Moving Forward


            While there are a number of problems relating to online privacy and cyber safety, individuals should by no means, ostracize technology.  Having access to the Internet reaps a surplus of benefits.  In fact, through online usage, individuals are exposed to solutions to combat cyber safety and privacy.  There are a number of solutions, practices and reforms addressing e-sponsibility.  By educating one’s self on various options and enacting these principles, individuals can greatly decrease their chance of falling victim of exploitation or exposure.  Obviously, education is the basis for protection.  Options and practices are all initially formed through understanding the problem and recognizing correlating solutions.  However, through education, one realizes there are many solutions and actions that improve security.
Word Cloud developed by Brianna Claggett at Tagxedo
            There are a number of programs that can help protect your computer system from Internet threats.  Macs have previously installed security programs.  However, installing antivirus systems, firewalls, and spyware protection are all preemptive measures to preventing online breaches.  It’s important to remember that, when protecting one’s self, you can rarely take too many measures.  In addition, keeping one’s computer registry up to date will also keep your system fast with the most recent safety software.  However, while these programs are somewhat effective, individuals should use common sense when visiting sites.  Firewalls and antivirus systems cannot always defend your computer system from online exploitation.  Individuals must remember to practice good cyber safety themselves. 
            In relation to online privacy, there are a number of habits individuals can adopt that will help protect their online identity.  According to Internet Safety Solutions, phishing is a technique employed by online criminals to trick Internet users into giving them confidential information.”  Developing habits such as not giving personal or secure information unless absolutely necessary will help prevent these online criminals from accessing personal information.  In addition, being wary of pop-ups or spam emails will also prevent identity theft.  Using strong passwords and secure Internet connections are also smart choices.  However, these practices are only effective if an individual regularly implements them.  It’s up to each individual whether or not they will adapt to the measures required for a secure relationship with the Internet.  If so, these small actions can be very effective with a long-term impact.
            Another option for online users is to surf anonymously.  According to Umar Anjum, staff writer for Smash!ng Apps, “When you browse the Internet through hidden proxies, websites [do] not send you the request directly but toe the proxy server.”  Therefore, your personal information remains just that, personal.  Proxy free services such as HideMyAss, Tor, and Guardster all allow users to browse the web anonymously.  Kate Murphy, New York Times staff writer, recommends, “not using the same provider for multiple functions.”  She suggests forgoing Gmail if you regularly use Google Search Engine.  By doing so, she claims you are less exposed.  Therefore, in the future, if Google was to leak their database of personal information, you would be better protected.
            Schools are also working to promote student privacy and cyber safety.  According to Nancy Willard, “The Children’s Internet Protection Act requires that school districts develop an Internet safety plan addressing the unauthorized disclosure, use, and dissemination of personal identification information regarding minors.”  In compliance with this plan, schools are instructed to consider specific issues.  Student records, e-mail, and student information are all confidential by obligation.  In addition, school web sites cannot post information that violates the privacy of students or parents.  This act is helpful in instigating and preventing, not only exploitation, but also lawsuits from posting or publishing questionable or private information about their students.  Mandates like this one are effective but still require personal measures by both students and teachers to fully develop a secure online experience.  This act is only a step in the right direction.
            Online privacy and cyber safety are important concepts for anyone who plans on using the Internet.  Because of the number of problems that arise from online use, society has taken preemptive measures.  There are obviously a number of programs, services and practices which will help battle correlating problems.  However, while each solution addresses an issue, e-sponsibility is such a broad topic that multiple measures should be taken.  By combining a number of practices and habits, individuals will increase the effectiveness of any solution.  Simply installing a firewall will not protect an individual from exploitation of personal information.  They must also practice good habits and not provide these details.  Therefore, it’s important to remember that typically, an individual can take more measures in addressing e-sponsibility.  By practicing good common sense and educating one’s self on the dangers and correlating actions, one has already improved their online safety.

Anjum, Umar.  “10 Privacy Tools To Browse The Web Anonymously” <http://www.smashingapps.com/2011/07/11/10-privacy-tools-to-browse-the-web-anonymously.html> Smash!ng Apps. Wordpress, 11 July 2011. 20 March 2013.

Murphy, Kate. “How to Muddy Your Tracks on the Internet” <http://www.nytimes.com/2012/05/03/technology/personaltech/how-to-muddy-your-tracks-on-the-internet.html> New York Times. 2 May 2012. 20 March 2013

“Phishing Prevention – Guide on Phishing” <http://internet-safety-solutions.com/phishing-prevention.html> Internet Safety Solutions. 20 March 2013.

Willard, Nancy. “Ensuring Student Privacy on the Internet” <http://www.educationworld.com/a_tech/tech120.shtml> Education World. School Notes.com, 28 June 2002. 20 March 2013.



Home  |  Overview  |  A Closer Look  |  Moving Forward  |  Conclusion/Suggestions for Change


No comments:

Post a Comment