We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Information Collection and Retention of sensitive information on Users - Research Paper Example

Comments (0) Cite this document
Summary
Discussion of various sensitive information on users that companies collect and retain, such as age, race, educational level, location, passion and interests, marital status, sex and gender among others.
Data mining has been on the increase in the recent past. As the business…
Download paper
GRAB THE BEST PAPER
Information Collection and Retention of sensitive information on Users
Read TextPreview

Extract of sample
Information Collection and Retention of sensitive information on Users

he customers personal data for good reasons, such as understanding customer needs and preferences, there has been a growing concern among consumers who argue that it is unethical for companies to retain personal and private data of a consumer without the consent of a customer. This document will analyze the extent to which companies retain users sensitive information and the kind of information that companies hold and the reasons for holding such sensitive information.
According to Martin (2014), data mining has been on the increase in the recent past. As the business environment increasingly becomes competitive, companies are looking for every little opportunity to enable them stay ahead of the park. Currently, most big companies are collecting and retaining personal data of their customers for organizational use. Experts say that the private data of most customers are currently being held by big companies. In fact, Martin (2014) notes that every time an individual surfs on the Internet and click on a website, use a mobile app, post something on social media or make a comment via an e-mail or call center, the information provided is retained by the companies for future use. Although most companies keep the customers personal data for good reasons, there has been a growing concern among consumers who note that it is unethical for companies to retain personal and private data of a consumer without the consent their consent. Additionally, consumers are concerned that keeping private data about a customer exposes a customer at risk because the data may be hacked, thereby causing harm to a customer. This document will analyze the extent to which companies retain users sensitive information and the kind of information that companies hold and the reasons for holding such sensitive information.
With the advancements in technology and the increased propagation and usage of the Internet, most big companies such as Google, Apple and Facebook are mining the data of ... Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Collection and Retention of sensitive information on Users Research Paper”, n.d.)
Retrieved from https://studentshare.net/social-science/754202-information-collection-and-retention-of-sensitive-information-on-users
(Information Collection and Retention of Sensitive Information on Users Research Paper)
https://studentshare.net/social-science/754202-information-collection-and-retention-of-sensitive-information-on-users.
“Information Collection and Retention of Sensitive Information on Users Research Paper”, n.d. https://studentshare.net/social-science/754202-information-collection-and-retention-of-sensitive-information-on-users.
  • Cited: 0 times
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Information Security
Network security is a strategy that is used to protect computer networks from different sorts of threats by identifying the potential threats to the networks and then applying the most appropriate measures to combat the identified threats. Network security is one of the most important concerns for any company that makes use of computers to run its business activities.
5 Pages(1250 words)Research Paper
Information Security
The increasing competition makes it vital for all types of organizations to be equipped with information and data about their customers, market trends, consumer behavior etc. However, the possession of complete information is considered to be an incomplete victory if it is not protected in an effective manner against prevailing threats and vulnerabilities.
3 Pages(750 words)Research Paper
Information Technology
The researcher also explored various sources to gather information about the education and salary of an information technology professional, as well as the training that an information technology professional needs to become skilled in his/her respective field.
4 Pages(1000 words)Research Paper
The disclosure of sensitive and classified information by persons currently or previously employed by or affiliated with the Uni
Intelligence is always based on secrets, but the US press is an open crypt of information about the US intelligence sources. But now because of the social and electronic media, like the television, magazines and the search engines, the situation has gone even worse for the scope and the seriousness of the leaks.
6 Pages(1500 words)Research Paper
Information System
ross functional integrated enterprise systems in the business use of IT mainly serves the purpose of showing that business is comprised of interrelated components which through combined efforts are aimed at achieving the same goal. It is a bit difficult to achieve cross
6 Pages(1500 words)Research Paper
Information Management
They enable execution of business issues in a more convenient manner because tasks such as accounting and employee appraisals are effectively undertaken.This paper offers analysis and critique of the association between information science,written communication genres and business aims;furthermore,it addresses issues affected by written communication.
4 Pages(1000 words)Research Paper
Information Security
Information theft posses a great danger to small businesses as well corporations such as profit losses, damage to reputation besides the costs associated with litigations. It is a key parameter affecting business risk. Information security is therefore imperative for
3 Pages(750 words)Research Paper
Information Technology
Many people have started to trust the cloud computing information technology. With the high demand for tablets and cell phone internet service, the cloud computing is a timely new technology. There are several cloud computing sites.
4 Pages(1000 words)Research Paper
Information System
For instance, one a marketer will be in a better position of tailoring the advertisement platform to responding to the specific needs of the targeted audience
5 Pages(1250 words)Research Paper
Information Systems
The paper explains that network design allows for the planning of the implementation of the entire computer network infrastructure within the business. Within the company’s framework, the whole network design is normally portrayed as a network diagram well enough to serves as the blueprint for realizing the communication network physically.
3 Pages(750 words)Research Paper
Let us find you another Research Paper on topic Information Collection and Retention of sensitive information on Users for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us