You are on page 1of 3

The Potential Threat of Data Tracking

Abstract

The invention of the internet gave the world a new reality of easily accessible data all around the globe.

As a result data is becoming more and more valuable as an asset to individuals, companies, and governments alike.

In this context However, we will be exploring the data tracking of everyday individuals whom surf the internet for

any and every reason and why we should take a closer look at where this data goes and from an ethical standpoint

in how it is used. This is not some unturned stone that I’m revealing for the first time in history, in fact there’s been

a lot of political battles around this as well, which makes the topic all the more interesting to explore. One thing I

found interesting is the surplus of open source spyware technology that anyone can get their hands into. I suppose

this is the expected outcome as the nature of spyware is hosted on the internet where anyone can hide behind a

screen … until you can’t. What we will be looking into next are the different ways of data tracking from

Government to individual use, then explore the pros and cons and also the ethics behind it.

Introduction
As society progressed more and more throughout the years, data and information has become more and

more accessible as well. From user profiles to search history and everything in between, virtually our entire lives,

habits, and networks are all free games to exploit, usually to the highest bidder, but sometimes even to anyone with

internet access willing to take a peak. With this comes a great deal of security risk to everyday people who are

unaware of their information and in whose hands it could potentially reach. All of this must be a pressing issue to

those of us who study and practice cyber security, so that we may find solutions to these issues and protect

individuals from potentially harmful exploitation of their data.

Methods

Maybe 3 topics here

Results and Discussion

Show the results that you achieved in your work and offer an interpretation
of those results. Acknowledge any limitations of your work and avoid
exaggerating the importance of the results.

Conclusion

Summarize your key findings. Include important conclusions that can be


drawn and further implications for the field. Discuss benefits or shortcomings
of your work and suggest future areas for research.

References

Internet Safety: Understanding Browser Tracking - GCFGlobal


https://edu.gcfglobal.org › internetsafety › understandin...
Track data activity before "unusual" becomes dangerous
https://www.techrepublic.com › article › track-data-acti...

3 tracking technologies and their impact on privacy


https://resources.infosecinstitute.com › topic › 3-trackin...

2022 Cyber Security Statistics: The Ultimate List Of Stats, Data ...
https://purplesec.us › resources › cyber security

You might also like