SlideShare a Scribd company logo
Case study
Data Protect and Privacy
Human beings value their privacy and the protection of their personal sphere of life. They value
some control over who knows what about them. They certainly do not want their personal
information to be accessible to just anyone at any time. But recent advances in information
technology threaten privacy and have reduced the amount of control over personal data and open
up the possibility of a range of negative consequences as a result of access to personal data. In
the second half of the 20th century data protection regimes have been put in place as a response
to increasing levels of processing of personal data. The 21st century has become the century of
big data and advanced information technology (e.g. forms of deep learning), the rise of big tech
companies and the platform economy, which comes with the storage and processing of exabytes
of data. The technical capabilities to collect, store and search large quantities of data concerning
telephone conversations, internet searches and electronic payment are now in place and are
routinely used by government agencies and corporate actors alike. The rise of China and the
large scale of use and spread of advanced digital technologies for surveillance and control have
only added to the concern of many. For business firms, personal data about customers and
potential customers are now also a key asset. Source:https://plato.stanford.edu/entries/it-privacy/
As more phishing scams emerge, the more important it is for businesses and individuals to be
protected against these cyber-attacks. Discuss FIVE (5) effective techniques to keep phishing
attacks at bay?

More Related Content

PPT
digital identity 2.0: how technology is transforming behaviours and raising c...
PDF
data privacy.pdf data privacy data privacy
DOCX
Data privacy and security
PDF
PDF
Technology Giants Control The Global Security.pdf
PPTX
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
DOCX
Team 3_Final Project.docx
PDF
Future of privacy - An initial perspective - Stephen Deadman, Vodafone
digital identity 2.0: how technology is transforming behaviours and raising c...
data privacy.pdf data privacy data privacy
Data privacy and security
Technology Giants Control The Global Security.pdf
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Team 3_Final Project.docx
Future of privacy - An initial perspective - Stephen Deadman, Vodafone

Similar to Case studyData Protect and PrivacyHuman beings value their priva.pdf (20)

PDF
CBSE Open Textbook English
PDF
Englishmain12classix 131025065953-phpapp01
PDF
Personality Traits of Digital Natives
PPTX
IT-APPLICATION-TOOLS_MALASMAS.pptx
PDF
Communication Surveillance in the Digital Age: Balancing Privacy and Protection
PDF
The Cyberspace and Intensification of Privacy Invasion
PDF
E017242431
PDF
Technology helps people in implementing privacy in their day today l.pdf
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
PDF
A FRAMEWORK FOR SECURING PERSONAL DATA SHARED BY USERS ON THE DIGITAL PLATFORMS
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
PDF
Blockchain Factors for Consumer Acceptance
PDF
Information and Communication Technologies
PDF
Data Privacy in the Digital Age: Assessing the Effectiveness of Current Techn...
PPTX
Legal issues in technology
PDF
Data SecurityData security is a major source of concern for both t.pdf
DOCX
1Annotated BibliographyTamika S. BouldinLibe
PPTX
Legal Issues in Applied Technology
PPTX
Ethical Issues on eGovernment 3.0: Big Data and AI
CBSE Open Textbook English
Englishmain12classix 131025065953-phpapp01
Personality Traits of Digital Natives
IT-APPLICATION-TOOLS_MALASMAS.pptx
Communication Surveillance in the Digital Age: Balancing Privacy and Protection
The Cyberspace and Intensification of Privacy Invasion
E017242431
Technology helps people in implementing privacy in their day today l.pdf
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
A FRAMEWORK FOR SECURING PERSONAL DATA SHARED BY USERS ON THE DIGITAL PLATFORMS
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
Blockchain Factors for Consumer Acceptance
Information and Communication Technologies
Data Privacy in the Digital Age: Assessing the Effectiveness of Current Techn...
Legal issues in technology
Data SecurityData security is a major source of concern for both t.pdf
1Annotated BibliographyTamika S. BouldinLibe
Legal Issues in Applied Technology
Ethical Issues on eGovernment 3.0: Big Data and AI

More from sales88 (20)

PDF
Caso de empresa Hamburguesa In-N-Out el valor del cliente a la an.pdf
PDF
CASO 6.2 Algunos ciudadanos preocupados hicieron una cita para reu.pdf
PDF
Caso de EstudioLiderazgo y Gesti�nLaura es directora asocia.pdf
PDF
Caso de estudio Hacer que las alianzas estrat�gicas y las redes f.pdf
PDF
CASO DE ESTUDIO La cl�nica Mayo es uno de los nombres m�s respetad.pdf
PDF
CASO DE ESTUDIO La �pera de Sydney es uno de los edificios ic�nico.pdf
PDF
Caso de estudio Despu�s de luchar con la deuda y la fuerte compete.pdf
PDF
Caso cl�nicoSDRAPregunta 1.Dados sus s�ntomas de fatiga, disne.pdf
PDF
Caso 21-3 Orden de prueba de deterioro Five Star Hotel Corporati.pdf
PDF
Caso 6.2 Seguro Mar�timo Cl�usula Inchmaree Un barco pesquero c.pdf
PDF
Caso 3.1 Firma de contadores Moss y McAdams Bruce Palmer hab�a t.pdf
PDF
Caso 2 (TV de Alta Definici�n La Gran Alianza) (1) Seg�n el caso .pdf
PDF
Caso 1 (8 puntos) Miguel y Cinthia Leatch viven en Covington, Ten.pdf
PDF
Caso 1 Agmmaglobulinemia ligada al X 1. Bill fue testamento duran.pdf
PDF
Caso 1 Felipe R�os y Tiffany De Los Rios married filling jointl.pdf
PDF
CASE STUDY [30 Marks] Former Tongaat Hulett bosses in court for frau.pdf
PDF
case study Private Practice Implements Safeguards for Waiting .pdf
PDF
Case Study Liberty and the Elderly Patient Ronald is 71 years old..pdf
PDF
Case Study AMr. P tripped and broke her left hip while attempting.pdf
PDF
Case Study - Rescuing a Troubled Project C.A. McCall-Peat Liberty Li.pdf
Caso de empresa Hamburguesa In-N-Out el valor del cliente a la an.pdf
CASO 6.2 Algunos ciudadanos preocupados hicieron una cita para reu.pdf
Caso de EstudioLiderazgo y Gesti�nLaura es directora asocia.pdf
Caso de estudio Hacer que las alianzas estrat�gicas y las redes f.pdf
CASO DE ESTUDIO La cl�nica Mayo es uno de los nombres m�s respetad.pdf
CASO DE ESTUDIO La �pera de Sydney es uno de los edificios ic�nico.pdf
Caso de estudio Despu�s de luchar con la deuda y la fuerte compete.pdf
Caso cl�nicoSDRAPregunta 1.Dados sus s�ntomas de fatiga, disne.pdf
Caso 21-3 Orden de prueba de deterioro Five Star Hotel Corporati.pdf
Caso 6.2 Seguro Mar�timo Cl�usula Inchmaree Un barco pesquero c.pdf
Caso 3.1 Firma de contadores Moss y McAdams Bruce Palmer hab�a t.pdf
Caso 2 (TV de Alta Definici�n La Gran Alianza) (1) Seg�n el caso .pdf
Caso 1 (8 puntos) Miguel y Cinthia Leatch viven en Covington, Ten.pdf
Caso 1 Agmmaglobulinemia ligada al X 1. Bill fue testamento duran.pdf
Caso 1 Felipe R�os y Tiffany De Los Rios married filling jointl.pdf
CASE STUDY [30 Marks] Former Tongaat Hulett bosses in court for frau.pdf
case study Private Practice Implements Safeguards for Waiting .pdf
Case Study Liberty and the Elderly Patient Ronald is 71 years old..pdf
Case Study AMr. P tripped and broke her left hip while attempting.pdf
Case Study - Rescuing a Troubled Project C.A. McCall-Peat Liberty Li.pdf

Recently uploaded (20)

PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PDF
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PPTX
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
PDF
High Ground Student Revision Booklet Preview
PDF
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
PPTX
Presentation on Janskhiya sthirata kosh.
PDF
Landforms and landscapes data surprise preview
PDF
Cell Biology Basics: Cell Theory, Structure, Types, and Organelles | BS Level...
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PDF
UTS Health Student Promotional Representative_Position Description.pdf
PPTX
How to Manage Bill Control Policy in Odoo 18
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
PPTX
Revamp in MTO Odoo 18 Inventory - Odoo Slides
PPTX
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
PDF
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
PPTX
ACUTE NASOPHARYNGITIS. pptx
PDF
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
The Final Stretch: How to Release a Game and Not Die in the Process.
Mga Unang Hakbang Tungo Sa Tao by Joe Vibar Nero.pdf
Cardiovascular Pharmacology for pharmacy students.pptx
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
High Ground Student Revision Booklet Preview
3.The-Rise-of-the-Marathas.pdfppt/pdf/8th class social science Exploring Soci...
Presentation on Janskhiya sthirata kosh.
Landforms and landscapes data surprise preview
Cell Biology Basics: Cell Theory, Structure, Types, and Organelles | BS Level...
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
UTS Health Student Promotional Representative_Position Description.pdf
How to Manage Bill Control Policy in Odoo 18
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Revamp in MTO Odoo 18 Inventory - Odoo Slides
Nursing Management of Patients with Disorders of Ear, Nose, and Throat (ENT) ...
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
ACUTE NASOPHARYNGITIS. pptx
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
Open Quiz Monsoon Mind Game Prelims.pptx
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx

Case studyData Protect and PrivacyHuman beings value their priva.pdf

  • 1. Case study Data Protect and Privacy Human beings value their privacy and the protection of their personal sphere of life. They value some control over who knows what about them. They certainly do not want their personal information to be accessible to just anyone at any time. But recent advances in information technology threaten privacy and have reduced the amount of control over personal data and open up the possibility of a range of negative consequences as a result of access to personal data. In the second half of the 20th century data protection regimes have been put in place as a response to increasing levels of processing of personal data. The 21st century has become the century of big data and advanced information technology (e.g. forms of deep learning), the rise of big tech companies and the platform economy, which comes with the storage and processing of exabytes of data. The technical capabilities to collect, store and search large quantities of data concerning telephone conversations, internet searches and electronic payment are now in place and are routinely used by government agencies and corporate actors alike. The rise of China and the large scale of use and spread of advanced digital technologies for surveillance and control have only added to the concern of many. For business firms, personal data about customers and potential customers are now also a key asset. Source:https://plato.stanford.edu/entries/it-privacy/ As more phishing scams emerge, the more important it is for businesses and individuals to be protected against these cyber-attacks. Discuss FIVE (5) effective techniques to keep phishing attacks at bay?