Thursday, 4 April 2013

SECURITY AND PRIVACY

1. See if you can find an example of a privacy breach that was reported in the Australian or international news in the last 6 months. What were the consequences? i.e. legal, political, financial, personal etc. What action was taken in response to the privacy breach?

I found one news about Australia post online privacy breach in news.com.au published in October 31, 2012. The names, addresses, businesses, email addresses, land line and mobile number of Australia post recipients are being exposed by simply manipulating the website URL. This is the third security flaw to be discovered on Australia post's website in less than a month. The issue relates to non-financial details of some customers becoming inadvertently visible. This issue comes less than two weeks after Australia post was forced to shut down it's electronic parcel tracking service because of the online privacy breach. Australia post reassure customers that their financial details have not been compromised. The action taken by Australia post was suspend it's website until they fix the issue and apologize for the inconvenience caused (Connelly, 2012).  

Connelly, C. (2012). Australia Post hit by security breach again. Retrieved April 4,2013, from
http://www.news.com.au/technology/australia-post-hit-by-security-breach- again/story-e6frfro0-1226507720654#ixzz2PMbI0k27

2. Most Ambient Intelligence (AmI) scenarios illustrate its benefits. The dark scenarios, developed by the SWAMI (Safeguards in a World of Ambient Intelligence) project, are different as they point out the risks that must be mediated if AMI is to be a future success story. The scenario we present here hinges on the theft of data from a multinational company. The company suffers from the illusion of security—that is, the belief it has implemented more than adequate security measures— only to discover it has not.

Consider the following case (below) then -
complete a comprehensive analysis of the facts and issues in the case. Some questions to consider - 

A. What AmI technologies are identified in the case?
AMI technologies are identified in the case are:
  • Location implants
  • Surveillance system
  • Sensors networks in homes and cars
  • Mobile phone tracking


B. What drives DMC’s officers to take the actions they took?

DMC's officers had to hide security breach to keep their good image. DMC's own employees are responsible for the security breach, if this information goes outside of the company; this will ruin the reputation of DMC. This issue would impact negatively in the relationship with clients and share price of the company. Company have to suffer extreme financial loss. That is why DMC's officer made decision to cover up the security breach of the company.

C. DMC is the clear market leader in the aggregation of AmI data. Are there any comparisons you can make to technology companies today?

I tried to find out companies like DMC but couldn't able to find out in web. But I personally believe that there are lots of companies in world who collects information of people without their consent. 

D. How realistic is the description of governments using the technology and prohibiting immigration from states with no AmI data aggregation information?

Governments using the technology and prohibiting immigration from states with no AMI data aggregation information is totally unrealistic. It is an individual choice to give certain information or not. I personally find it unethical. 

E. What would be the impact of this digital divide?

The digital divide will ruin the reputation of DMC. Clients wouldn't believe this company and there will be a major impact in share price of the company. 

F. List some of the ‘unintended consequences’ described in the case.

  • DMC was sent to court over the offences.
  • Identity theft.
  • Public find out what they are really doing. 
  • Spam email sent to people.
G. Do members of the class all agree on the issues raised by this case? What were the main points of difference (if any) in discussions?
All the members of class seems to understand about security and privacy. All  members agree about sensitiveness of privacy. How big companies are affected by privacy breach and consequences of security and privacy breach.





No comments:

Post a Comment