Discuss assessing threats to privacy in web design

Assignment Help Computer Engineering
Reference no: EM131723967

Assessing Threats to Privacy in Web Design

Some of the Internet's biggest companies (i.e., Google, Microsoft, Yahoo, IBM, and Verisign) are working on a new "single sign-on" system that would make it easier to surf the Web. As corporate members of the OpenID Foundation, they are supporting the development of a system that would make it easier for users to sign on to a number of sites without having to remember multiple user IDs, passwords, and registration information. Under OpenID, the companies would share the sign-on information for any Web user who agrees to participate. They would also share personal information such as credit card data, billing addresses, and personal preferences.

Discuss the threats to privacy in this situation. Who would own the data? Explain.

Who do you think should have access to the data? How should that access be controlled?

Reference no: EM131723967

Questions Cloud

Negotiators differ across cultures : Discuss any two of the ways in which negotiators differ across cultures.
Competitive factors and performance objectives : Analyse the relationship between competitive factors and performance objectives, Prepare a set of action points that management can use to build.
Prepare the bank reconciliation at october : On October 31, 2017, Lisik Company had a cash balance per books of $8,946. Prepare the bank reconciliation at October 31
Supply chain management group of a pharmaceutical : If you were newly hired into the Supply Chain Management group of a pharmaceutical company and your first assignment
Discuss assessing threats to privacy in web design : the companies would share the sign-on information for any Web user who agrees to participate
National culturally and linguistically appropriate services : The National Culturally and Linguistically Appropriate Services (CLAS) Standards in Health and Health Care serve as a guide to advance and sustain culturally
What are some ethical considerations should keep : Explain whether you think the consultant should go forward with the plan and give a rationale to support your decision.
Creating a plot for the target correlation : Using the applet, create a plot for the target correlation r = -0.8 in which one point is an outlier that inflates the correlation.
Logical sequence that builds on previous points made : The presentation should have a logical sequence that builds on previous points made.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a paragraph of at least 200 words addressing the

write a paragraph of at least 200 words addressing the following how would you describe web 2.0 to someone who has not

  1 risk assessment of ict systemperform risk assessment for

1. risk assessment of ict systemperform risk assessment for the organization and it is related to ict security threats

  The difference between a rectangular array and a polar array

What is the difference between a rectangular array and a polar array. What inputs are required to execute each command in AutoCAD

  Quantifying the software development

This organization is interested in quantifying its software development. Write down a report proposing suitalbe metrics and propose how these can be collected.

  How to display the largest and smallest amount of tax

Ask users for the past 5 years of federal taxes they have paid, save this data to an array, search for the largest and the smallest amount of tax, and show it on the screen.

  Write a simple computer program to evaluate a function

CS 109 - C/C ++ Programming for Engineers w. MatLab- Spring 2016 Assignment. For this assignment you are to write a simple computer program to evaluate a function of 2 variables over a range of input values, using one- and two-dimensional arrays.  ..

  Building an adder and multiplier with mips

Design the algorithm for this adder, implement this algorithm as a sub-routine in MIPS and estimate how long your sub-routine will take based on the instructions it must complete

  Describe approval process that exists for proposed projects

Describe the approval process that exists for proposed new development projects. What do they think about the process? What are the problems? What are the benefits?

  Declare a class with name cubicle

Declare a class with name Cubicle. The name stands for any rectangular prismatic solid body having three dimensions, i.e. length, width, and height.

  You have been tasked with the project of organizing a

you have been tasked with the project of organizing a company offsite 2-day training session in which people are

  Draw a pipeline diagram showing the out-of-order execution

Determine the number of cycles it takes to execute all iterations of the loop for both the scenario - Draw a pipeline diagram showing the out-of-order execution of the MIPS code through the first iteration of the loop, without bypassing.

  Explain where in operating system the instruction would used

A typical hardware architecture provides an instruction called return from interrupt, abbreviated by something like iret. This instruction switches the mode.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd