StudentShare solutions
Triangle menu

Privacy in Cyber Space - Essay Example

Not dowloaded yet

Extract of sample
Privacy in Cyber Space

However, the internet has also been of significant advantage to us in many ways. Where many of its services have benefited us in numerous ways, the email has had a significant character, besides other uses, in the commerce and trade sector. Email has proved to be the information and communication "Backbone" in most of the organizations (ColdSpark, 2007). It has been successfully used to facilitate the day to day business activities & processes, shared working environment, document transfer, corporate communication (both internal and external) and memorandums. According to the statistics, more than 35 percent of critical business information is found in companies is transferred via emails. Such a high figure means a high stance of dependency on the email service(s) and thus the nature of the content that is being transferred through these emails has actually forced many organizations to re-evaluate the significance of managing the email throughout its whole lifecycle. (ML Inc., 2008)
Traditionally, the common practice was to retain the backup of all emails as per the IT department's needs and cost factor. Now the environment has changed and therefore we need to manage this service as a strategic resource to take the best out of it. Email is considered now as a formal means of communication for any company, specially in a healthcare organizations where patients' reports are treated with utmost confidentiality, which is no different from the traditional way of distributing the corporate information on the companies' official letter head. This means that organizational or corporate emails are also bounded to abide by legal obligations of the state.

Organizational Aspect of Email Privacy
Understanding the whole process of the collection, classification, organizing and sharing of emails can be a complex as well as cumbersome time consuming and costly activity. An organization such as ours, which is part of the medical and health care industry, is faced with several issues regarding the email usage of our employees and stakeholders.
Employees' use of electronic mail during business hours is a common characteristic of this era's organization (Cobb, 2002). Nurses, attendants and receptionists tend to either sleep on the job or use email for their entertainment during late hours. The facility that the employers provide to ease the means of communication with doctors and other staff, is usually being used for personal purposes. No doubt the email serves to increase efficiency of the today's work environment because it is such a low cost means of providing a channel, simple and easy to use service. It also helps in the attainment of the paperless environment in many organizations to a very large extent. However, despite the several technological aspects of the email service, it is also creating severe concerns and problematic issue regarding the privacy of employees.

Why Monitor Employee's Emails
Employees need to be monitored for several reasons (Agrawal, 2002). In our medical centre, for example, the employees are responsible for maintaining personal profiles of patients containing both health-related and some times other relevant ...Show more

Summary

Internet has played a vital role in the every aspect of our lives. The use of basic services such as email, chat and web-surfing is now a part of our daily routine and we normally take them as very normal to our day to day chores. Despite the many benefits of using the internet critical issues such as Censorship, Content Filtering, Anonymity and Privacy in Cyberspace are posing a constant challenge to everyone including individuals as well as businesses & corporate sector…
Author : monique53
Privacy in Cyber Space essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Privacy in Cyber Space"
with a personal 20% discount.
Grab the best paper

Related Essays

Cyber Terrorists: Shutdown the Internet
It marked the beginning of Terror frightened world with numerous mishaps to follow. The major security forces of the world have strengthened their operation and have manipulated every possible measures to encounter the brutal acts of terrorist, but not very often they did managed to escape from the parasitism of terror.
5 pages (1250 words) Essay
How I Learnt How to Navigate the Cyber Space
Finally, I was patient to find out and secretly hopeful that cyber space would be a whole new world apart, more enriching that anything I had ever imagined, an innovation that would quench my inmost desires and fantasies, and challenge my wildest imaginations.
5 pages (1250 words) Essay
Media Law: Privacy
According to Lessig, there are three aspects of privacy namely: privacy in private, privacy in public: surveillance and privacy in public data (201). Each aspect is going to be explained briefly below. The first aspect of privacy in private is related to the element of private property where the traditional law stipulates that each person has a right to be left alone.
5 pages (1250 words) Essay
Internet Risk and Security - Cyber Threat (Identity Fraud) in a Finance Organisation
In such context, this paper will try to shed light on pertinent issues regarding identity fraud in financial organization through cyber space. In the first section, the paper will try to demystify the nature of identity fraud in financial organizations and what are the pertinent factors that create difficulty for users to detect the fraud.
12 pages (3000 words) Essay
Privacy and security issues online
Introduction In today’s world, everything is becoming digitalized. For example, education and businesses are now conducted online. It is not a wonder to find people buying and selling goods and services via the internet. The need to use the internet for business or e-commerce has come from the demand within businesses and governments to make better use of computing technology, so as to improve customer interaction, and also the exchange of information between customers and sellers, or between sellers and sellers (Kalakota and Whinston, 1997).
8 pages (2000 words) Essay
Cyber -Attacks on America
In addition to these physical attacks, the US now faces another form of attack, cyber-attacks, against computer networks that crucially serve the economy and security of the nation. Attackers target organizations across the various sectors of the economy including both private and government institutions (Sanger & Perlroth, 2013).
10 pages (2500 words) Essay
Ethics Governing Cyber Laws
With the broadening usage of the internet came problems. These problems consisted of use of the internet to commit crimes and cheat (plagiarism). This paper addresses the issue of Cyber-Ethics and the grey area that exists when using the internet. Computers, and networks, were first the domain of the military and the academic world.
12 pages (3000 words) Essay
Privacy in Cyber Space
ritical issues such as Censorship, Content Filtering, Anonymity and Privacy in Cyberspace are posing a constant challenge to everyone including individuals as well as businesses & corporate sector. The increasing dependency on the computers and strictly speaking the Internet has
4 pages (1000 words) Essay
Cyber Law
Cyber laws refer to the legal issues relating to the use of communication technology especially in the cyber space (in the internet). According to many sources, cyber laws relate to the regulations that impact the transactions of persons in Cyber Space including the imaginary transaction area that seems to exist when two computers exchange data.
5 pages (1250 words) Essay
Electronic Communications Privacy Act
Accordingly, there is no legal framework to guide the use of features such as cloud computing and various forms of virtual computing. The above recent developments have altered the cyber space in various
5 pages (1250 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation