UNT - BCIS 3610 \"OA Security Guide - Selling Privacy\" PDF

Title UNT - BCIS 3610 \"OA Security Guide - Selling Privacy\"
Course Basic Information Systems
Institution University of North Texas
Pages 2
File Size 88.4 KB
File Type PDF
Total Downloads 94
Total Views 142

Summary

This is an essay that deals with some questions regarding AT&T. I took this class in the spring of 2018...


Description

BCIS 3610.001 Melody White

OA Security Guide - Selling Privacy 1. How do you feel about AT&T’s strategy of offering customers cheaper Internet service in exchange for the sale of personal data to marketing companies? -

If you were an AT&T customer, would you choose this cheaper service in exchange for your privacy?

-

Why? I think that AT&T using this method as a marketing approach is definitely interesting to

say the least. I do think that this could be successful because not everyone is ashamed or scared to hide their personal information/lives. Personally if I was an AT&T customer I would not choose this cheaper service because I actually do care about my private life and personal business. I don’t like people that I don’t know to have my personal cell phone number, much less anything more direct about me. 2. Think about your email and social media activity for a 24-hour period, Identify all of the different types of data you send using these platforms. -

Try to identify all of the marketing opportunities that a company could exploit if it could access your data. Using my past social media and email activity I would suggest that a company could

easily find and get ahold of things like my business information, cell phone, business contacts, actual business practices, previously searched words and queries. It’s very scary to think that a company could easily get ahold of your most recent google search and use that to their advantage.

BCIS 3610.001 Melody White 3. Tor networks are increasingly mentioned in the news as more and more Internet users attempt to maintain their privacy. Spend some time browsing the Tor Web site at www.torproject.org to learn more about the functionality of this service. -

Would you ever consider using Tor?

-

Why or why not? I would definitely consider using TOR as a service, I currently use a similar

website called CYBERGHOST which uses similar methods to mask and prevent unauthorized use of credit card and other personal information. This even bounces my IP address around to ensure that no entity could accurately trace the original from. I actually use this to stream movies, and invest in cryptocurrencies based outside of the U.S.

4. The quote in this guide from the 60 minute story states that there are thousands of companies working to access and use private data for commercial purposes. Imagine that 5 or 10 years from now you are a manager at a company working to take advantage of this flood of user data. -

Would you feel comfortable accessing other people’s personal data for commercial purposes knowing that they were probably unaware they were being tracked?

-

How would you feel if it was your own personal data? If my job was to use this newfound data to my companies advantage I would absolutely

use this to the fullest extent. If in 5-10 years technology has advanced to this stage where details like this matter to everyday marketers and big business, then I’d be absolutely game for it. If you don’t use it someone else will and that’s just part of business. As far as a moral standpoint I think that it would still be unethical to not let users know that this information is being used....


Similar Free PDFs