Sunday 9 February 2014

Weekly Exercise 12 (Security and Privacy)



Question 1

Find an example of a privacy breach that was reported in the Australian or international news in the last 6 months. What were the consequences? i.e. legal, political, financial, personal etc. What action was taken in response to the privacy breach?


Risk Solutions International LLC, Loudoun County Public Schools
Ashburn, Virginia

January 7, 2014-Loudoun County school officials have responded to a data breach that made publicly available personal information about students and staff members, along with detailed emergency response plans for each school.

More than 1,300 links could be accessed through a Google search, thought to be password protected, unveiled thousands of detailed documents as to how each school in the district will respond to a long list of emergencies, which included the staging areas for response teams as well as where the students and staff would be located during an emergency.

Additional documents that could be accessed included students' courrse schedules, locker combinations, home addresses, phone numbers and birthdates along with the address and cell phone numbers for many school administrators.

The contractor Risk Solution International acknowledged that the breach was caused by "human error" on their part, which is said to be the cause of the data breach.

UPDATE: Loudoun County Public Schools administrators released a more detailed statement about the information made publicly available on the Internet due to errors committed by the contractor Risk Solutions International (RSI).

According to school officials, the investigation is continuing as to how the webpage, which was made accessible through online search engines without any password protection happened. The page included 1,286 links detailing information on 84 Loudoun schools. It is unknown how long the information was exposed or how many links were opened by unauthorized individuals.

Locker combinations were revealed for one school and only one parent contact information was revealed for fewer than 10 schools according to the spokesperson for the district. The statement also made clear that RSI's website was not hacked and that it never lost its password security. Instead, the breach occurred when RSI employees were doing technical testing on November 4th , December 19th and December 24th 2013. (1/9/2014)

Complete a comprehensive analysis of the facts and issues in the case. Some questions to consider -

What AmI technologies are identified in the case?
-Based on my knowledge, in this case AMI technology is the information of thousands of individuals were then sold back to them.

What drives DMC’s officers to take the actions they took?
-In my opinion, the officer will conceal violations of security known to keep company.

DMC is the clear market leader in the aggregation of AmI data. Are there any comparisons you can make to technology companies today?
-In my opinion, the company can be attributed to Google. Almost everyone these days use Google search to find what they want to search because Google has a lot of programs that can be used.

How realistic is the description of governments using the technology and prohibiting immigration from states with no AmI data aggregation information?
-In my view, it does not realistically use the technology and to prohibit immigration from countries without data aggregation Ami information. Because it can come from anywhere not only come from immigration.

What would be the impact of this digital divide?
-I think there may be a difference in the gap of trust between a company with customers and the general public.

List some of the ‘unintended consequences’ described in the case.

Do members of the class all agree on the issues raised by this case? What were the main points of difference (if any) in discussions?
-In my opinion, the unintended consequences they are regarded negatively on the case of a security breach. They will try to hide the case from the public.

References:

http://www.privacyrights.org/data-breach

Saturday 8 February 2014

Weekly Exercise Topic 11 (Web 2.0)



Question 1

Exercise – select five applications that you have not heard of before from Popular URL’s Web 2.0 awards or the webware awards and describe on your blog page how they could be useful to a business.

1.https://www.mint.com/

Mint pulls all your financial accounts into one place. Set a budget, track your goals and do more
with your money, At Mint, we believe money is for living. So we make everything
simple and streamlined. Sign up takes less than five minutes. Mint has more than 10 million users who know their information is
always secure. That's because we use 128-bit SSL encryption – the same
security that banks use – and all data is protected and validated by
VeriSign and TRUST. Plus, since Mint is read-only, no money can be
moved in or out of any account. See all your balances and transactions together, on the web or your phone.

Mint automatically pulls all your financial information into one place, so you can

finally get the entire picture.

2. http://www.tagged.com/

Tagged makes social discovery products that enable anyone to meet and socialize with new people. Our mission is to help everyone feel love and belonging, and we're building toward a vision where anyone can use a device to instantly connect with interesting new people anytime, anywhere.

Founded in 2004 and profitable since 2008, Tagged is a market leader in social discovery with over 300 million registered members in 220 countries who make over 100 million new social connections every month. Tagged is based in San Francisco.

3.http://www.theverge.com/

The Verge was founded in 2011 in partnership with Vox Media, and covers the intersection of technology, science, art, and culture. Its mission is to offer in-depth reporting and long-form feature stories, breaking news coverage, product information, and community content in a unified and cohesive manner. The site is powered by Vox Media's Chorus platform, a modern media stack built for web-native news in the 21st century.

4. http://www.prosper.com/

Prosper is America's first peer-to-peer lending marketplace, with more than 2 million members and over $692,000,000 in funded loans.

Prosper allows people to invest in each other in a way that is financially and socially rewarding. On Prosper, borrowers list loan requests between $2,000 and $35,000 and individual lenders invest as little as $25 in each loan listing they select. In addition to credit scores, ratings, and histories, investors can consider borrowers’ personal loan descriptions, endorsements from friends, and community affiliations. Prosper handles the servicing of the loan on behalf of the matched borrowers and investors.


5.http://www.zoho.com/

Zoho.com offers a comprehensive suite of award-winning online business, productivity & collaboration applications. Customers use Zoho Applications to run their business processes, manage their information and be more productive while at the office or on the go, without having to worry about expensive or outdated hardware or software.

To date, Zoho.com has launched 25+ online applications — from CRM to Mail, Office Suite, Project Management, Invoicing, Web conferencing and more. Zoho has received numerous awards, including an InfoWorld 2009 "Product of the Year" award, a 2008 PC World "25 Most Innovative Products Award" and a 2007 TechCrunch "Best Enterprise Start-up."

Zoho.com is a division of Zoho Corporation, a privately-held and profitable company. With offices in CA, Austin, Chennai, Yokohama and Beijing, Zoho Corporation serves the technology needs of more than 9 million customers worldwide.



References:

httphttps://www.mint.com/what-is-mint/

https://www.mint.com/how-it-works/

http://about.tagged.com/about/

http://www.theverge.com/about-the-verge

http://www.prosper.com/about/

http://www.zoho.com/company.html

Monday 3 February 2014

Weekly Exercise Topic 10 (Trust)



Questions


1) What does this meant by the following statements?


Trust is not associative (non-symmetric)
-Trust is not associative (non-symmetric) is a trust that is not balanced. It's a different trust path between two parties, such as the seller and the buyer.


Trust is not transitive.
-In my opinion, trust is not transitive trusts that are not related to each other. For example, trust a dealer not associated with any other dealer.


Trust is always between exactly 2 parties.
-I think this is a trust that has always prevailed between the two parties such as the trust between sellers and buyers.


Trust will involve either direct trust or recommender trust.
-In my opinion, direct trust is a trust that is derived from the feeling or belief in self. The recommender is trust derived from the opinions of others.


2a) Have a look at the following websites. What are some of the elements that have been incorporated to increase your trust in the sites? If there are also some aspects which decrease your level of trust describe them as well.


http://www.eBay.com.au .
-It gives the buyer protection, security for buyers to buy in privacy.


http://www.anz.com.au
-This website provides security through log on. It can protect your personal information.


http://www.thinkgeek.com
-This website is also concerned with the protection of personal information and customer service.


http://www.paypal.com.au
-These websites keep financial information private and protect against fraudulent transaction.


2b) Find a web site yourself that you think looks untrustworthy.

-www.Newegg.com






References:

 http://www.anz.com.au/auxiliary/help/help/website-security-privacy/

http://www.thinkgeek.com/help/privacy.shtml

https://www.paypal.com/au/webapps/mpp/paypal-safety-and-security

http://forums.afterdawn.com/thread_view.cfm/548846

Weekly Exercise Topic 9 (Channel Conflict)




As millions of consumers flock online to purchase just about anything and everything — new and used, large and small, cheap and expensive, from near and afar — how will the interaction between buyers and sellers change?

Buyers with access to the Internet have certain opportunities that may affect what they purchase, when, and where they take their business. Using sites like Google or Yahoo!, a buyer has the ability to search for a product or service; to compare sellers on important attributes such as price, quality, delivery and service; to read product reviews and consider the opinions of other buyers; and to do all of this quickly, cheaply, and with relatively little effort. This can be done regardless of whether or not the buyer chooses to complete the purchase online. Never before have buyers been able to know so much, so easily, about what they purchase and from whom. Sellers can reach large numbers of consumers anytime day or night and can extend their business beyond the limits of geographic proximity more easily. Unconstrained by shelf space, sellers can list a large catalog of items and can quickly adjust prices to reflect changes in demand. A seller, like Dell Computer, can eliminate intermediaries and engage buyers directly online to understand their consumption habits and track their preferences, and then use this information to configure customized products and provide personalized levels of service. Just like the buyer who can easily search for the seller offering a product at the lowest price, sellers can search for the one buyer who is willing to pay the most. This is exactly what happens at the close of every auction on eBay (the highest bidder wins). Furthermore, the immediacy of the data that flow from digital marketplaces allows sellers to integrate the supply chain and better manage production, inventory and distribution. Not only do sellers know more about buyers, they also know more about their business partners and about their competitors

One of the key questions to be considered is ‘who owns the customer relationship?’ i.e. the retail outlet or the brand. Even ownership of communication with the customer is an issue. If you purchase something from a retail outlet is it then ok for you to get email promotions or is it SPAM?

Conflict then can be direct, internal or external (an example of external would be a Chinese flat screen TV maker (for well known brands) launching an online brand of their own. While this can certainly lead to conflict (undercutting prices) external conflict is less threatening as it is not a full on assault on the same brand name. Email campaign has always been an excellent service and reliability while spam is a dubious message like a get rich quick scheme.

Ultimately, when the Internet comes into the mix, it causes conflict between the different channels. Should you buy key words to protect your brand? Try some searches of well known words. Some examples include – Qantas, Telstra, BHP, Nike, Coke – a couple of these brands are obviously paying Google a fortune to just have their result showing, others e.g. Nike and Coke return all sorts of searches.

Keyword is very important to be purchased to protect the brand. Even if you have to pay google to show you the results as a search or other more well known brands.

References:

http://digitalenterprise.org/markets/markets.html