1. Title
Anti-Spyware – A Business and Personal Necessity
2. Problem Setting
The World Wide Web has been one of the greatest development in our recent technologies. It offers Internet which is a global network of computers publicly accessed for its various information, services and other extensions of the World Wide Web.
However, as users gather information from the web. So are other beings whose purpose is to collect personal confidential information through Spyware.
3. Presenting Problem Definition
Information gathered from computer users are very useful for cyber criminals. The problem is that not too many individuals and minor establishments are using anti-spyware for their own security.
4. Real-World Target
There are numerous anti-spyware tools in the market today. Yet I believe they are not used in the utmost advantage. Not everyone knows about it.
5. Research Question
How anti-spyware can be utilized to the utmost without abusing its users as well, thus preventing spyware from further digging deep into computer system which will invade security.
6. Speculation
The installation of spyware distributed as viruses attached to e-mail makes it possible for third parties to view the content of a consumer's hard drive and track movement through the Internet.
Consumers' information is also at risk when they visit Web sites and/or complete transactions online. When consumers provide credit card and personal information to Web sites, this information can be intercepted if the transfer is not encrypted. Privacy can also be compromised with cookies that allow others to track clickstream history.
Another threat to consumer privacy occurs after a company obtains consumer data. In some cases, companies have not kept their promises not to share the data with third parties. However, more serious threats for identity theft include employees stealing data that is electronically stored, or thieves directly hacking into company databases and stealing personal or financial data, such as consumer credit card or Social Security information.
7. Intended Project Outcome
The aim of this project is to look at the threats of spyware in our personal and professional lives. Presenting this threats may then convince individuals and ectablishments to strengthen their security. Today’s Anti-spyware software are available in the market and we must assess the usefulness and satisfactory of its current features in fighting spyware.
8. Design for Collecting Primary Data
BAGeD (Basic Activity for Generating Data) will be to search for Anti-Spyware programs available today. Evaluate its usefulness and availability through conducting interview and survey for the primary data.
9. Design for Processing Primary Data
Generally, a descriptive research method will be used. This research will base its findings partially through quantitative research methods because this permits a flexible approach. Also, qualitative research method will be employed because it intends to find and build theories that will explain relationships of variable. Choice and design of methods will be constantly modified, based on ongoing analysis. This allows investigation of important new issues and questions as they arise.
No comments:
Post a Comment