Business Finance
Read PRISM and the Response of IT Giants and write a 2 page analysis, business and finance homework help

Question Description

Read PRISM and the Response of IT Giants on pages 379 - 381 of the textbook. After reading the case, write a 2-page analysis answering the following questions:

  1. What measures should IT companies take to protect their customer's privacy?
  2. Some people have claimed that consumers have more to worry about from hackers and identity thieves than from government snoops focused on terrorist suspects. Do you agree? Why or why not?
  3. Some hackers who are skilled in unauthorized computer access have found that it makes more sense to be paid for their computer skills than to continue to operate outside the law. Do you think that companies should hire these ethical hackers to protect their IT infrastructure? Why or why not?
  4. Companies are also amassing personal data from their customers for behavioral targeting. Discuss the pros and cons of behavioral targeting.

Make sure that your answer is well supported using material from the book or any additional sources. The font should be 12-point Times New Roman or 11-point Calibri. The margins should be 1 inch all around. The line spacing should be at 1 or 1.15, with no spacing between paragraphs.

These write-ups are not meant to be only summaries of the assigned readings. The matching percentage in SafeAssignshould be below 25 %. The write-ups should not contain any punctuation or grammatical errors. If material from any source (including the assigned case or book) is used, these references should be specified using the APA format. The write-ups will be evaluated using the specified grading form.

Final Answer


Running Head: PRISM CASE


PRISM Case and Response to Questions
Institutional Affiliation



PRISM Case and Response to Questions
Question #1: Measures to Protect Customers’ Privacy
Companies operating in the IT industry are highly susceptible to consumer privacy issues
due to the nature of their services. Firms like Apple, Yahoo, and Google have in the past faced
such threats, to the extent of ending up with series of legal issues. The privacy of customers
should be protected through all possible means to mitigate the risks associated with the exposure
of private information to other parties like the government intelligence agencies and terrorist
One of the most fundamental ways of protecting customer privacy is conducting regular
internal audits. Internal audits enable the IT firms to establish the type of data they are collecting
from the clients, how they are using it, the people with whom they are sharing it, and the data
protection strategies in place. Another privacy protection technique is the establishment of a
solid privacy policy. The policy states the approaches that customers should use if they deem
their information unsafe, as well as the third parties that may access the information in case they
demand it. The policy must be in line with the region's laws and regulations. Minimization of
data collection and retention within the organization's premises can also mitigate the risk of
private information landing in the wrong hands. The implication here is that the IT companies
are expected to keep only that information that it cannot operate without. For example, the
PRISM project would have accessed limited information if firms like Facebook, Google, and
Microsoft had limited the types of customer information they kept. Data encryption can also help
reduce the chances of information leaking to other parties and thus help protect the cust...

mwalimumusah (19688)
University of Virginia

Thanks for the help.

Outstanding. Studypool always delivers quality work.

Tutor was very helpful and took the time to explain concepts to me. Very responsive, managed to get replies within the hour.

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors