Sample Essay on:
Universities And Online Portals: Possible Privacy Infringement

Here is the synopsis of our sample research paper on Universities And Online Portals: Possible Privacy Infringement. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

10 pages in length. Internet users can never be too careful when it comes to providing personal information while surfing upon the World Wide Web. However, the extent to which users know when and how they are inadvertently handing over personal data is often masked by myriad technological methods that the Web site visitor has no idea even exists; what ultimately transpires by the time the user leaves the site is how he or she has unwittingly given tracking and usage information that may – but oftentimes is not – protected from unauthorized distribution. Universities, in their quest to collect information to improve their sites and provide user-friendly applications, should realize the importance of this matter and take it upon themselves to create and post a comprehensive online privacy policy that outlines precisely why, how and when visitors' personal information is collected if they do not want to be accused of possible privacy infringement. Bibliography lists 10 sources.

Page Count:

10 pages (~225 words per page)

File: LM1_TLCUnivPriv.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

and how they are inadvertently handing over personal data is often masked by myriad technological methods that the Web site visitor has no idea even exists; what ultimately transpires by the time the user leaves the site is how he or she has unwittingly given tracking and usage information that may - but oftentimes is not - protected from unauthorized distribution. Universities, in their quest to collect information to improve their sites and provide user-friendly applications, should realize the importance of this matter and take it upon themselves to create and post a comprehensive online privacy policy that outlines precisely why, how and when visitors personal information is collected if they do not want to be accused of possible privacy infringement. II. THE PROBLEM Confidentiality has not yet found a place in the technologically advanced world of computers. People battle each and every day to protect what they deem to be private information; however, the public is fast losing this war in light of the fact that government, organizations and companies have learned how to play hardball. Ethically speaking, when personal information is turned over to an organization, it is up to that entity to maintain the boundaries of confidentiality, keeping any and all private data within the confines of that particular agency. However, this is simply not the case in this day and age, when every bit of information given forth by an individual is processed, distributed to myriad other agencies and kept for future reference. As Ciolli (1999) duly notes, "it is the violation of trust that is the concern" (p. A05), and universities - institutes of higher education where ethical behavior should be considered an essential part of their existence - that participate in ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now