Review the “Chapter Five Case: Targeting Target” at the end of Ch. 5 of Business Driven Technology.
Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and read people’s emails? Pick a side of the debate and justify your position. Also include in your discussion what you would consider to be the best ways to protect yourself from identify theft.
Respond to at least three of your peers. In your response, address any thoughts you have on security threats and how they are harmful to SCM, CRM, and ERP systems.
Students need to contribute three substantive posts in this discussion by the due date indicated. The substantive posts can be any combination of responses and replies.
Reading personal emails is not ethical. Nobody should have rights to read someone else emails. But Companies or Providers can definitely have freedom to apply filters to classify emails as spam if it qualify for spam category and those can moved to different folders and let users know about it, so that users can be careful before clicking any link in that email. 6 Months back in my current company someone sent one email to all the employees for the company to verify authority of email / survey and it is a hacker who sent all those emails…and company security immediately found the issue and sent email to all employees saying ignore that email and do not click any links inside it.
Never store password and usernames on notepad or word pad and store it online. Do not write password on paper.
Do not use the same password for all. Your password should not be easily guessed by others based on your links. it should be mix of Upper case,Lower case, Numbers and Special Chars.
Do not store credit card information in any web portals.
Do not share DOB in social sites like facebook etc…
When you in call with any tech support for some issue, do not provide SSN n DOB to them. If it is necessary to provide then tell them to turn off the call recording and then provide. because these calls will be used for training purpose.
If the web site is not secure do not use it to provide your details until web site owners rectifies the security issues.
Good afternoon everyone!
Do you think it is ethical for authorities to tap an online service provider and read people’s emails? No I think it is unethical it is like invasion of privacy and privacy is a right. An organization should respect privacy and there should be a law for invasion. If I wanted everyone to read my emails I would publicly post them on social media. That is why they have SMTP, SMIME PGP some companies use it to encrypt emails because it can be confidential messages. The even have end to end encryption. They need to start doing this to all emails.
Also include in your discussion what you would consider to be the best ways to protect yourself from identify theft. There are many ways to try to protect yourself but every year hackers get more satisfied.
One you can go to all three creditors and put flags they can no one can request your information without your permission.
You can stop putting your bank and credit card apps on your cell phone because those apps can be easily hacked with a quick brush, there is software and scanners that can pick up your information.
Destroy private statements and financial stuff buy a shredder 25.00 -60.00 investment is better than loosing your identity.
Take you name off marketers list
Freeze or lock your credit
Strength passwords use long passwords
One think I do when I want to shop on line I go buy gift cards not to use my credit or bank information on line I even pay my bills with gift cards because they have the visa/master card logo
When going to ATMs or gas pumps pull the reader if it comes off or there is a camera do not use it.
Since this is the final week of the class and I think it would be a good idea to share the topics of what we’re interested in. I would like to encourage everyone to pick one or two free styles topic of your choice and post here. This will help you fulfill the attendance requirement during the final week too!
My interested topic includes security, latest information technologies, business practices. I’ve read many posts that mentioned about security concerns and risks in organizations since it’s a big issue in almost every business. Talking about security risks, I’m interested in the use of biometrics. I’ve seen it used in conjunction with other security system. As you may see, some laptops have a fingerprint reader to allow the authenticated persons to access the data. Smart phones are now equipped with a camera so it’s possible to use the camera to capture physical characteristic of an individual or act as a biometric reader (Apple Face ID for example). Class, please share what you think biometrics can be used for your organization.