1
.
Reflect on the importance of data privacy and protection in today’s increasingly digital world. How do you see these concerns influencing your personal habits online and your future professional life, particularly if you are considering a career in information systems? How do you believe businesses and regulations need to evolve to maintain data privacy and protection in the face of rapidly changing technology?
2
.
Watch Glenn Greenwald’s “Why Privacy Matters” TEDx talk and answer the following question: How does Greenwald’s perspective on the importance of privacy align or contrast with the ideas presented in the text about the role of data privacy and security in the digital age? Provide specific examples from both the video and the text in your response.
3
.
Reflect on the ethical responsibilities of IT professionals in shaping the use and development of web and IoT technologies. Do you think IT professionals should have a moral duty to be socially responsible, particularly in ensuring user privacy and security? How do their roles and actions influence the broader regulatory and ethical landscape?
4
.
Considering the increasing interconnectedness of our world through IoT, what are some sectors or industries that you believe will face the most significant regulatory challenges in the future?
5
.
Watch this video about hackers remotely hijacking a vehicle and answer the following questions: Given the increasing connectivity in modern vehicles, what implications does the hacking of a vehicle with the driver inside have for consumer trust and automotive cybersecurity? While this incident occurred with a specific make and model, any vehicle could have been affected. How do you think regulations and guidelines can address such vulnerabilities?
6
.
Consider the various strategies and best practices for protecting an organization from a ransomware attack. As a leader in the IT industry, how would you proactively prepare and safeguard your organization’s digital assets and data against such an attack?
7
.
Reflect on how an information security management system (ISMS) could benefit an international organization or national organization that you are familiar with. What specific challenges and opportunities can you identify for implementing an ISMS in this organization?
8
.
Watch this video by Rachel Cummings on the Data Privacy Index and consider the following: How can an index such as a FICO score used by credit card companies and banks be used across various social media platforms and rideshare platforms such as Lyft, Uber, TaskRabbit, or AirBnB? What are the limitations?
9
.
Reflect on a recent news event involving a data breach or data privacy scandal. How do you think a gap analysis could have prevented or mitigated the issues at hand?
10
.
Think about your own experiences with online services and their privacy policies. Are there any instances where you felt that a service could improve its data security or privacy policies? What specific gaps did you identify and how would you address them?