Scenario-controversies involving google privacy policy

Assignment Help Management Information Sys
Reference no: EM133394276

Assignment:

SCENARIO: Controversies Involving Google's Privacy Policy

Google Inc., perhaps the most well-known search engine company in the world, also owns and/or operates several subsidiary services and Web-based applications. These include, Gmail, Google Maps, Googleþ, Google Calendar, Google Chrome, Picasa, Adsense/Adwords, and so forth. In the past, each had its own privacy policy. In 2012, however, Google replaced the individual policies with one comprehensive privacy policy across all of its services. When it implemented this change, Google also announced that the company would share user account data across all its services. Critics note that a user's search engine history could be shared with YouTube, or vice versa, and that a user's Googleþ account data might be shared with Adwords to generate more targeted advertising.

Followup

Google's new privacy policy, while explicit and transparent, has nonetheless been controversial for several reasons. For one thing, it is not clear how Google will use all of the personal information that it can now access so easily. For another, no one outside Google fully understands how the search engine company uses that information to manipulate (i.e., tailor or personalize) the search results a user receives for his or her search queries. Additionally, it is not clear whether one's personal information collected from the various Google services will be used only internally, or will also be available to advertisers and information merchants outside the company (e.g., those Web sites that include embedded Google ads to generate revenue).

Should users of Google services accept this type of privacy policy?

Deliverable:

What are your thoughts? What do you think of the situation?

Reference no: EM133394276

Questions Cloud

How can pki certificate secure an remote work environment : How can PKI Certificate help secure an Remote work environment? Can PKI verify a OS minimum while the remote user is connection to VPN.
Discuss tools for a group of non-tech savvy corporate people : Summarize current state "as if" you are discussing these tools for a group of non-tech savvy corporate people.
What physical security solutions does your group propose : What physical security solutions does your group propose? what are the limitations of those solutions?
Create a project plan for the attack : Create a project plan for the attack, including targets to achieve the objectives and methods for acquiring information about those targets.
Scenario-controversies involving google privacy policy : Google Inc., perhaps the most well-known search engine company in the world, also owns and/or operates several subsidiary services and Web-based applications.
Effectiveness of double encryption with any block cipher : Explain how the meet in the middle attack greatly reduces the effectiveness of double encryption with any block cipher (e.g. like Double-DES, Double-AES).
Summary of ethics rules : Technology (NIST) publishes a Summary of Ethics Rules. One of its statements is "Employees shall not use public office for private gain."
How do you connect it to a common ia policy : Consider an organization with several different levels or tiers of management and a decentralized information technology infrastructure.
How you or your family came to miami : How did you and/or your family come here, to this city? Tell the story in a scene, moment to moment. Include setting, dialogue, gestures, names of people.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd