How might foreign powers andor terrorists use the stolen


What Would You Do?

Use the five-step decision-making process discussed in Chapter 1 to analyzemeutreh measures vilowing situations and recommend a course of action.

1. You are the webmaster for a site that caters to young children. What as to ensure that your website does not violate the Children's Online Privacy protection tker- take

2. Your friend is going through a tough time with his current significant other and believes sil is cheating on him. He is aware of your technical prowess and has asked you to help him ie purchase and install a stalking app on her cell phone. What would you say?

3. You are a recent college graduate with only a year of experience with your employer. you were recently promoted to manager of email  services.

You are quite surprised to receive -a phone call at home on a Saturday from the Chief Financial Officer of the firm asking that you immediately delete all email from all email servers, including the archive and backup servers, that is older than six months. She states that the reason for her request Is that there have been an increasing number of complaints about the slowness of email services.

In addition, she says she is concerned about the cost of storing so much email. This does not sound right to you because you recently have taken several measures that have speeded up email services. An alarm goes off when you recall muted conversations in the lunchroom last week about an officer of the company passing along insider trader information to an executive at a hedge fund. What do you say to the Chief Financial Officer?

4. Your auto insurance company has offered you a 15 percent discount (roughly $200 per year) if you agree to let them install a sophisticated vehicle event data recorder (EDR) in your car. You have read over the terms of the agreement and discover that If you are involved in an accident, you must agree to let the data from the device be collected and analyzed by a third party accident investigation firm.

You must also agree to let findings from this analysis be used in a court of law. What questions would you want answered and what advice might you seek before deciding whether to accept this discount offer?

5. You are the general manager of a luxury car dealership. You are considering purchasing data from a data broker that collects data of high potential value to your dealership. In addition to providing a list of names, mailing addresses, and email addresses, the data i Include an approximate estimate of individuals' annual income based on the zip code in which they live, census data, and highest level of education achieved. Using the data provided by the broker, you could establish an estimated annual income for each person on the list to identify likely purchasers of your dealership's autos and then send smalls to those potential customers. List the advantages and disadvantages of such a marketing strategy. Would you recommend this means of promotion in this instance? Why or why not?

Case 1. Serious Data Breach at OPM

Critical Thinking Questions

1. Do you feel there should be some sort of redress for the 21 million people whose per¬sonal information was stolen even if they cannot prove actual monetary damages?

2. How might foreign powers and/or terrorists use the stolen data to mount intelligence operations against the United States?

3. Go online to do research on the steps OPM has taken to improve its cybersecurity? Are you satisfied with these actions? If not, what additional changes would you suggest?

Case 2. Time to Update the Electronic Communications Privacy Act?

Critical Thinking Questions

1. Do you believe that it is time to consider changes to the ECPA to bring it more in line with the Bill of Rights, or do you believe that concerns about terrorism and crime Justify efforts to revise the Bill of Rights?

2. Congress proposed legislation in both 2013 and 2015 to revise the ECPA; however, the changes never made it through the legislative process. Do research and write a brief summary explaining why no action was taken.

3. Why do you think media organizations would support Microsoft in its suits against the United States over the provisions of the ECPA?

Request for Solution File

Ask an Expert for Answer!!
Management Information Sys: How might foreign powers andor terrorists use the stolen
Reference No:- TGS02644101

Expected delivery within 24 Hours