“Protecting personal data in E-government: A cross-country study.” Government Information Quarterly. Volume 31, Issue 1.Web. January 2014 Miller, Michael. “Cloud Computing Pros and Cons for End Users” Word Docx. Web.Feb 13, 2009 Emily Ngo.
Internet security is important to protect our privacy, protect us from fraud, and from viruses that could destroy a piece of our technology. Internet privacy and security may be different but share a responsibility, but it is up to us to take personal responsibility to protect ourselves on the internet. We should pick unique, carful passwords, and never share this sensitive information, and encrypt our data when online. When it comes to social media, I found this information that explains it well. (Endangering their right to privacy 2010) states “Communications and personal information that are posted online are usually accessible to a vast number of people.
Retrieved 3 30, 2014, from http://www.forbes.com/sites/adamlevin/2014/03/19/how-small-businesses-can-keep-byod-from-leaving-them-doa/ STAMFORD. (2013, 05 1). Newsroom. Retrieved 3 30, 2014, from http://www.gartner.com/newsroom/id/2466615 Sylvia, L. (2013, April 10). BYOD 2.0: Adressing Employee Privacy and Enterprise Security.
SaaS: Pros, cons and leading vendors | ZDNet. Retrieved from http://www.zdnet.com/saas-pros-cons-and-leading-vendors-7000011500/ Ridlinghafer, J. N. (2014, February 28). SaaS Global Trends for 2014 ? An Analysis | Cloud Consulting International. Retrieved from http://cloudwiser.wordpress.com/2014/02/28/an-analysis-of-the-saas-cloud-market-for-2014/ Software as a service - Wikipedia, the free encyclopedia.
Google’s ‘Don’t Be Evil’ Slogan Is a Load of Hooey—or Is It. Retrieved February 16, 2014 from http://www.truthdig.com/eartotheground/item/googles_dont_be_evil_slogan_is_a_load_of_hooey_or_is_it_20131015 Kizza, J. (2011). Computer network security and cyber ethics. (3rd ed.).
But most often websites gather and use the data containing individual’s information without even their knowledge. Main concern of e-commerce business ventures in today’s world is lower the liability risk in regards to the site’s personal information collection practices. In order to achieve the desired success they should constantly determine and examine what kind of information is being collected by the site and should constantly develop privacy policy statement in order to protect the information. Among many aspects of crime on the information superhighway, electronic vandalism, theft, money laundering, electronic vandalism, illegal interception, electronic funds transfer crimes are some examples. In the following paper more insight on privacy issue.
CIO.com, "The Case Against Cloud Computing, Part Four." Last modified 12 Feb 2009. Accessed October 23, 2011. http://www.cio.com/article/480595/The_Case_Against_Cloud_Computing_Part_Four. Adhikari, Richard. InternetNews.com, "Gartner Warns on SaaS's Hidden Costs."
Web. 28 Nov. 2014 Neal, Ryan. "Facebook, Microsoft Release Data On NSA Surveillance; Google, Twitter Demand Greater Transparency." International Business Times 15 June 2013: Business Source Premier. Web.
Web. 18 November 2013. Smalley, Eric. “Cornell software fingers fake online reviews.” CNET News. CBS Interactive: 26 July 2011.
http://news.yahoo.com/hackers-may-used-pa-company-hit-target-195942337.html. 7 February 2014. 11 February 2014. Hendler, James. http://www.scientificamerican.com/article/its-times-reform-computer-fraud-abuse-act/.