SlideShare a Scribd company logo
1 of 6
_____________________________________________________________________
HIGHER COLLEGES OF TECHNOLOGY
RAS AL KHAIMAH WOMEN’S COLLEGE
________________________________________________________________
LSC 2103
Academic Reading & Writing
Reading Log 2
Name: ____________________________ Section: ________
Faculty: ________________________________
Contents:
3 (three) annotatedacademic articles
3 word lists of 5+ vocabulary words each
3 100 word summaries
3 100+ word opinion paragraphs
1 APA formatted reference listof articles
Summary:
In this article, the writer Liu says that the internet violation been a common problem in all the
countries when it’s appear because the Internet Privacy security models has changes that the
local assurance is different to the historical background and value protection . The European
Union use models to protect the internet privacy for people and for the improvement efficient
because of the conflict between the rules and also to make a lot features in law. There are
many countries have a special thing for the protection of the internet privacy such as
European Union, the United States, South Korea and Japan. 1
1 Liu, D. T. (2011).On China's construction of Internet privacy protection system. Legal Space, (01). (In
Chinese).
INTERNET PRIVACY PROTECTION MODELS IN FOREIGN COUNTRIES
The occurrence of Internet infringement cases has become a common problem in all countries. Because
of different local emphases on historical background and value protection, Internet privacy protection
models vary. Some countries providing distinctive Internet privacy protection in law mainly include
the European Union, the United States, South Korea and Japan.
The European Union is a typical country which uses legislation as the primary means to protect
Internet privacy for its people. In order to make its people follow Internet privacy protection principles,
the EU keeps enacting laws and regulations, and even, in order to complement this implementation, it
also enacts administrative regulations and judicial relief in particular. The EU as a whole, in order to
improve efficiency and reduce hassles due to inconsistencies between the rules, makes a lot of common
laws and regulations. Due to its own characteristics of virtual network, the EU member countries have
reached a consensus foe this legislation. For example, in 1981, the council of Europe member states
signed the "Personal Protection Convention of Automatic Processing of Personal Data". On October
24, 1995, EU member states passed "EU Personal Data Protection Direction". After that, the EU has
successively promulgated a series of regulations, such as the "General Principles of Internet Privacy
Protection" and so on.
The United States is a case law country. In protecting Internet privacy, it typically adopts industry self-
regulation model. The industry self-regulation model can be divided into three kinds: the first one is to
regulate the behavior of Internet service providers, Congress provides suggestions for Internet service
providers by developing relevant laws and regulations, requires them to develop Internet privacy
protection rules, and reviews the rules they have developed to achieve Internet privacy protection. The
second one is to allow users to better identify the scope of others' personal information. Enterprises in
compliance with Internet privacy protection standards can post a Internet privacy protection
certification after authorized to make sure their users are under Internet privacy protection. The third
one is to conduct technology protection in order to respect users' right to choose. The Internet
community takes a large number of privacy platforms as a carrier, allowing individuals to decide which
information can be made public and which cannot from the information presented by the carrier.
Ultimately, users can decide to post information and adopt methods provided by Internet technology.
This can prevent users from losing confidence in Internet security.
Opinion:
In my opinion, the European Union made the good thing for people to how to protect their
privacy while using the internet and also they dominate the violation that has been a problem
in the internet and fix it right away and people can make sure of the local historical
background that are value protection and because of the models that are make a good
protection for the people and the European, the United States, South Korea and Japan these
countries make it better and more privacy and adding features that people can insure the
privacy in a good way.
Word Meaning
1 Infringement To do something that is against a law or someone's legal rights
2 Emphases Special attention or importance
3 Vary Several things of the same type, they are all different from
each other
4 Distinctive Having a special quality, character, or appearance that is
different and easy to recognize
5 Enact To act in a play, story
Summary:
In this article, the writer Justin Healey says that Email let us to send or text messages secretly
from phone or computers. Also we have to make an account by email that easy to contact
other people by using ( ISP ) Internet Service Provider which people can send to each other
but we have to know their address. On the other hand, internet takes a place which has
subject conclude chat groups that they can discuss in interactive better than individually and
the messages can be replied in real time. Also the internet privacy have a threat in web when
we suffered that the web can gather personal information without we know.2
Opinion:
In my point of view, making mails is so easy that to connect to other people from same
country and out of country by texting, sharing images and making free calls or video. With
the Internet Service Provider help us to communicate with other people could be family or
friends from aboard. Chatting with one friend are not interactive but chatting with group an
more interactive and fun. But the web have one problem that can’t save the personal
information without our permission. Also we have to be careful when we provide our
personal information in the internet because some of web don’t have privacy system and cant
save our details.
2 Justin Healey, in The Internet Uses and Abuses,Issues in society,Volue161,February (2002)
Word Meaning
6 Account A written or spoken description that says what happens in an
event or process
7 Blueprint A photographic print of a plan for a building, machine etc on
special blue paper
8 Protocol A system of rules about the correct way to behave on an
official occasion
9 Interactive An interactive computer program, television system etc allows
you to communicate directly with it, and does things in
reaction to your actions
10 Suffer To experience physical or mental pain
A Taxonomy for Privacy Concerns
There exists a wide range of Internet marketing activities that have negative effects on the
Internet consumer’s individual privacy . The privacy concerns are not limited to the more well-
known cases of junk mailing [6, 8], or illicit Web cookie distribution, but have expanded to
certain practices that have become cornerstones of Internet merchants’ revenue streams, for
example, the selling of consumer databases for direct marketing purposes.
Over the past few years, we have seen evidence of an increasing number of privacy-related
cases, as related to the growth of Internet marketing activities:
• Privacy concerns related to the activities of junk email marketing organizations, such as Cyber
Promotions and net.net.
• The activities of Web-based advertisements that track the user’s usage history and preferences
through cookies, such as those from Double Click net, Preferences.com, and many others.
• Privacy concerns over malicious programs that can be constructed through security holes in
many Internet tools, such as Java, ActiveX, JavaScript, and many others. Well-known malicious
techniques include ActiveX controls that can obtain a person’s credit information and JavaScript
that accesses personal files.
• Privacy concerns regarding the use and transfer of private information, illustrated by the cases
involving: MSN (Microsoft Network) and their practice of tracking all activities of their
subscribers; Microsoft Sidewalk viewers and their viewing activity patterns to be used for
Microsoft marketing purposes. Choices to opt out of such practices are often non-existent or
extremely difficult to exercise.
Principles for Protecting Privacy
The key issue of privacy in the Internet marketplace is that the privacy rights of individuals
should be balanced with the benefits associated with the free flow of information. Protecting
privacy must be undertaken in combination with a number of other efforts. There are three main
parties involved, each playing different roles:
• Government: promoting strong privacy laws for both the public and private sectors;
establishing independent privacy commissions to oversee the implementation of these laws;
educating the
public about privacy issues; encouraging business self-regulation.
• Businesses: promoting self-regulation for fair information practices.
• Individuals: adopting privacy enhancing technologies, such as network and information
security tools.
Summary:
According to the article the writers Wilinsky and Sylvester says that there are many activities
has been going on the internet but with bad effects the consumers individually. The
marketing purposes have been targeted in the selling for the consumer and have a bases
database for selling also. Also recent years have been seen that the number of cases about the
privacy is increasing because the fears of the privacy are not welcomed and other reason of
the privacy that the internet followed the history of use and favorites on the personal profiles
and other reason that the internet can follow the personal users when they sending MSN.3
Opinion:
My point of view, the negative activates in the internet are wider in the all over the world and
the consumers get affected from it in bad way. Also the consumer’s privacy database has
been sold in the internet and we have to be careful when we put the data in the internet.
Although, the consumer don’t know that the internet can take the privacy data and also the
more threats have been show up in the internet that harm the consumer privacy. With sending
with MSN the user is sure of sending personal thing with emails that are protected and easy
to use.
3
Wilinsky, C. and Sylvester, J. Privacy in the telecommunications age. Commun. ACM 35, 2 (Feb. 1992), 23–25.
Word Meaning
11 Junk To get rid of something because it is old or useless
12 Cornerstone Something that is extremely important because
everything else depends on it
13 Database A large amount of data stored in a computer system so
that you can find and use it easily
14 Malicious Very unkind and cruel, and deliberately behaving in a
way that is likely to upset or hurt someone
15 Sidewalk A hard surface or path at the side of a street for people
to walk on

More Related Content

What's hot

A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesAndres Baytelman
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesErrol A. Adams, J.D., M.L.S.
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Jesus Rances
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 EditedJuvywen
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Leelet1121
 
Lesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLyka Larita
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyesandregoron
 
L1 introduction-to-information-and-communication-technology
L1 introduction-to-information-and-communication-technologyL1 introduction-to-information-and-communication-technology
L1 introduction-to-information-and-communication-technologyMarko-_
 
Web1, web2 and web 3
Web1, web2 and web 3Web1, web2 and web 3
Web1, web2 and web 3mercedeh37
 
[Research],[Netcitizen Report 2011]_EN
[Research],[Netcitizen Report 2011]_EN[Research],[Netcitizen Report 2011]_EN
[Research],[Netcitizen Report 2011]_ENAiiM Education
 
Internet And Its Uses
Internet And Its UsesInternet And Its Uses
Internet And Its UsesRishabh27
 
6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global location6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global locationAlexander Decker
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictDexter Dizon
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies RicciGozon
 

What's hot (20)

A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issues
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issues
 
Internet
InternetInternet
Internet
 
Web 3.0 semantics
Web 3.0 semanticsWeb 3.0 semantics
Web 3.0 semantics
 
Digital divide
Digital divideDigital divide
Digital divide
 
Empowerment Technologies - Module 1
Empowerment Technologies - Module 1Empowerment Technologies - Module 1
Empowerment Technologies - Module 1
 
Lesson 1 2 Edited
Lesson 1 2 EditedLesson 1 2 Edited
Lesson 1 2 Edited
 
Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)Introduction to ICT (Web 1.0 and Web 2.0)
Introduction to ICT (Web 1.0 and Web 2.0)
 
Lesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICTLesson 1: Intoduction to ICT
Lesson 1: Intoduction to ICT
 
Ict day4 quiz
Ict day4 quizIct day4 quiz
Ict day4 quiz
 
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology  by: Maria Elisa Pal and Rodel ReyesEmpowerment Technology  by: Maria Elisa Pal and Rodel Reyes
Empowerment Technology by: Maria Elisa Pal and Rodel Reyes
 
L1 introduction-to-information-and-communication-technology
L1 introduction-to-information-and-communication-technologyL1 introduction-to-information-and-communication-technology
L1 introduction-to-information-and-communication-technology
 
Web1, web2 and web 3
Web1, web2 and web 3Web1, web2 and web 3
Web1, web2 and web 3
 
Mobile Media
Mobile MediaMobile Media
Mobile Media
 
[Research],[Netcitizen Report 2011]_EN
[Research],[Netcitizen Report 2011]_EN[Research],[Netcitizen Report 2011]_EN
[Research],[Netcitizen Report 2011]_EN
 
Internet And Its Uses
Internet And Its UsesInternet And Its Uses
Internet And Its Uses
 
6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global location6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global location
 
Admshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ictAdmshs emp tech_q1_m1_l1-ict
Admshs emp tech_q1_m1_l1-ict
 
empowerment technologies
empowerment technologies empowerment technologies
empowerment technologies
 
Internet Research
Internet ResearchInternet Research
Internet Research
 

Viewers also liked

Youth reading log
Youth reading logYouth reading log
Youth reading logsml665
 
sustained silent reading
sustained silent readingsustained silent reading
sustained silent readingCoki Moci
 
SSR ( SUSTAINED SILENT READING )
SSR ( SUSTAINED SILENT READING )SSR ( SUSTAINED SILENT READING )
SSR ( SUSTAINED SILENT READING )Sary Nieman
 
Silent reading fluency
Silent reading fluencySilent reading fluency
Silent reading fluencymizzyatie14
 
Sustained Silent Reading
Sustained Silent ReadingSustained Silent Reading
Sustained Silent Readingguest4fcb9b
 
Rigorous reading part 2
Rigorous reading part 2Rigorous reading part 2
Rigorous reading part 2robinlstewart
 
Being a Teacher: Reading 8. Accountability for Professional Practice
Being a Teacher: Reading 8. Accountability for Professional PracticeBeing a Teacher: Reading 8. Accountability for Professional Practice
Being a Teacher: Reading 8. Accountability for Professional PracticeSaide OER Africa
 

Viewers also liked (10)

Youth reading log
Youth reading logYouth reading log
Youth reading log
 
sustained silent reading
sustained silent readingsustained silent reading
sustained silent reading
 
SSR ( SUSTAINED SILENT READING )
SSR ( SUSTAINED SILENT READING )SSR ( SUSTAINED SILENT READING )
SSR ( SUSTAINED SILENT READING )
 
The Power of Silent Sustained Reading
The Power of Silent Sustained ReadingThe Power of Silent Sustained Reading
The Power of Silent Sustained Reading
 
Silent reading fluency
Silent reading fluencySilent reading fluency
Silent reading fluency
 
Silent Reading: Why and How
Silent Reading: Why and HowSilent Reading: Why and How
Silent Reading: Why and How
 
Reading logs
Reading logsReading logs
Reading logs
 
Sustained Silent Reading
Sustained Silent ReadingSustained Silent Reading
Sustained Silent Reading
 
Rigorous reading part 2
Rigorous reading part 2Rigorous reading part 2
Rigorous reading part 2
 
Being a Teacher: Reading 8. Accountability for Professional Practice
Being a Teacher: Reading 8. Accountability for Professional PracticeBeing a Teacher: Reading 8. Accountability for Professional Practice
Being a Teacher: Reading 8. Accountability for Professional Practice
 

Similar to Reading Log

A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptxAmanuelZewdie4
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentIJERA Editor
 
CS4001 Final Ethics Paper
CS4001 Final Ethics PaperCS4001 Final Ethics Paper
CS4001 Final Ethics PaperGino McCarty
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketinggaurav jain
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Evaluation Essay Sample Master Of Te. Online assignment writing service.
Evaluation Essay Sample  Master Of Te. Online assignment writing service.Evaluation Essay Sample  Master Of Te. Online assignment writing service.
Evaluation Essay Sample Master Of Te. Online assignment writing service.Renee Campbell
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rightsSomerco Research
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
ANALYTIC CHECKLIST FOR ESSAYS - ESL Works
ANALYTIC CHECKLIST FOR ESSAYS - ESL WorksANALYTIC CHECKLIST FOR ESSAYS - ESL Works
ANALYTIC CHECKLIST FOR ESSAYS - ESL WorksAnita Miller
 
Free Letter Writing Paper Printable - PRINTABLE TE
Free Letter Writing Paper Printable - PRINTABLE TEFree Letter Writing Paper Printable - PRINTABLE TE
Free Letter Writing Paper Printable - PRINTABLE TEChristine White
 
Why You Should Go To A Community College Free Es
Why You Should Go To A Community College Free EsWhy You Should Go To A Community College Free Es
Why You Should Go To A Community College Free EsMichelle Wilson
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Digital Policy and Law Consulting
 

Similar to Reading Log (20)

Review questions
Review questionsReview questions
Review questions
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
Research on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data EnvironmentResearch on Privacy Protection in Big Data Environment
Research on Privacy Protection in Big Data Environment
 
CS4001 Final Ethics Paper
CS4001 Final Ethics PaperCS4001 Final Ethics Paper
CS4001 Final Ethics Paper
 
Ethics of electronic marketing
Ethics of electronic marketingEthics of electronic marketing
Ethics of electronic marketing
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Evaluation Essay Sample Master Of Te. Online assignment writing service.
Evaluation Essay Sample  Master Of Te. Online assignment writing service.Evaluation Essay Sample  Master Of Te. Online assignment writing service.
Evaluation Essay Sample Master Of Te. Online assignment writing service.
 
Digital magna carta privacy rights
Digital magna carta   privacy rightsDigital magna carta   privacy rights
Digital magna carta privacy rights
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
ANALYTIC CHECKLIST FOR ESSAYS - ESL Works
ANALYTIC CHECKLIST FOR ESSAYS - ESL WorksANALYTIC CHECKLIST FOR ESSAYS - ESL Works
ANALYTIC CHECKLIST FOR ESSAYS - ESL Works
 
Whitepaper
WhitepaperWhitepaper
Whitepaper
 
Free Letter Writing Paper Printable - PRINTABLE TE
Free Letter Writing Paper Printable - PRINTABLE TEFree Letter Writing Paper Printable - PRINTABLE TE
Free Letter Writing Paper Printable - PRINTABLE TE
 
Why You Should Go To A Community College Free Es
Why You Should Go To A Community College Free EsWhy You Should Go To A Community College Free Es
Why You Should Go To A Community College Free Es
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...Deceived by design. How tech companies use dark patterns to discourage us fro...
Deceived by design. How tech companies use dark patterns to discourage us fro...
 
549 458-465
549 458-465549 458-465
549 458-465
 

Reading Log

  • 1. _____________________________________________________________________ HIGHER COLLEGES OF TECHNOLOGY RAS AL KHAIMAH WOMEN’S COLLEGE ________________________________________________________________ LSC 2103 Academic Reading & Writing Reading Log 2 Name: ____________________________ Section: ________ Faculty: ________________________________ Contents: 3 (three) annotatedacademic articles 3 word lists of 5+ vocabulary words each 3 100 word summaries 3 100+ word opinion paragraphs 1 APA formatted reference listof articles
  • 2. Summary: In this article, the writer Liu says that the internet violation been a common problem in all the countries when it’s appear because the Internet Privacy security models has changes that the local assurance is different to the historical background and value protection . The European Union use models to protect the internet privacy for people and for the improvement efficient because of the conflict between the rules and also to make a lot features in law. There are many countries have a special thing for the protection of the internet privacy such as European Union, the United States, South Korea and Japan. 1 1 Liu, D. T. (2011).On China's construction of Internet privacy protection system. Legal Space, (01). (In Chinese). INTERNET PRIVACY PROTECTION MODELS IN FOREIGN COUNTRIES The occurrence of Internet infringement cases has become a common problem in all countries. Because of different local emphases on historical background and value protection, Internet privacy protection models vary. Some countries providing distinctive Internet privacy protection in law mainly include the European Union, the United States, South Korea and Japan. The European Union is a typical country which uses legislation as the primary means to protect Internet privacy for its people. In order to make its people follow Internet privacy protection principles, the EU keeps enacting laws and regulations, and even, in order to complement this implementation, it also enacts administrative regulations and judicial relief in particular. The EU as a whole, in order to improve efficiency and reduce hassles due to inconsistencies between the rules, makes a lot of common laws and regulations. Due to its own characteristics of virtual network, the EU member countries have reached a consensus foe this legislation. For example, in 1981, the council of Europe member states signed the "Personal Protection Convention of Automatic Processing of Personal Data". On October 24, 1995, EU member states passed "EU Personal Data Protection Direction". After that, the EU has successively promulgated a series of regulations, such as the "General Principles of Internet Privacy Protection" and so on. The United States is a case law country. In protecting Internet privacy, it typically adopts industry self- regulation model. The industry self-regulation model can be divided into three kinds: the first one is to regulate the behavior of Internet service providers, Congress provides suggestions for Internet service providers by developing relevant laws and regulations, requires them to develop Internet privacy protection rules, and reviews the rules they have developed to achieve Internet privacy protection. The second one is to allow users to better identify the scope of others' personal information. Enterprises in compliance with Internet privacy protection standards can post a Internet privacy protection certification after authorized to make sure their users are under Internet privacy protection. The third one is to conduct technology protection in order to respect users' right to choose. The Internet community takes a large number of privacy platforms as a carrier, allowing individuals to decide which information can be made public and which cannot from the information presented by the carrier. Ultimately, users can decide to post information and adopt methods provided by Internet technology. This can prevent users from losing confidence in Internet security.
  • 3. Opinion: In my opinion, the European Union made the good thing for people to how to protect their privacy while using the internet and also they dominate the violation that has been a problem in the internet and fix it right away and people can make sure of the local historical background that are value protection and because of the models that are make a good protection for the people and the European, the United States, South Korea and Japan these countries make it better and more privacy and adding features that people can insure the privacy in a good way. Word Meaning 1 Infringement To do something that is against a law or someone's legal rights 2 Emphases Special attention or importance 3 Vary Several things of the same type, they are all different from each other 4 Distinctive Having a special quality, character, or appearance that is different and easy to recognize 5 Enact To act in a play, story
  • 4. Summary: In this article, the writer Justin Healey says that Email let us to send or text messages secretly from phone or computers. Also we have to make an account by email that easy to contact other people by using ( ISP ) Internet Service Provider which people can send to each other but we have to know their address. On the other hand, internet takes a place which has subject conclude chat groups that they can discuss in interactive better than individually and the messages can be replied in real time. Also the internet privacy have a threat in web when we suffered that the web can gather personal information without we know.2 Opinion: In my point of view, making mails is so easy that to connect to other people from same country and out of country by texting, sharing images and making free calls or video. With the Internet Service Provider help us to communicate with other people could be family or friends from aboard. Chatting with one friend are not interactive but chatting with group an more interactive and fun. But the web have one problem that can’t save the personal information without our permission. Also we have to be careful when we provide our personal information in the internet because some of web don’t have privacy system and cant save our details. 2 Justin Healey, in The Internet Uses and Abuses,Issues in society,Volue161,February (2002) Word Meaning 6 Account A written or spoken description that says what happens in an event or process 7 Blueprint A photographic print of a plan for a building, machine etc on special blue paper 8 Protocol A system of rules about the correct way to behave on an official occasion 9 Interactive An interactive computer program, television system etc allows you to communicate directly with it, and does things in reaction to your actions 10 Suffer To experience physical or mental pain
  • 5. A Taxonomy for Privacy Concerns There exists a wide range of Internet marketing activities that have negative effects on the Internet consumer’s individual privacy . The privacy concerns are not limited to the more well- known cases of junk mailing [6, 8], or illicit Web cookie distribution, but have expanded to certain practices that have become cornerstones of Internet merchants’ revenue streams, for example, the selling of consumer databases for direct marketing purposes. Over the past few years, we have seen evidence of an increasing number of privacy-related cases, as related to the growth of Internet marketing activities: • Privacy concerns related to the activities of junk email marketing organizations, such as Cyber Promotions and net.net. • The activities of Web-based advertisements that track the user’s usage history and preferences through cookies, such as those from Double Click net, Preferences.com, and many others. • Privacy concerns over malicious programs that can be constructed through security holes in many Internet tools, such as Java, ActiveX, JavaScript, and many others. Well-known malicious techniques include ActiveX controls that can obtain a person’s credit information and JavaScript that accesses personal files. • Privacy concerns regarding the use and transfer of private information, illustrated by the cases involving: MSN (Microsoft Network) and their practice of tracking all activities of their subscribers; Microsoft Sidewalk viewers and their viewing activity patterns to be used for Microsoft marketing purposes. Choices to opt out of such practices are often non-existent or extremely difficult to exercise. Principles for Protecting Privacy The key issue of privacy in the Internet marketplace is that the privacy rights of individuals should be balanced with the benefits associated with the free flow of information. Protecting privacy must be undertaken in combination with a number of other efforts. There are three main parties involved, each playing different roles: • Government: promoting strong privacy laws for both the public and private sectors; establishing independent privacy commissions to oversee the implementation of these laws; educating the public about privacy issues; encouraging business self-regulation. • Businesses: promoting self-regulation for fair information practices. • Individuals: adopting privacy enhancing technologies, such as network and information security tools.
  • 6. Summary: According to the article the writers Wilinsky and Sylvester says that there are many activities has been going on the internet but with bad effects the consumers individually. The marketing purposes have been targeted in the selling for the consumer and have a bases database for selling also. Also recent years have been seen that the number of cases about the privacy is increasing because the fears of the privacy are not welcomed and other reason of the privacy that the internet followed the history of use and favorites on the personal profiles and other reason that the internet can follow the personal users when they sending MSN.3 Opinion: My point of view, the negative activates in the internet are wider in the all over the world and the consumers get affected from it in bad way. Also the consumer’s privacy database has been sold in the internet and we have to be careful when we put the data in the internet. Although, the consumer don’t know that the internet can take the privacy data and also the more threats have been show up in the internet that harm the consumer privacy. With sending with MSN the user is sure of sending personal thing with emails that are protected and easy to use. 3 Wilinsky, C. and Sylvester, J. Privacy in the telecommunications age. Commun. ACM 35, 2 (Feb. 1992), 23–25. Word Meaning 11 Junk To get rid of something because it is old or useless 12 Cornerstone Something that is extremely important because everything else depends on it 13 Database A large amount of data stored in a computer system so that you can find and use it easily 14 Malicious Very unkind and cruel, and deliberately behaving in a way that is likely to upset or hurt someone 15 Sidewalk A hard surface or path at the side of a street for people to walk on