Privacy Implications Of The Advancement In Information Technology (Record no. 8884)

MARC details
000 -LEADER
fixed length control field 11463nam a22002537a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210203b2019 a|||f mb|| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
041 0# - Language Code
Language code of text eng
Language code of abstract eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.4
100 0# - MAIN ENTRY--PERSONAL NAME
Personal name Mai Ayman Abdelmonem
245 1# - TITLE STATEMENT
Title Privacy Implications Of The Advancement In Information Technology
Statement of responsibility, etc. Mai Ayman Abdelmonem
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Date of publication, distribution, etc. 2019
300 ## - PHYSICAL DESCRIPTION
Extent 60 p.
Other physical details ill.
Dimensions 21 cm.
500 ## - GENERAL NOTE
Materials specified Supervisor: Mohamed Awny
502 ## - Dissertation Note
Dissertation type Thesis (M.A.)—Nile University, Egypt, 2019 .
504 ## - Bibliography
Bibliography "Includes bibliographical references"
505 0# - Contents
Formatted contents note Contents:<br/>Chapter 2: Data Privacy ................................................................................................................................ 3 2.1: Definition of Data Privacy and its Implications .................................................................................. 3<br/>2.2: Data Privacy relates to Different Data Types ..................................................................................... 3<br/>2.2.1: Medical Records .......................................................................................................................... 4<br/>2.2.2: Financial Information .................................................................................................................. 5<br/>2.2.3: Geographic Information .............................................................................................................. 6<br/>2.3: Ethical Issues in Information Technology .......................................................................................... 7<br/>2.4: Privacy Implications of the Rapid Advancements in Information Technology .................................. 8<br/>The Individual Level .............................................................................................................................. 8<br/>The Economic and Social Level ............................................................................................................. 9<br/>2.5: Ethics and Regulatory Laws................................................................................................................ 9<br/>2.6: Cases of Businesses’ Online Security Breaches ................................................................................ 11<br/>Chapter 3: Protecting the Online Privacy.................................................................................................... 13<br/>3.1: Keeping the Online Information Safe .............................................................................................. 13<br/>3.2: The Positive Impact of Information Technology .............................................................................. 14<br/>In the Banking Sector: ......................................................................................................................... 14<br/>In the Healthcare Sector: .................................................................................................................... 15<br/>In the Business Sector: ........................................................................................................................ 15<br/>3.3: The Role of Information Technology in Maintaining Privacy ........................................................... 15<br/>3.3.1: Design Methods ........................................................................................................................ 15<br/>3.3.2: Privacy Enhancing Technologies ............................................................................................... 16<br/>3.3.3: Cryptography ............................................................................................................................ 16<br/>Chapter 4: Security in Cloud-Based Technology ......................................................................................... 17<br/>4.1: The Difference Between Cloud-Based and On-Premises Data Storage ........................................... 17<br/>4.2: Cloud-Based Services Advantages and Challenges .......................................................................... 17<br/>4.3: Privacy Aspects in Cloud-Based Technology .................................................................................... 19<br/>Chapter 5: Problem Statement, Objectives, and Research Method ........................................................... 20<br/>5.1: The Research Problem ..................................................................................................................... 20<br/>VI<br/>5.2: Research Gap .................................................................................................................................. 20<br/>5.3: Importance of the Research ............................................................................................................ 20<br/>5.4: Research Objectives ......................................................................................................................... 20<br/>5.1: The Research Method ...................................................................................................................... 21<br/>5.1.1: Research Type ........................................................................................................................... 21<br/>5.1.2: The Target population............................................................................................................... 21<br/>5.1.3: Research Variables .................................................................................................................... 21<br/>5.1.4: Hypotheses ............................................................................................................................... 22<br/>5.1.5: Hypotheses Testing ................................................................................................................... 25<br/>Chapter 6: Survey ....................................................................................................................................... 26<br/>6.1: Survey Objectives ............................................................................................................................. 26<br/>6.2: Survey Sample ................................................................................................................................. 26<br/>6.3: Survey Results ................................................................................................................................. 26<br/>6.3.1: Privacy Invasion with Regards to the Use of Social Media ....................................................... 27<br/>6.3.2: Privacy Invasion with Regards to the Issue of Finance ............................................................. 31<br/>6.3.3: Privacy Invasion with Regards to Health Information .............................................................. 34<br/>6.3.4: Privacy Invasion with Regards to Geographic Information ...................................................... 35<br/>6.3.5: Privacy Invasion with Regards to Government Intervention .................................................... 37<br/>6.3.6: Privacy Invasion with Regards to the Cloud Technology .......................................................... 38<br/>6.4: Survey Discussion and Analysis ........................................................................................................ 39<br/>6.4.1: Privacy Invasion with Regards to the Use of Social Media ....................................................... 39<br/>6.4.2: Privacy Invasion with Regards to the Issue of Finance ............................................................. 40<br/>6.4.3: Privacy Invasion with Regards to Health Information .............................................................. 40<br/>6.4.4: Privacy Invasion with Regards to Geographic Information ...................................................... 41<br/>6.4.5: Privacy Invasion with Regards to Government Intervention .................................................... 41<br/>6.4.6: Privacy Invasion with Regards to Cloud Technology ................................................................ 41<br/>6.5: Privacy Concerns Indicated by the Survey Results and Ways to Mitigate these Concerns ............. 42<br/>6.6: Summary of Survey Results ............................................................................................................. 44<br/>Chapter 7: Conclusion ................................................................................................................................ 45<br/>Bibliography & References ..........................................................................................................................
520 3# - Abstract
Abstract Abstract:<br/>The impact of information technology on all aspects of our society, work and life has, undoubtedly, been substantial. The rapid advancement in this technology over the past few years has transformed how we do lots of things from communication, shopping and banking to almost everything we do in our daily lives. However, there have been some implications for this transformation which has resulted in a rise of public concerns over personal privacy. Today we are at the beginning of understanding the privacy implications this transformation has on our privacy. The recent advances in information technology have threatened privacy, reduced the amount of control over personal data, and opened up the possibility of negative consequences as a result of inexpensive and convenient access to personal data through the internet.<br/>The purpose of this research work is to shed light on the privacy implications of the advancement in Information Technology on the privacy of individuals and their personal lives.<br/>The research work focuses on a few aspects affecting privacy being the most obvious ones in our personal lives. These aspects are the use of social media, the issue of finance, health information, and geographic information. The implications of Information Technology on the above aspects are discussed and their possible negative impacts on people’s rights such as privacy, freedom, and right to express themselves.<br/>As the Cloud-Based Technology is developing rapidly, this research discusses briefly the security and privacy aspects of this technology.<br/>A field investigation in a form of a survey is conducted; the survey was applied to a sample of 100 respondents randomly approached among the researcher’s professional, academic, and personal network. The responses of the respondents, regarding the issues under study, were analyzed. The research findings have indicated that although a lot of people are genuinely concerned about their privacy, not enough efforts are done to protect their privacy due to insufficient knowledge among most of the respondents.<br/>IV<br/>The role of the government is also addressed and emphasized. Governmental privacy laws need to be well stated and people should be aware of them. However, laws are unable to keep abreast with the implications of Information Technology advancements.<br/>The research also investigates the positive side of Information Technology where it can help in preventing privacy invasions. In this respect, the research work also investigates whether privacy concerns can restrict the future of Information Technology applications
546 ## - Language Note
Language Note Text in English, abstracts in English.
650 #4 - Subject
Subject MOT
655 #7 - Index Term-Genre/Form
Source of term NULIB
focus term Dissertation, Academic
690 ## - Subject
School MOT
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Thesis
650 #4 - Subject
-- 309
655 #7 - Index Term-Genre/Form
-- 187
690 ## - Subject
-- 309
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library 02/03/2021   658.4 / M.A.P 02/03/2021 02/03/2021 Thesis