Question

In your own words, explain how conflicts arise due to needs for computer security and privacy...

In your own words, explain how conflicts arise due to needs for computer security and privacy in IT and how Australian laws help in managing the conflicts.

Use some examples from your own experience to illustrate the potential advantages and disadvantages of IT in relation to your personal privacy.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Conflicts due to IT privacy and computer security:

IT privacy and computer security are completely related to each other. IT privacy allows controlling of data one has rights to. Security refers to the protection of such data. In many cases, IT privacy becomes the reason for the security breach.

  • Unwanted processing of certain confidential data shared by the clients or customers can cause problems in computer security.
  • Computer security is not a simple process.
  • In many cases, the data shared by users is used for marketing purposes.
  • In some cases, the harm to the system can also cause problems.
  • The notions of security shoudl be understood with respect to IT privacy to make it more effective.

Australian laws for managing the conflicts:

To manage such conflicts, there are different data protection laws in various Australian territories. It is applicable to private businesses, state government agencies, etc. The privacy act protects user privacy and personal information.

  • Unauthorized access of any kind to the systems is considered a crime.
  • The conflicts are hard to resolve however, the modification or use of restricted data is considered chargeable based on the crime.


Advantages/Disadvantages of IT with respect to personal privacy:

Advantages:

1. One can always run a secure business using encryption strategies. For example, many e-commerce sites offer clients and customers security for the private data shared by them online.

2. There are also many features that can help in avoiding unwanted messages and cyber attacks. For example, one can use spam filters and block certain audiences.

3. The integrity of the company and website is protected. For example, only trusted employees are enabled to access the confidential data on the site.

Disadvantages:

1. Receiving unsolicited messages and files is the number one issue. Certain hackers etc. try to lure the users into submitting data regarding banks or other subjects.

2. Viruses can be spread even when there is a privacy setting. One might not share the data but might click on a certain link that is not good for the system.

3. Spam messages and other ways are used to get credit data or other data. Usually, it is compromised when privacy is exposed using malicious links.

Add a comment
Know the answer?
Add Answer to:
In your own words, explain how conflicts arise due to needs for computer security and privacy...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT