Read PRISM and the Response of IT Giants and write a 2 page analysis, business and finance homework help

Anonymous
timer Asked: Jul 18th, 2017
account_balance_wallet $20

Question Description

Read PRISM and the Response of IT Giants on pages 379 - 381 of the textbook. After reading the case, write a 2-page analysis answering the following questions:

  1. What measures should IT companies take to protect their customer's privacy?
  2. Some people have claimed that consumers have more to worry about from hackers and identity thieves than from government snoops focused on terrorist suspects. Do you agree? Why or why not?
  3. Some hackers who are skilled in unauthorized computer access have found that it makes more sense to be paid for their computer skills than to continue to operate outside the law. Do you think that companies should hire these ethical hackers to protect their IT infrastructure? Why or why not?
  4. Companies are also amassing personal data from their customers for behavioral targeting. Discuss the pros and cons of behavioral targeting.

Make sure that your answer is well supported using material from the book or any additional sources. The font should be 12-point Times New Roman or 11-point Calibri. The margins should be 1 inch all around. The line spacing should be at 1 or 1.15, with no spacing between paragraphs.

These write-ups are not meant to be only summaries of the assigned readings. The matching percentage in SafeAssignshould be below 25 %. The write-ups should not contain any punctuation or grammatical errors. If material from any source (including the assigned case or book) is used, these references should be specified using the APA format. The write-ups will be evaluated using the specified grading form.

Tutor Answer

mwalimumusah
School: University of Virginia

Attached.

Running Head: PRISM CASE

1

PRISM Case and Response to Questions
Name
Institutional Affiliation

PRISM CASE

2

PRISM Case and Response to Questions
Question #1: Measures to Protect Customers’ Privacy
Companies operating in the IT industry are highly susceptible to consumer privacy issues
due to the nature of their services. Firms like Apple, Yahoo, and Google have in the past faced
such threats, to the extent of ending up with series of legal issues. The privacy of customers
should be protected through all possible means to mitigate the risks associated with the exposure
of private information to other parties like the government intelligence agencies and terrorist
groups.
One of the most fundamental ways of protecting customer privacy is conducting regular
internal audits. Internal audits enable the IT firms to establish the type of data they are collecting
from the clients, how they are using it, the people with whom they are sharing it, and the data
protection strategies in place. Another privacy protection technique is the establishment of a
solid privacy policy. The policy states the approaches that customers should use if they deem
their information unsafe, as well as the third parties that may access the information in case they
demand it. The policy must be in line with the region's laws and regulations. Minimization of
data collection and retention within the organization's premises can also mitigate the risk of
private information landing in the wrong hands. The implication here is that the IT companies
are expected to keep only that information that it cannot operate without. For example, the
PRISM project would have accessed limited information if firms like Facebook, Google, and
Microsoft had limited the types of customer information they kept. Data encryption can also help
reduce the chances of information leaking to other parties and thus help protect the cust...

flag Report DMCA
Review

Anonymous
Excellent job

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors