Verified Document

Anti-Virus, Network Security, Firewalls, And Protection Essay

Exposing Your Data on the Internet While I do not know someone who has personally been violated by the process of data mining, I recognize the potential danger in the process of collecting data for purposes like marketing. On the surface, data mining is harmless. Organizations or interested individuals simply collect and sort through data. Usually the purpose of data mining is "to identify patterns and establish relationships," such as the relationships between demographic features and consumer behavior or voting patterns (Rouse, n.d.). Some of the potential uses of data mining include the identification of patterns of behavior in one individual or a group, classification of patterns, forecasting, and clustering (Rouse, n.d.). The interesting thing about data mining is that the information does not have to be personalized, which is why data mining is legal and not even considered unethical in many cases. However, data mining can be personal. Data mining allows for the extrapolation of data from information that was voluntarily provided when filling out forms online or making purchases. "Data mining allows companies and governments to use the information you provide to reveal more than you think," (Furnas, 2012). While data mining might not necessarily mean identity theft, it does raise questions about privacy and information security.

Facebook and other social media networks offer rich opportunities for data mining. The users of social media...

Parts of this document are hidden

View Full Document
svg-one

Users volunteer information about where they went to school, where they live, where they work, what foods they like, and where they have traveled. Moreover, their friends and connections online have also volunteered information. Using the data gathered from mining software, organizations can glean information about consumer behavior in ways that were never before possible.
I believe that data mining is inevitable, and that consumers need to empower themselves with information about how data mining works in order to protect themselves. The only time I have been inconvenienced by data mining is by feeling slightly violated by the fact that advertisements are targeted for me based on my search engine patterns. For example, after performing a Google search on Tahiti, I might see ads for flights to Tahiti. Another potential problem arises when companies are demanding more and more detailed information from their customers, leading some people to have no choice other than to surrender their data to the data mining companies. Consumers are not being compensated for their information, even when the data miners are profiting from that data.

References

Alexander, D. (n.d.). Data mining. Retrieved online: http://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/Alex/

Furnas, A. (2012). Everything you wanted to know…

Sources used in this document:
References

Grimes, R.A. (2012). Why you don't need a firewall. Retrieved online: http://www.infoworld.com/article/2616931/firewall-software/why-you-don-t-need-a-firewall.html

"Why You Don't Need to Install a Third-Party Firewall (And When You Do)," (n.d.). How-to Geek. Retrieved online: http://www.howtogeek.com/165203/why-you-dont-need-to-install-a-third-party-firewall-and-when-you-do/
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Film Fred Ott Was the
Words: 1898 Length: 6 Document Type: Essay

Technology in Film Fred Ott was the very first movie star that every existed. His brief starring role in the five-second film that showed him sneezing started the use of technology to make films. Since then, technology both in and out of film has changed immeasurably and what technology is used and is said about technology in these same films has evolved quite a lot and the statements sometimes made are

Technology Proposal Social Networking and
Words: 1070 Length: 4 Document Type: Term Paper

Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to

Technology for Students With Disabilities
Words: 3214 Length: 11 Document Type: Research Paper

These benefits arise because of implementing both assistive technologies and Information Communication technology (ICT). The implementation of technology in classrooms usually has benefits to both the disabled students as well as the teachers (Kirk, Gallagher, Coleman, & Anastasiow, 2012, p.240). The general benefits of use of assistive technologies and ICT in teaching students with learning disabilities include greater learner autonomy and unlocking hidden potential with those with communication difficulties.

Technology in the Workplace the
Words: 2715 Length: 9 Document Type: Research Paper

Instead, organizations must strike a balance between the autonomy and independence offered by technology in the workplace and the need for employees to have some level of formal and informal commitment to the organization as a whole. Just as seemingly counterproductive activities such as doodling, daydreaming, or, in the information age, surfing the internet, can actually contribute to efficiency by offering employees productive mental stimulation, so too can the

Technology in the Classroom in Today's Society,
Words: 3260 Length: 10 Document Type: Research Paper

Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now