7. BSBHRM613 Assessment 2 FINAL REPORT
docx
keyboard_arrow_up
School
Harvard University *
*We aren’t endorsed by this school
Course
10
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
8
Uploaded by robert25437
BSBHRM613 Contribute to the development of learning and development
strategies
Learner Instructions 2
Skills Test – Research Report
Submission details
Students Name
Student ID
Group
Assessor’s Name
Assessment Date/s
Pre-Assessment Checklist
The purpose of this checklist
The pre-assessment checklist helps you determine if you are ready for assessment. Your trainer/assessor
must review the checklist with you before you attempt the assessment task. If any items of the checklist
are incomplete or not clear, your trainer/assessor must provide relevant information to you to ensure
you understand the requirements of the assessment task. You must ensure you are ready for the
assessment task before undertaking it.
Section 1: Information for Students
☐
Make sure you have completed the necessary prior learning before attempting this assessment.
☐
Make sure your trainer/assessor clearly explained the assessment process and tasks to be completed.
☐
Make sure you understand what evidence is required to be collected and how.
☐
Make sure you know your rights and the Complaints and Appeal process.
☐
Make sure you discuss any special needs or reasonable adjustments to be considered during the
assessment.
☐
Make sure that you have access to a computer and the internet.
BSBHRM613 Contribute to the development of learning and development
strategies
☐
Make sure that you have all the required resources needed to complete this assessment task.
☐
The due date of this assessment task will be provided by your Trainer/Assessor.
☐
In exceptional (compelling and compassionate) circumstances, an extension to submit an assessment
can be granted by the trainer/assessor. Evidence of the compelling and compassionate circumstances
must be provided together with your request for an extension to submit your assessment work.
☐
The request for an extension to submit your assessment work must be made before the due date.
Declaration (Student to complete)
☐
I confirm that the purpose and procedures of this assessment task has been clearly explained to me.
☐
I confirm that I have been consulted about any special needs I might have in relation to the
assessment process.
☐
I confirm that t
he criteria used for this assessment has been discussed with me, as have the
consequences and possible outcomes of this assessment.
☐
I confirm I have accessed and understand the assessment information as provided in YES College’s
Student Handbook.
☐
I confirm I have been given fair notice of the date, time, venue and/or other arrangements for this
assessment.
☐
I confirm I am ready for assessment.
Student Name: ______________________________________
Student Signature: ___________________________________
BSBHRM613 Contribute to the development of learning and development
strategies
Research report:
Research report (1500-1800 words)
The ABC Research Team's investigation into online privacy is the foundation of this study. A review of online
privacy and the different ways it might be compromised opens the paper. On how people can safeguard their
online privacy is then discussed, including the use of privacy-enhancing technologies and best practices for
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
BSBHRM613 Contribute to the development of learning and development
strategies
online security. The research concludes by making suggestions for corporations and policymakers on how to
better safeguard individuals' internet privacy.
The way we live, work, and communicate has changed as a result of the internet. It has also given criminals
additional opportunities to use our personal information against us. The ability to decide who gets access to our
personal information and the right to be left alone online are both examples of online privacy.
Unfortunately, a variety of threats—including hackers, identity thieves, businesses that gather and sell our
personal data, and even our own government agencies—constantly target our online privacy. The unfortunate
truth is that despite the precautions we can take to safeguard our online privacy, such as employing privacy-
enhancing technology and adhering to best practices for online security, our online privacy is frequently
violated without our knowledge or agreement.
Our ability to maintain our online privacy is vulnerable in a number of ways. Our personal information may be
stolen by hackers if they gain access to our systems. Companies that gather and sell our data are a potential
source for identity thieves to acquire our personal information. Even our own governments are capable of
gathering our personal information without our knowledge or permission.
We must employ privacy-enhancing technologies and adhere to best practices for online security in order to
protect our online privacy. We also need to be aware of the threats to our internet privacy and take precautions
to safeguard ourselves against them.
Introduction
The ABC Research Team's investigation into online privacy is the foundation of this study. A review of online
privacy and the different ways it might be compromised opens the paper. On how people can safeguard their
online privacy is then discussed, including the use of privacy-enhancing technologies and best practices for
online security. The research concludes by making suggestions for corporations and policymakers on how to
better safeguard individuals' internet privacy.
BSBHRM613 Contribute to the development of learning and development
strategies
The way we live, work, and communicate has changed as a result of the internet. It has also given criminals
additional opportunities to use our personal information against us. The ability to decide who gets access to our
personal information and the right to be left alone online are both examples of online privacy.
Unfortunately, a variety of threats—including hackers, identity thieves, businesses that gather and sell our
personal data, and even our own government agencies—constantly target our online privacy. The unfortunate
truth is that despite the precautions we can take to safeguard our online privacy, such as employing privacy-
enhancing technology and adhering to best practices for online security, our online privacy is frequently
violated without our knowledge or agreement.
Our ability to maintain our online privacy is vulnerable in a number of ways. Our personal information may be
stolen by hackers if they gain access to our systems. Companies that gather and sell our data are a potential
source for identity thieves to acquire our personal information. Even our own governments are capable of
gathering our personal information without our knowledge or permission.
We must employ privacy-enhancing technologies and adhere to best practices for online security in order to
protect our online privacy. We also need to be aware of the threats to our internet privacy and take precautions
to safeguard ourselves against them.
One of the major threats to online privacy is data breaches. A data breach occurs when an unauthorized person
gains access to sensitive information. This can happen when a hacker breaks into a system and steals data, or
when a company accidentally releases data that it shouldn't have. Data breaches can have serious consequences
for both individuals and businesses. For individuals, a data breach can lead to identity theft, financial fraud, and
other problems. For businesses, a data breach can damage their reputation, lead to financial losses, and trigger
regulatory investigations. Another major threat to online privacy is online tracking. Online tracking is the
practice of collecting data about people's online activities, including the websites they visit, the ads they click
on, and the searches they conduct. This data is then used to target ads and content to individuals. Online
tracking can be very intrusive, and it raises serious privacy concerns. For example, online trackers can be used
to collect sensitive information about people's health, financial, and political views. Online tracking can also be
used to target ads and content that is racist, sexist, or otherwise discriminatory.
BSBHRM613 Contribute to the development of learning and development
strategies
Research topic
The research topic is online privacy.
Background information
The internet has become a staple in the majority of American households. According to a 2017 Pew Research
Center study, 77% of Americans use the internet. The internet has become a part of our everyday lives, and we
use it for a variety of activities such as keeping in touch with friends and family, getting news and information,
and even shopping. The internet has become a staple in the lives of people all around the world. It is a tool that
is used for a variety of tasks, including communication, entertainment, and work. The internet has also become
a place where people share a lot of personal information. This sharing of personal information has led to a
corresponding increase in the amount of concern over online privacy. There are a number of reasons why people
are concerned about their online privacy. First, there is a heightened awareness of the potential for identity theft.
With so much personal information being shared online, it is easier for criminals to obtain the information they
need to commit identity theft. Second, there is a concern that companies will use the information they collect
about customers for marketing purposes. Third, there is a concern that the government will use the information
it collects about citizens for surveillance purposes
While the internet has made our lives more convenient in many ways, it has also made us more vulnerable to
invasions of privacy. When we go online, we leave behind a digital trail of our activities and interests. This trail
can be tracked and used to build a profile of who we are and what we like. This information can then be used
for marketing purposes or even sold to third parties without our knowledge or consent.
In addition, the way we use the internet is also becoming more public. Social media sites like Facebook and
Twitter allow us to share our thoughts and activities with our friends and followers. However, this also means
that our information is being shared with a lot of people we may not know and who may not have our best
interests at heart.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
BSBHRM613 Contribute to the development of learning and development
strategies
The issue of online privacy is one that is becoming increasingly important as we use the internet more and
more. It is important to be aware of the ways our information can be used and shared and to take steps to protect
our privacy.
There are a number of ways you can protect your online privacy. One is to be careful about the
One way is to use privacy-enhancing technologies, such as encryption, to make it more difficult for others to
access your information. you can also use privacy-friendly services, such as anonymous email providers, that do
not collect your personal information. you share on social media sites. You can also limit the amount of
information you share on these sites by adjusting your privacy settings.
Another way to protect your online privacy is to use a VPN (a virtual private network). A VPN encrypts your
internet traffic and routes it through a server in another location. This makes it more difficult for people to track
your online activities.
You can also take steps to protect your personal information when you are online. Be careful about the websites
you visit and the information you share. Do not enter personal information into forms on websites unless you
are sure the website is secure. You can check to see if a website is secure by looking for the "https" at the
beginning of the URL.
Lastly, you can use a secure browser extension like Privacy Badger to block tracking cookies and other forms of
tracking.
By taking these steps, you can help to protect your online privacy.
Objectives of writing the report
The objective of this report is to raise awareness of the issue of online privacy and to provide information on
how to protect oneself from invasions of privacy.
The report will begin with a discussion of the importance of online privacy. It will then provide background
information on the issue of online privacy. Next, the report will discuss the ways in which our online activities
can be tracked and used to build profiles of us. Finally, the report will provide information on how to protect our
online privacy.
BSBHRM613 Contribute to the development of learning and development
strategies
By the end of this report, the reader should have a better understanding of the issue of online privacy and how to
protect themselves from invasions of privacy.
References
"Privacy Online: Perspectives On Privacy And Self-Disclosure In The Social Web.". Vol 49, no. 05, 2012, pp.
49-2720-49-2720. American Library Association,
https://doi.org/10.5860/choice.49-2720
.
Cai, Yegui et al. "Threats To Online Advertising And Countermeasures". Digital Threats: Research
And Practice, vol 1, no. 2, 2020, pp. 1-27. Association For Computing Machinery (ACM),
https://doi.org/10.1145/3374136.