Wednesday, 17 April 2013

Week 3

Q 1)
the story is talking about the Australia Post office's computer glitch has exposed the names and locations of thousands of Australians who have been sent parcels. Customers who typed a random number into the online parcel tracking system were provided with the details of thousands of customers.

Bita, N.(2012). Australia Post in online Privacy breach. News.com.au
.http://www.news.com.au/business/companies/australia-post-in-online-privacy-breach/story-fnda1bsz-1226498834454. (9th April 2013)

Q2


What AmI technologies are identified in the case?
in this case, AML are identified are: location implants, sensor networks in homes and cars, surveillance systems, mobile phone tracking, the algorithms involved in comparing data and predicting information about individuals

What drives DMC’s officers to take the actions they took?
The DMC officers hid the security breach with a desire to maintain public image. The news of a data leak by their own employees would weaken relationships with clients, negatively impact share prices and dampen business prospects. Due to these factors the company had chosen to cover up the breach.

DMC is the clear market leader in the aggregation of AmI data. Are there any comparisons you can make to technology companies today?
A comparison can be made with a company such as Google. The company has access to a user's search history if they use the Google search engine; GPS and location information through Google Maps; Worldwide satellite imaging and 'streetview' photographs through Google Earth; And social updates through Google+.

How realistic is the description of governments using the technology and prohibiting immigration from states with no AmI data aggregation information?
The likelihood of prohibiting immigration from states with no AmI data is low. It would be viewed as unethical by the general population to discriminate against a group of people simply because their history hasn't been recorded in a database somewhere.

List some of the ‘unintended consequences’ described in the case.
Such as: Unauthroised bank transactions, Having to be bailed out of bankruptcy, Public knowledge of shady deals selling information to governments, President of the company resigning over the issue and Being sued by consumer activist groups for negligence

No comments:

Post a Comment