PLO 3

"Demonstrate strong understanding of security and ethics issues related to informatics, user interface, and inter-professional application of informatics in specific fields by designing and implementing appropriate information assurance and ethics and privacy solutions."

Definition:

Meshing technology with business and personal life can certainly provide convenience. For businesses, collecting user data can provide valuable insights that can be used to increase business intelligence and profits. Personal technology can be used as a digital assistant, serving the user with information that they seek. Modern technology has proven to be an incredible data aggregator in both of these realms, and such terribly efficient data collection practices were previously unseen at such ubiquitous levels. Cloud computing, big data, and Internet of Things (IoT) devices are among such powerful tools.

While the convenience derived from the use of modern technology is welcome, upholding data security and data ethics remains imperative. Individual privacy is to be protected and abuse stemming from data handling must be deterred. Additionally, potential issues and security threats that arise from using technology should be kept in mind. Securing data is integral to ensuring that personal and business assets are protected from malicious actors. The assignments I have selected are a practical reflection of my understanding of the issues and possible solutions pertaining to information assurance, data ethics, and data privacy.

Description:

#1: Digital Privacy in a World of Big Data

I chose this assignment because I have been interested in data privacy and the ethical role of big data and IoT devices in modern day society since the start of the Informatics program. I have been aware that every few years personal privacy is being chipped away due to new technology. I find that the public, at least in the United States, is more accepting of this loss of privacy when the means to collect data is packaged in an entertaining way or in a way that is designed for convenience. To this effect, I reviewed digital privacy legislation and data collection practices in the United States. I also provided examples of device surveillance and privacy violations, some examples of which relate to geolocation tracking, monitoring devices, and hacked technology. In response, I demonstrated methods of remedying the deterioration of privacy, namely through advocacy of user control over their own data. Ethical and security implications related to big data and IoT devices are discussed and a focus on the importance of limiting their reach to personal information is endorsed.

Digital Privacy in a World of Big Data.pdf

#2: Personal Asset Risk Assessment

In this assignment, I took inventory of personal assets and reviewed security concerns for each type of asset. Personal items were categorized using labels such as physical assets, data and information assets, and information technology assets. I specifically reviewed attack vectors and vulnerabilities of three assets per category and discussed actions that could be taken to avoid successful sabotage of my assets. I have never had the opportunity to go through an exhaustive list of my assets, so this was a great opportunity for me to personalize security and privacy risk. Along the same vein, this assignment showed me how to devise data and information assurance and prevent loss of personal data.

Risk Assessment.pdf

Discussion:

These assignments have highlighted the importance of having data privacy and security concerns in mind when utilizing modern technology. I have become familiar with legislation that has the intent of protecting consumer data, as well as limiting data collection to reduce unnecessary intrusion of user data. It is critical that the consequences of using modern technology be expressed in a manner that makes sense to the public. It is evident that legislation pertaining to consumer data differs from region to region and, thus, shows that such fragmentation obfuscates and complicates approaches to protecting consumer data. Analyzing security and threat vectors of my own personal assets has given me the knowledge of how end users may have their own assets exposed to risk. Thus, building an inventory of assets and identifying solutions to possible threats will help ensure that user information is protected, accessible, and available.