Question Details

[solution] »

Objective: Analyze personal privacy issues related to various personal and business-related cyber


Description

Answer Download


The Question

Objective: Analyze personal privacy issues related to various personal and business-related cybersecurity scenarios.

Competencies: Critical thinking, communication skills

Select three organizations within the same industry for analysis -- Job Search Sites-  USAjobs.gov, Monster.com and  Indeed.com

1. Students should pick one industry from the displayed list below, and within that single industry, name 3 organizations for analysis.

2. Describe the mission of each (from their website), and examine and compare details of each stated privacy policy, then

3. For each organization, recommend policy changes that will enable each organization to (a) use sensitive customer information to increase business advantage and profitability, and (b) also protect customer personal information to avoid possible privacy or liability issues.

I selected:

Job Search Sites

USAjobs.gov, Monster.com and  Indeed.com

You may need to use trade journals and newspaper stories in your reference list. However, try to avoid opinion pieces (like blogs) that may not be factual. You may state your own opinions, but these must be strengthened by scholarly references.

Length 5-7 pages

Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines.

Papers must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count begins with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document.


Running head: NEW PRIVACY ISSUES RELATED TO CYBERSPACE New Privacy Issues Related to Cyberspace

 

Allen Holman

 

University of Maryland University College 1 NEW PRIVACY ISSUES RELATED TO CYBERSPACE 2 Individual Assignment #4: New Privacy Issues Related to Cyberspace

 

Objective: Analyze personal privacy issues related to various personal and business-related

 

cybersecurity scenarios.

 

Competencies: Critical thinking, communication skills

 

Select three organizations within the same industry for analysis -1. Students should pick one industry from the displayed list below, and within that single

 

industry, name 3 organizations for analysis.

 

2. Describe the mission of each (from their website), and examine and compare details of

 

each stated privacy policy, then

 

3.

 

For each organization, recommend policy changes that will enable each organization to

 

(a) use sensitive customer information to increase business advantage and profitability, and (b)

 

also protect customer personal information to avoid possible privacy or liability issues.

 

I selected:

 

Job Search Sites USAjobs.gov, Monster.com, Indeed.com,

 

Careerbuilder.com, Simplyhired.com

 

You may need to use trade journals and newspaper stories in your reference list. However, try to

 

avoid opinion pieces (like blogs) that may not be factual. You may state your own opinions, but

 

these must be strengthened by scholarly references.

 

Length 5-7 pages, due at the end of Week 10.

 

Prepare your paper in Word format. It should be double-spaced with one-inch margins all

 

around. The citations and the reference list in the paper should be formatted in accordance with

 

APA 6th edition guidelines.

 

Papers must include: cover page, table of contents, introduction, section headings and

 

subheadings, conclusions, APA compliant in-text citations and list of references, and page

 

numbers. The page count begins with the introduction and ends with the conclusions. The

 

questions asked in the assignment should first be outlined (the outline is not included in the

 

document), then the outline should be used to create the Table of Contents and the document subheadings. The Introduction should briefly preview each sub-heading in the document.

 

Before you submit your paper, you will need to run your assignment through Turnitin.com and

 

receive an originality report. DO NOT WAIT UNTIL THE LAST MINUTE TO DO THIS. It

 

might take several hours to a day or two for Turnitin.com to do this. After your paper meets all of

 

the stated criteria in the posting, attach the paper AND the originality report in your

 

Assignments Folder by the end of Week 10: Sunday, 11:59 p.m. eastern time. NEW PRIVACY ISSUES RELATED TO CYBERSPACE

 

Table of Contents

 

Introduction................................................................................................................................

 

USAjobs.gov..............................................................................................................................

 

Strengths........................................................................................................................

 

Weakness........................................................................................................................

 

Recommendation...........................................................................................................

 

Monster.com...............................................................................................................................

 

Strengths........................................................................................................................

 

Weakness........................................................................................................................

 

Recommendation...........................................................................................................

 

Indeed.com.................................................................................................................................

 

Strengths........................................................................................................................

 

Weakness........................................................................................................................

 

Recommendation.........................................................................................................

 

Policy Comparison...................................................................................................................

 

Conclusion...............................................................................................................................

 

References................................................................................................................................ 3 NEW PRIVACY ISSUES RELATED TO CYBERSPACE 4 Introduction

 

Privacy is an inconsistently and loosely defined belief derived from multiple sources. The

 

first amendment, right to free assembly, the fourth amendment, right to be free of unwarranted

 

search and/or seizure, and the fourteenth amendment, the right to due process all contribute to

 

the principle of privacy. Laws such as the Health Insurance Portability and Accountability Act

 

(HIPAA), the Universal Declaration of Human Rights, the Children's Online Privacy Protection

 

Act (COPPA), and the Privacy Act of 1974, are major sources contributing to the western idea of

 

privacy[The10].

 

The advancement in technology has progressed so rapidly that there is no precedent for

 

congress to base any new regulation that would provide coverage over the lack of privacy and

 

the gaps in security. There are questions to whether government regulation is the answer or

 

would improve policy within companies providing goods and services through the internet be a

 

better solution.

 

Privacy is fiercely defended and often infringed upon. While privacy can be surrendered,

 

it is the unknowing collection, misuse, lose, and sharing of private information that has triggered

 

hard questions concerning social media, internet service providers, and other internet companies?

 

ability to collect information and how they use that information. This paper will compare and

 

contrast the components that make up the privacy policy of three major internet job search site

 

companies and the factors causing the privacy issues for: USAjobs.gov, Monster.com and

 

Indeed.com. Each company has an established platform of goods and services that are in

 

competition with one another. NEW PRIVACY ISSUES RELATED TO CYBERSPACE 5 USAjobs.gov

 

USAJOBS connects job seekers with federal employment opportunities across the United States

 

and around the world. As the federal government?s official employment site, USAJOBS provides

 

resources to help the right people find the right jobs.

 

As a part of the U.S. Office of Personnel Management (OPM), USAJOBS helps recruit, retain,

 

and honor a world-class government workforce for the American people.

 

Federal agencies use USAJOBS to facilitate their hiring processes and match qualified applicants

 

to job openings. Therefore, USAJOBS serves as the central location to find job openings within

 

hundreds of federal agencies and organizations.

 

The U.S. federal government relies on more than two million Americans and foreign nationals to

 

work in the civil service. Citizens like you help the government fulfill its essential duties in

 

service to the American people. USAJOBS is here to help you find ways to serve. (About

 

USAJOBS, 2106)

 

Strengths

 

Weakness

 

Recommendation NEW PRIVACY ISSUES RELATED TO CYBERSPACE

 

Monster.com

 

According to Monster.com website,

 

Monster purpose

 

Why we do what we do

 

At Monster, we work to bring humanity and opportunity to the job market, to enhance lives,

 

businesses and communities around the world.

 

Monster vision

 

Who we want to be

 

Monster will be the leading global talent platform connecting jobs and people.

 

Monster mission

 

How we deliver that vision

 

We create and deliver the best recruiting media, technologies and platforms for connecting jobs

 

and people; we strive every day to help our customers hire and help people find jobs.

 

Our Monster values

 

How we guide all decisions in our work, we ...

 

1.relentlessly innovate.

 

2.approach the world with intelligence.

 

3.put Customers and Candidates first, always.

 

4.foster trust, openness and integrity in all that we do.

 

5.are bold and proud; we seek to improve the company, the communities where we operate, and

 

ourselves.

 

Strengths

 

Weakness

 

Recommendation 6 NEW PRIVACY ISSUES RELATED TO CYBERSPACE 7 Indeed.com

 

Indeed is the #1 job site worldwide, with over 180 million unique visitors per month. Indeed is

 

available in more than 50 countries and 28 languages, covering 94% of global GDP.

 

Since 2004, Indeed has given job seekers free access to millions of jobs from thousands of

 

company websites and job boards. As the leading pay-for-performance recruitment advertising

 

network, Indeed drives millions of targeted applicants to jobs in every field and is the most costeffective source of candidates for thousands of companies.

 

Founded by Paul Forster and Rony Kahan, Indeed is a subsidiary of Recruit Holdings Co., Ltd.

 

In the US, Indeed has offices in Austin, New York, San Francisco, San Mateo, Seattle, and

 

Stamford. Outside of the US, Indeed has offices located in Amsterdam, Dublin, Düsseldorf,

 

Hyderabad, London, Paris, Sydney, Tokyo, and Toronto. For more information about Indeed, see

 

our blog, press releases or contact us. (Our Company, 20016)

 

Strengths

 

Weakness

 

Recommendation NEW PRIVACY ISSUES RELATED TO CYBERSPACE 8 Conclusion

 

All of these companies operate from a place of trust. Customers Trust the service

 

provider will provide the services they are required to, they will protect the data they store, and

 

will not use the data for anything other than what the customer agrees too. Many companies are

 

bullying customers with the approach that ?if you use our services, you must agree to our terms.?

 

The popularity and efficiency of these tools has given the companies the upper hand. In order to

 

effectively force companies to improve privacy and security measures customers must be willing

 

to walk away from the use of services from companies which refuse to establish acceptable

 

privacy and security policies. Even if you delete your accounts, all of these companies store

 

historical data which they will not delete.

 

This privacy issue comes down to money, and the online advertising industry may need

 

to be regulated to safeguard privacy concerns effectively while online. If regulating the

 

advertising industry is not an option, implement laws that prevent the collection of data by

 

service providers.

 

Congress attempted to inhibit the invasion of privacy with the Electronic

 

Communications Privacy but this was in contrast to the 1996 Communication Decency Act

 

where congress felt it was important to support the development and growth of the

 

internet[The10]. These efforts have left congress as an indecisive bystander as technology

 

continues to move ahead and business continue to maximize profits through the implementation

 

of that technology.

 

It takes an informed person to understand what is happening to them in cyberspace. Many

 

are novices who use the tools with little to no understanding of what is going on in the NEW PRIVACY ISSUES RELATED TO CYBERSPACE

 

background. The power remains with the customer. If a significant number of informed people

 

with concerns about privacy refuse to use their products, they will be open to make changes. References 9 NEW PRIVACY ISSUES RELATED TO CYBERSPACE 10 Ness, S. (2010). The Anonymous Poster: How to Protect Internet Users' Privacy and Prevent

 

Abuse. Duke Law & Technology Review, 1-27.

 

Our company. (n.d.). Retrieved July 18, 2016, from http://www.monster.com/about/our-company

 

Our Company. (n.d.). Retrieved July 18, 2016, from http://www.indeed.com/about/our-company

 

About USAJOBS. (n.d.). Retrieved July 18, 2016, from https://www.usajobs.gov/Help/About/

 


Solution details

Solution #000176249

[solution] »

Objective: Analyze personal privacy issues related to various personal and business-related cyber.zip

Uploaded by: Tutor

Answer rating:

This paper was answered on 14-Oct-2020

Pay using PayPal (No PayPal account Required) or your credit card . All your purchases are securely protected by .

About this Question

STATUS

Answered

QUALITY

Approved

DATE ANSWERED

Oct 14, 2020

EXPERT

Tutor

ANSWER RATING

BEST TUTORS

We have top-notch tutors who can do your essay/homework for you at a reasonable cost and then you can simply use that essay as a template to build your own arguments.

You can also use these solutions:

  • As a reference for in-depth understanding of the subject.
  • As a source of ideas / reasoning for your own research (if properly referenced)
  • For editing and paraphrasing (check your institution's definition of plagiarism and recommended paraphrase).
This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student.

STUCK WITH YOUR PAPER?

Order New Solution. Quick Turnaround

Click on the button below in order to Order for a New, Original and High-Quality Essay Solutions. New orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

WE GUARANTEE, THAT YOUR PAPER WILL BE WRITTEN FROM SCRATCH AND WITHIN A DEADLINE.

Order Now