Write My Paper Button

WhatsApp Widget

Ways in which the internet can be used to protect personal information.

 

 

 

Project title: Ways in which the internet can be used to protect personal information.
Since its inception, the internet has surely been a weird place. A one stop shop for literally any information one may need regardless of the field. All sorts of activities can be and are usually run over the internet including socialization and online businesses among others. The internet has also been known to be put to malicious use by corrupt individuals and entities, like cyber bullying, hacking, spying, terrorism, illegal trade and other numerous activities. The internet, more like fire, depending on its proper use or misuse, can yield prosperity or wreak havoc. This study is focused on breaking down how the internet can be used to protect valuable private data.
Brief description of the overall aims of the research.
This research generally aims at finding out how the internet can be instrumental in the protection of people’s important personal data. Other aims of the research are:
1. Providing readers with information that enables them to have total control over their own privacy.
2. Providing a research proposal that is part of the requirements for fulfilling the qualifications of my study program.
Objectives used to carry out the aims of this research.
To achieve the aims of the study, the following objectives are to be carried out in the right order. The ambitions are:
1. Gather data geared towards understanding insecurity posed by the internet.
2. Collection of data describing internet security and ways of implementing internet security.
3. Analysis of the data collected.
4. Concluding and summarizing the study in a proposal document.

 

Methodology.
The methods of data collection to be used for this research are:
1. Desktop studies of online literature sources.
2. Consultations with a cyber-security firm, whether physically or virtually.
3. Use of questionnaires to gather information on people’s understanding of cyber-security within the general public.
4. Use of questionnaires to gather information on common cyber-crimes that most people within the public fall victim to.
5. Use of questionnaires will also be crucial in gathering data about the most commonly targeted kind of data by malicious parties, software, etcetera.

Gantt chart for the research work flow.
Activity Progress
(%) Start End
Phase 1
1. Gather data geared towards understanding insecurity posed by the internet.
30% done. 27th March 2021 30th March 2021
2. Collection of data describing internet security and ways of implementing internet security.
0% 31st March 2021 2nd April 2021
Phase 2
3. Analysis of the data collected
0% 3rd April 2021 6th April 2021
4. Concluding and summarizing the study in a proposal document. 0% 7th April 2021 10th April 2021

References:
The source of data for this research is primarily online literature like:
1. 10 Goals for Good Privacy Protection Law. (2019, May 15). Internet Society. https://www.internetsociety.org/resources/2019/10-goals-for-good-privacy-protection-law/
2. 5 Ways to Help Protect Your Personal Information Online. (2017, November 1). 5 Ways to Help Protect Your Personal Information Online. https://www.lifelock.com/learn-internet-security-ways-to-help-protect-your-personal-information-online.html

The post Ways in which the internet can be used to protect personal information. first appeared on COMPLIANT PAPERS.

The post Ways in which the internet can be used to protect personal information. first appeared on essaypanel.com.

CLAIM YOUR 30% OFF TODAY

X
Don`t copy text!
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
???? Hi, how can I help?