Complete the following two steps: A. On the discussion forum, please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same i

Complete the following two steps:A. On the discussion forum, please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 250 words.B. Respond to two classmates’ postings. Minimum 100 words per posting.REPLY – 1 (SNEHA MAMI)Anonymity means the state of being unrecognized. On the internet, it is used to refer to the ability of an internet user to access a site on the internet without his/her identity being established. There are some reasons as to why people prefer being anonymous on the internet. Some of these reasons include;First is the desire of protecting the identity. Although one might not be undertaking any illegal activity, everyone needs some aspect of privacy. There are some social classes that people attain that call for this king of concealed identity. People who are introverts tend to like carrying out their activities incognito. The other need for anonymity is the need to avoid personal harassment that comes from online attacks due to an individual’s opinions. At times when one gives their views via social media, the opponents to that opinion might bash the proponent, leading to damage to his reputation (Christopherson, 2007). However, once a person has hidden his/her online identity, such attacks will not be directed to his identity. Lastly, anonymity helps to conceal the identity of people who may need to ask very sensitive questions via the internet. For instance, one may need to inquire from health experts via the online platforms concerning his/her health conditions and the possible symptoms of some disease. People feel more comfortable when they do this incognito.Some of the dangers that come along with the use of the internet include cyber threats and cyberbullying. Here, the security of one’s personal information is put at risk due to the possibility of phishing. Also, internet users may, at times, bully a person by spreading false information about them (James, 2008). Furthermore, cases of sexual abuse by people taking part in online dating have been on the rise. Exposure of children to the internet has also led to moral decadence. This is why a need arises to come up with measures to mitigate some of these problems.ReferencesChristopherson, K. M. (2007). The positive and negative implications of anonymity in Internet social interactions: “On the Internet, Nobody Knows You’re a Dog.” Computers in Human Behavior, 23(6), 3038-3056.James, J. (2008). Digital divide complacency: Misconceptions and dangers. The Information Society, 24(1), 54-61.REPLY – 2 (AISWARYA THOTA)In today’s world, all of us are dependent on the Internet for various reasons. It’s main ability to connect people via electronic devices; to have information available to many of us and major source of entertainment. However, it is to be noted that there are disadvantages due to internet as well. They include malware, cyber-attacks, security issues, etc.Keeping that in the mind, user privacy is a major concern. Data can be accessed by any hacker to misuse it. To reduce such activities, anonymizer services, have been introduced. Although they serve the purpose but then they do have their own disadvantages as well.HTTP, the hyper text transfer protocol, allows you to get HTML documents and is a client-server protocol, which will allow user to access the documents accessing via a web browser through a request and response cycle. Even though HTTP is simple, extensible and stateless, it doesn’t store any information that is sent to the server.An anonymizer is a proxy tool which helps to make the attempts made on the internet untraceable. Using of an anonymizer will help to reduce risks to some extent and avoid thefts. Data anonymization is a process implemented to protect data. It protects data by either encrypting the data. (Eckert C., Pircher A., 2001)There are different levels of anonymity. They are defined as belowLevel 1: Pseudo-anonymity with respect to the communication partnerLevel 2: Pseudo-anonymity with respect to the anonymizing serviceLevel 3: Anonymity with respect to the communication partnerLevel 4: Anonymity with respect to the anonymizing serviceLevel 5: Anonymity with respect to third partiesLevel 6: Anonymity with respect to the anonymizerThere are different kinds of anonymizer services. They are Log-file anonymizer; proxy anonymizer and the web anonymizer. Developed for the Apache Web server, the log file anonymizer, preserves the privacy of user’s data. The proxy anonymizer will receive requests and forwards them to the original proxy server after hiding and modifying the information that was sent.It is to be considered that there are problems with the anonymity of the data. They are re-identification. In case of a health care organization, data security and privacy are very important. Data masking doesn’t use metrics to measure the actual risk of re-identification and they deal with direct identifiers, which is a potential issue as to uniquely identify the data, identifiers such as name, email or social security number, etc. and if such data is eliminated, it is surely is an issue. To avoid such instances, data masking needs to be done to fields that don’t need any analytics. (Privacy Analytics, 2017).References:Eckert C., Pircher A. (2001) Internet Anonymity: Problems and Solutions. In: Dupuy M., Paradinas P. (eds) Trusted Information. SEC 2001. IFIP International Federation for Information Processing, vol 65. Springer, Boston, MAPrivacy Analytics. (Jan 9th, 2017). The Problem with Data Masking Techniques. Retrieved from https://privacy-analytics.com/de-id-university/blog/problem-data-masking-techniques/

Give us your instructions.
Select the type of service you need: writing, calculations, or programming. We’ve created an intuitive order form that tells you what information to enter and where, so make sure to fill out each required field. Also, make your requirements as specific as possible. Don’t rush! Take your time and explain everything in detail how it works.

Proceed to checkout and enter your credit card details or PayPal login, how to pay. Follow the payment provider’s instructions to confirm the transaction.
Now your order is in our system! We’ll start processing it right away.

Place Your Order

Contact Us

Frequently asked questions
Is your service confidential?

When you place an order with our company, we ask you to provide us with such personal information as your name, phone number, and email address. We need this data to keep you updated on the important things related to your order or account.

Is there a possibility of plagiarism in my completed order?

We complete each paper from scratch and in order to make you feel safe regarding its authenticity, we check it for plagiarism before its delivery. To do that, we use our in-house software, which can find not only copy-pasted fragments but even paraphrased pieces of text. Unlike popular plagiarism detection systems that are used by most universities (e.g. Turnitin.com), we do not report to any public databases—therefore, such checking is safe.

We provide a plagiarism-free guarantee that ensures your paper is always checked for its uniqueness.

Is there a money-back guarantee? If yes, how can I receive a refund?

You can certainly get your money back in several cases. You can receive a full refund if you have paid for your order twice or if you have placed two identical orders. In case your paper was late or the quality of the paper does not correspond to your expectations, you will get compensation for these issues.

Do you keep a database of pre-written essays?

No, we do not have such a database. All papers you order from us are written from scratch. This means your paper is unique and has never been published before—neither will it be published after we deliver it to you.

 

When will my custom paper be done?

While placing an order with WritersHub, you can choose a period of time within which a paper should be delivered to you. The countdown until the specified deadline starts automatically from the moment we receive your payment in our system. For example, if you pay for your order at 6pm on Monday and choose a 3-day delivery option, you will receive your custom paper by 6pm on Thursday.

Remember that a writer needs a sufficient amount of time in order to conduct thorough research. Therefore, please choose the most suitable deadline when you place an order. Moreover, the later you need your paper to be delivered to you, the cheaper it will be. Thus, you will be able to save your money while your writer will have enough time to work on your order and ensure its quality.

Make sure you upload all the additional materials at the very beginning. If you fail to do that, the deadline for your order will be postponed as well.

I haven’t received my custom paper by the deadline. What should I do?

Let us know immediately about that. You can do it by writing a message on Facebook or email us. Our support manager will carefully examine your order and will assist you with it right away. The reasons for late delivery may vary from time to time. It can happen that you have entered a wrong email address or your spam filter does not allow you to receive emails from us. It is also possible that the writer is waiting for your reply and can not continue working without your assistance, or we are checking the work for plagiarism. Whatever the case may be, contact us if you have any problems with getting your order on time.