Online Portals: Possible Privacy Infringement. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
10 pages in length. Internet users can never be too careful when it comes to providing personal information while surfing upon the World Wide Web. However, the extent to which users know when and how they are inadvertently handing over personal data is often masked by myriad technological methods that the Web site visitor has no idea even exists; what ultimately transpires by the time the user leaves the site is how he or she has unwittingly given tracking and usage information that may – but oftentimes is not – protected from unauthorized distribution. Universities, in their quest to collect information to improve their sites and provide user-friendly applications, should realize the importance of this matter and take it upon themselves to create and post a comprehensive online privacy policy that outlines precisely why, how and when visitors' personal information is collected if they do not want to be accused of possible privacy infringement. Bibliography lists 10 sources.
Page Count:
10 pages (~225 words per page)
File: LM1_TLCUnivPriv.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
and how they are inadvertently handing over personal data is often masked by myriad technological methods that the Web site visitor has no idea even exists; what ultimately transpires by
the time the user leaves the site is how he or she has unwittingly given tracking and usage information that may - but oftentimes is not - protected from unauthorized
distribution. Universities, in their quest to collect information to improve their sites and provide user-friendly applications, should realize the importance of this matter and take it upon themselves to
create and post a comprehensive online privacy policy that outlines precisely why, how and when visitors personal information is collected if they do not want to be accused of possible
privacy infringement. II. THE PROBLEM Confidentiality has not yet found a place in the technologically advanced world of computers. People battle
each and every day to protect what they deem to be private information; however, the public is fast losing this war in light of the fact that government, organizations and
companies have learned how to play hardball. Ethically speaking, when personal information is turned over to an organization, it is up to that entity to maintain the boundaries of
confidentiality, keeping any and all private data within the confines of that particular agency. However, this is simply not the case in this day and age, when every bit
of information given forth by an individual is processed, distributed to myriad other agencies and kept for future reference. As Ciolli (1999) duly notes, "it is the violation of
trust that is the concern" (p. A05), and universities - institutes of higher education where ethical behavior should be considered an essential part of their existence - that participate in
...