7. BSBHRM613 Assessment 2 FINAL REPORT

docx

School

Harvard University *

*We aren’t endorsed by this school

Course

10

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

8

Uploaded by robert25437

Report
BSBHRM613 Contribute to the development of learning and development strategies Learner Instructions 2 Skills Test – Research Report Submission details Students Name Student ID Group Assessor’s Name Assessment Date/s Pre-Assessment Checklist The purpose of this checklist The pre-assessment checklist helps you determine if you are ready for assessment. Your trainer/assessor must review the checklist with you before you attempt the assessment task. If any items of the checklist are incomplete or not clear, your trainer/assessor must provide relevant information to you to ensure you understand the requirements of the assessment task. You must ensure you are ready for the assessment task before undertaking it. Section 1: Information for Students Make sure you have completed the necessary prior learning before attempting this assessment. Make sure your trainer/assessor clearly explained the assessment process and tasks to be completed. Make sure you understand what evidence is required to be collected and how. Make sure you know your rights and the Complaints and Appeal process. Make sure you discuss any special needs or reasonable adjustments to be considered during the assessment. Make sure that you have access to a computer and the internet.
BSBHRM613 Contribute to the development of learning and development strategies Make sure that you have all the required resources needed to complete this assessment task. The due date of this assessment task will be provided by your Trainer/Assessor. In exceptional (compelling and compassionate) circumstances, an extension to submit an assessment can be granted by the trainer/assessor. Evidence of the compelling and compassionate circumstances must be provided together with your request for an extension to submit your assessment work. The request for an extension to submit your assessment work must be made before the due date. Declaration (Student to complete) I confirm that the purpose and procedures of this assessment task has been clearly explained to me. I confirm that I have been consulted about any special needs I might have in relation to the assessment process. I confirm that t he criteria used for this assessment has been discussed with me, as have the consequences and possible outcomes of this assessment. I confirm I have accessed and understand the assessment information as provided in YES College’s Student Handbook. I confirm I have been given fair notice of the date, time, venue and/or other arrangements for this assessment. I confirm I am ready for assessment. Student Name: ______________________________________ Student Signature: ___________________________________
BSBHRM613 Contribute to the development of learning and development strategies Research report: Research report (1500-1800 words) The ABC Research Team's investigation into online privacy is the foundation of this study. A review of online privacy and the different ways it might be compromised opens the paper. On how people can safeguard their online privacy is then discussed, including the use of privacy-enhancing technologies and best practices for
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
BSBHRM613 Contribute to the development of learning and development strategies online security. The research concludes by making suggestions for corporations and policymakers on how to better safeguard individuals' internet privacy. The way we live, work, and communicate has changed as a result of the internet. It has also given criminals additional opportunities to use our personal information against us. The ability to decide who gets access to our personal information and the right to be left alone online are both examples of online privacy. Unfortunately, a variety of threats—including hackers, identity thieves, businesses that gather and sell our personal data, and even our own government agencies—constantly target our online privacy. The unfortunate truth is that despite the precautions we can take to safeguard our online privacy, such as employing privacy- enhancing technology and adhering to best practices for online security, our online privacy is frequently violated without our knowledge or agreement. Our ability to maintain our online privacy is vulnerable in a number of ways. Our personal information may be stolen by hackers if they gain access to our systems. Companies that gather and sell our data are a potential source for identity thieves to acquire our personal information. Even our own governments are capable of gathering our personal information without our knowledge or permission. We must employ privacy-enhancing technologies and adhere to best practices for online security in order to protect our online privacy. We also need to be aware of the threats to our internet privacy and take precautions to safeguard ourselves against them. Introduction The ABC Research Team's investigation into online privacy is the foundation of this study. A review of online privacy and the different ways it might be compromised opens the paper. On how people can safeguard their online privacy is then discussed, including the use of privacy-enhancing technologies and best practices for online security. The research concludes by making suggestions for corporations and policymakers on how to better safeguard individuals' internet privacy.
BSBHRM613 Contribute to the development of learning and development strategies The way we live, work, and communicate has changed as a result of the internet. It has also given criminals additional opportunities to use our personal information against us. The ability to decide who gets access to our personal information and the right to be left alone online are both examples of online privacy. Unfortunately, a variety of threats—including hackers, identity thieves, businesses that gather and sell our personal data, and even our own government agencies—constantly target our online privacy. The unfortunate truth is that despite the precautions we can take to safeguard our online privacy, such as employing privacy- enhancing technology and adhering to best practices for online security, our online privacy is frequently violated without our knowledge or agreement. Our ability to maintain our online privacy is vulnerable in a number of ways. Our personal information may be stolen by hackers if they gain access to our systems. Companies that gather and sell our data are a potential source for identity thieves to acquire our personal information. Even our own governments are capable of gathering our personal information without our knowledge or permission. We must employ privacy-enhancing technologies and adhere to best practices for online security in order to protect our online privacy. We also need to be aware of the threats to our internet privacy and take precautions to safeguard ourselves against them. One of the major threats to online privacy is data breaches. A data breach occurs when an unauthorized person gains access to sensitive information. This can happen when a hacker breaks into a system and steals data, or when a company accidentally releases data that it shouldn't have. Data breaches can have serious consequences for both individuals and businesses. For individuals, a data breach can lead to identity theft, financial fraud, and other problems. For businesses, a data breach can damage their reputation, lead to financial losses, and trigger regulatory investigations. Another major threat to online privacy is online tracking. Online tracking is the practice of collecting data about people's online activities, including the websites they visit, the ads they click on, and the searches they conduct. This data is then used to target ads and content to individuals. Online tracking can be very intrusive, and it raises serious privacy concerns. For example, online trackers can be used to collect sensitive information about people's health, financial, and political views. Online tracking can also be used to target ads and content that is racist, sexist, or otherwise discriminatory.
BSBHRM613 Contribute to the development of learning and development strategies Research topic The research topic is online privacy. Background information The internet has become a staple in the majority of American households. According to a 2017 Pew Research Center study, 77% of Americans use the internet. The internet has become a part of our everyday lives, and we use it for a variety of activities such as keeping in touch with friends and family, getting news and information, and even shopping. The internet has become a staple in the lives of people all around the world. It is a tool that is used for a variety of tasks, including communication, entertainment, and work. The internet has also become a place where people share a lot of personal information. This sharing of personal information has led to a corresponding increase in the amount of concern over online privacy. There are a number of reasons why people are concerned about their online privacy. First, there is a heightened awareness of the potential for identity theft. With so much personal information being shared online, it is easier for criminals to obtain the information they need to commit identity theft. Second, there is a concern that companies will use the information they collect about customers for marketing purposes. Third, there is a concern that the government will use the information it collects about citizens for surveillance purposes While the internet has made our lives more convenient in many ways, it has also made us more vulnerable to invasions of privacy. When we go online, we leave behind a digital trail of our activities and interests. This trail can be tracked and used to build a profile of who we are and what we like. This information can then be used for marketing purposes or even sold to third parties without our knowledge or consent. In addition, the way we use the internet is also becoming more public. Social media sites like Facebook and Twitter allow us to share our thoughts and activities with our friends and followers. However, this also means that our information is being shared with a lot of people we may not know and who may not have our best interests at heart.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
BSBHRM613 Contribute to the development of learning and development strategies The issue of online privacy is one that is becoming increasingly important as we use the internet more and more. It is important to be aware of the ways our information can be used and shared and to take steps to protect our privacy. There are a number of ways you can protect your online privacy. One is to be careful about the One way is to use privacy-enhancing technologies, such as encryption, to make it more difficult for others to access your information. you can also use privacy-friendly services, such as anonymous email providers, that do not collect your personal information. you share on social media sites. You can also limit the amount of information you share on these sites by adjusting your privacy settings. Another way to protect your online privacy is to use a VPN (a virtual private network). A VPN encrypts your internet traffic and routes it through a server in another location. This makes it more difficult for people to track your online activities. You can also take steps to protect your personal information when you are online. Be careful about the websites you visit and the information you share. Do not enter personal information into forms on websites unless you are sure the website is secure. You can check to see if a website is secure by looking for the "https" at the beginning of the URL. Lastly, you can use a secure browser extension like Privacy Badger to block tracking cookies and other forms of tracking. By taking these steps, you can help to protect your online privacy. Objectives of writing the report The objective of this report is to raise awareness of the issue of online privacy and to provide information on how to protect oneself from invasions of privacy. The report will begin with a discussion of the importance of online privacy. It will then provide background information on the issue of online privacy. Next, the report will discuss the ways in which our online activities can be tracked and used to build profiles of us. Finally, the report will provide information on how to protect our online privacy.
BSBHRM613 Contribute to the development of learning and development strategies By the end of this report, the reader should have a better understanding of the issue of online privacy and how to protect themselves from invasions of privacy. References "Privacy Online: Perspectives On Privacy And Self-Disclosure In The Social Web.". Vol 49, no. 05, 2012, pp. 49-2720-49-2720. American Library Association, https://doi.org/10.5860/choice.49-2720 . Cai, Yegui et al. "Threats To Online Advertising And Countermeasures". Digital Threats: Research And Practice, vol 1, no. 2, 2020, pp. 1-27. Association For Computing Machinery (ACM), https://doi.org/10.1145/3374136.