Verified Document

Anti-Virus, Network Security, Firewalls, And Protection Essay

Exposing Your Data on the Internet While I do not know someone who has personally been violated by the process of data mining, I recognize the potential danger in the process of collecting data for purposes like marketing. On the surface, data mining is harmless. Organizations or interested individuals simply collect and sort through data. Usually the purpose of data mining is "to identify patterns and establish relationships," such as the relationships between demographic features and consumer behavior or voting patterns (Rouse, n.d.). Some of the potential uses of data mining include the identification of patterns of behavior in one individual or a group, classification of patterns, forecasting, and clustering (Rouse, n.d.). The interesting thing about data mining is that the information does not have to be personalized, which is why data mining is legal and not even considered unethical in many cases. However, data mining can be personal. Data mining allows for the extrapolation of data from information that was voluntarily provided when filling out forms online or making purchases. "Data mining allows companies and governments to use the information you provide to reveal more than you think," (Furnas, 2012). While data mining might not necessarily mean identity theft, it does raise questions about privacy and information security.

Facebook and other social media networks offer rich opportunities for data mining. The users of social media...

Users volunteer information about where they went to school, where they live, where they work, what foods they like, and where they have traveled. Moreover, their friends and connections online have also volunteered information. Using the data gathered from mining software, organizations can glean information about consumer behavior in ways that were never before possible.
I believe that data mining is inevitable, and that consumers need to empower themselves with information about how data mining works in order to protect themselves. The only time I have been inconvenienced by data mining is by feeling slightly violated by the fact that advertisements are targeted for me based on my search engine patterns. For example, after performing a Google search on Tahiti, I might see ads for flights to Tahiti. Another potential problem arises when companies are demanding more and more detailed information from their customers, leading some people to have no choice other than to surrender their data to the data mining companies. Consumers are not being compensated for their information, even when the data miners are profiting from that data.

References

Alexander, D. (n.d.). Data mining. Retrieved online: http://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/Alex/

Furnas, A. (2012). Everything you wanted to know…

Sources used in this document:
References

Grimes, R.A. (2012). Why you don't need a firewall. Retrieved online: http://www.infoworld.com/article/2616931/firewall-software/why-you-don-t-need-a-firewall.html

"Why You Don't Need to Install a Third-Party Firewall (And When You Do)," (n.d.). How-to Geek. Retrieved online: http://www.howtogeek.com/165203/why-you-dont-need-to-install-a-third-party-firewall-and-when-you-do/
Cite this Document:
Copy Bibliography Citation

Related Documents

Network Security the Practice of
Words: 1551 Length: 5 Document Type: Term Paper

Conclusion The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network. In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are

Network Security As an Issues for Business Data Communication
Words: 1631 Length: 5 Document Type: Term Paper

Network Security: An Issue for Business Data Communication Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has

Network Security
Words: 9364 Length: 25 Document Type: Term Paper

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere

Vonnie's Distribution Services Network Security Systems
Words: 1831 Length: 6 Document Type: Essay

Network Security for Vonnie's Distribution Services Objective of this project is to design network solution and security system for the Vonnie's Distribution Services. The company is considering expanding from the first floor to the third floor within the next few years and the management asks the company Chief Information Officer (CIO) to design a stable, scalable and reliable network security and infrastructure. However, justification of the relationships between security and infrastructure

Gfis Authentication Technology and Network Security Issues
Words: 5811 Length: 25 Document Type: Research Paper

GFI Turn-Around IT Strategy Turn-around Information Technology Strategy for Global Finance, Inc. (GFI) GFI's Authentication Technology and Network Security Issues GFI TURN-AROUND IT STRATEGY Global Finance Inc. offers services in the finance industry. This is a sensitive area of business that requires tight security policies and strategies to be implemented on the network of such an organization. GFI has, however, not given much attention to the IT department, especially, its security and thus the

Security Policy of a Dental
Words: 1254 Length: 3 Document Type: Term Paper

SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now