This website uses cookies to ensure you have the best experience. Learn more

Virtual Work, Security, And Privacy Iaas 600 Research Paper

1215 words - 5 pages

Privacy Rights
Again referencing Shlomit Yanisky-Ravid who state that in this digital era, employees' have a tremendous potential to risk the compromise of their privacy though exposure to future or present employers. The author informs us of the fact that the reading of private emails and tracking of web site post’s of its employee's is among the most common privacy violations. However, several other examples of privacy violations of employee's are perpetrated by employers (Yanisky-Ravid, 2013 p. 6). Later the author asserts “the Internet has blurred the borders between social contexts and mixed the different situations, creating a blend, and sometimes a clash, of rights and wrongs (Yanisky-Ravid, 2013 p. 13). Then asks the question if it is okay to be terminated for a picture of an employee at a costume party posted on the Internet, whereas if the very same picture was still taken however never posted on corrective actions would be taken? The author further states that individuals should be allowed adequate freedom to express and represent oneself. However, the limited concept of privacy enables one to conceptualize the loss of privacy to oneself (Yanisky-Ravid, 2013 p. 13).
The author of the Privacy within the virtual workplace: The entitlement of employees to a virtual “private zone” and the "balloon" theory, Shlomit Yanisky-Ravid, asserts that telecommuters nearly completely lost their rights to privacy in the virtual workplace under the new legislation within the United States (Yanisky-Ravid, 2013 p. 5). This article reasserts that public sector employee's nearly forfeit all of their reasonable expectation of privacy within the realm of the virtual workplace. The very same detriment to privacy has been verified within the private sector as implicit or explicit consent is provided by the employee through signing agreements resulting in the employee's waiving their privacy rights (Yanisky-Ravid, 2013 pp. 19 & 20).
The authors of our textbook expand on this topic by noting that privacy rights are addressed deferentially by the constitutions of the various governmental bodies and notes that neither the Constitution of the United States nor the Charter of Canadian have provisions explicitly defining data or personal information privacy rights which can leave employers open to the possibility being held liable for specific crimes. Most specifically in cases where policies were not disseminated or in instances in which managers “should have reasonably known” (Workman, Phelps, & Gathegi, 2013, p. 44).
Citing Shlomit Yanisky-Ravid again, he informs us of the fact that the United States Supreme Court ruled that Fourth Amendment rights were not violated when an employer read the private text messages of its employee's even if employee's had a reasonable expectation of privacy (Yanisky-Ravid, 2013 p. 7). The author Yanisky-Ravid asserts that communications transmitted electronically are perceived as having a more private nature by the...

Find Another Essay On Virtual Work, Security, and Privacy IAAS 600 Research Paper

E-commerce: Security and Privacy Essay

2129 words - 9 pages E-commerce: Security and Privacy As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through

Privacy and Security Issues in Data Mining

2342 words - 10 pages to do data mining and classifying the user into some group may result in a variety of ethical issues. In this paper, we deal with two kinds of ethical issues caused by data mining techniques: informational privacy issues in web-data mining and database security issues in data mining. We also look at these ethical issues in a societal level and a global level. Informational Privacy Issues in Web-data Mining There is a debate between the benefits

Wireless Security and Privacy Protocols Part 1

2617 words - 11 pages descriptions of the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden. Wireless is everywhere today, whether at home working from your WIFI network to work where you might be linked to a wireless network or even through your phone through a 3G or 4G

Security and Privacy in Social Media

1797 words - 8 pages Security and Privacy in Social Media Technology has advanced tremendously over the past decade, and appears to be advancing at a rapid pace each and every day. The social media is growing just as rapidly. Social media is an interaction between individuals that want to exchange information, photographs, and ideas in different types of networks. Social media users include people of all ages. These people have various experiences, have different

Privacy and Security Issues on Facebook

2038 words - 8 pages Executive Summary Problem Statement: In this white paper we will address how privacy and security can be improved on Facebook. Important Points: · Background of Facebook · Privacy Problems with Facebook · Possible Security and Privacy Solutions · Summary · Works Cited Background of Facebook Facebook allows people to connect with friends across the seas with different cultures. Originally, Facebook was started in 2003 by a man named

Security And Privacy On The Internet

1470 words - 6 pages " technology. The idea of the technology is providing "open" to the sender of information to encrypt it for the recipient who has a secure key to decrypt it, so no one who has a secure key will be able to decrypt such information. In this paper I have tried to present most convenient and accessible ways for protecting personal security and privacy while using Internet. As I have mentioned before, there are plenty of measures which could be most

Threats to Internet Privacy and Security

950 words - 4 pages The Internet presents various challenges in the realms of privacy and security. Such threats originate from obvious sources such as hackers and malware, but threats come from less obvious sources as well; employees, government agencies, and even one’s self through lack of knowledge or vigilance. Privacy, as explained by Lawrence Lessig (2006), “from the perspective of law, is the set of legal restrictions on the power of others to invade a

Lack of Internet Security and Privacy

1035 words - 4 pages Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions

Privacy and Security in Social Networking Sites

1918 words - 8 pages In today’s society, privacy, security, and convenience has turned into a paradoxical issue dealing with the information age (Barnes, 2006…). In fact, one of the primary driving instruments are the usage - and rise – of social networking sites such as: Facebook, Myspace, and Twitter. Having said that - and considering these networks gather considerable amounts of information about its users, the idea of securing your information is momentous

Finding the Balance Between Privacy and Security

1535 words - 6 pages struggled with this balance. What brought these laws on in the rst place was the lack of balance; security dominated privacy during the Vietnam War to an unacceptable point. While FISA, in reality, did not do much, it did set a precedent for later acts. Its wording was built on over decades, slowly evolving it into something eective. As time went on, technology expanded even more. With the creation of the Internet, and other technological

Wireless Security and Privacy Protocols Part 2

1540 words - 7 pages and effortlessly. The next topic should not have to be discussed in detail has it has been previously mentioned above and that is enabling encryption but since it is reported that some 60-70% of wireless networks established have no security enabled (CWSP: Certified Wireless Security Chapter 6) it goes without saying that enabling security will limit your footprint to an attacker. As previously discussed we went over the three encryption

Similar Essays

Virtual Work, Security, And Privacy Iaas 600 Research Paper

1009 words - 5 pages -risks-and-liabilities-of-telecommuting/ Telework enhancement act of 2010 [PDF]. (2010, December 9). Retrieved from Workman, M., Phelps, D. C., & Gathegi, J. N. (2013). Information security for managers. Burlington, MA: Jones & Bartlett Learning. Yanisky-Ravid, S., Dr. (2013, March 11). Privacy within the virtual workplace: The entitlement of employees to a virtual “private zone” and the "balloon" theory [PDF]. Retrieved from

Iaas 600 Information Security Planning Final Exam

1886 words - 8 pages can be used in network security, beyond those described in this chapter. “A layered defense system takes into account security, both in terms of breadth and depth. More specifically, the core systems are designed to protect the most fundamental and yet basic computing, whereas outer layers strive to filter the most prolific and common attacks” (Workman, Phelps, & Gathegi, 2013, p. 315). Other layers that be used in network security include

Internet Privacy A Detailed Research Paper About Internet Security And Its Loop Holes...A Computer Sceinece Engineering Course Essay With Work Cited Pages

674 words - 3 pages Internet privacyThe concise oxford dictionary defines privacy as being withdrawn from society or public interest. Privacy is the claim of individuals, groups or institutions to determine for themselves when and to what extent information is communicated to others. In the past two years, the world of communications has experienced a revolution as computers across the world have learned to speak with one another.The impact of personal privacy is

Internet Privacy And Security Essay

1113 words - 5 pages personal information with the world via social network sites, blogs, and in online communities.” Unfortunately, people should expect that social media is not private and should not share anything they consider private on these shared networks, as they are exactly that, shared. When I started this research paper, I argued that there was a difference between Privacy and Security when it comes to the internet. I now realize that they are different, but