Free Samples
ITC568 : Cloud Privacy And Security
.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}
ITC568 : Cloud Privacy And Security
0 Download15 Pages / 3,714 Words
Course Code: ITC568
University: Charles Sturt University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Question:
Tasks:
Assume that an Australian State Government has reviewed the Singapore Government’s Smart Nation Plan and has decided to implement their own Smart State Plan. This will initially consist of a network of smart sensors and cameras at traffic lights, bus stops, rubbish bins, etc. in their CBD to monitor citizen’s behaviour and address street crime.
1. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government’s Smart Sensor Network by looking at:
a. The types or categories of people affected by this proposal,
b. What behavioural changes you might expect to see from normal citizens,
c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.
The next part of the Government’s plan is to deploy a Smart Wi-Fi Network which will consist of a series of sensor boxes to act as WiFi hotspots throughout the city. This would allow the introduction of a heterogeneous network where smart phones and other devices could seamless switch between mobile data and WiFi.
2. Discuss what you see as the personal and ethical implications for your privacy of the proposed Government’s Smart WiFi Network by looking at:
a. The types or categories of people affected by this proposal,
b. What behavioural changes you might expect to see from normal citizens using their mobile devices in the CBD,
c. Would you expect to see changes in individual behaviours, such as choice of activities, changes in time schedules, etc.
d. What are the implications for you If you had sensitive information on your mobile device that you did not want to share?
The Smart State Plan will also enrol all citizens with a Digital Identity to ensure that they can correctly be identified and access services provided by the state both electronically and physically.
3. If you were visiting the State Capital after the Smart State Plan has rolled out, do you think that the use of a digital identity would assist you to maintain your privacy while using your mobile phone or devices during your visit? Discuss the reasons for your answer.
4. What steps do you think that you could take to ensure the security and privacy of your digital identity while operating your mobile device(s) in this environment? Discuss each step that you would take along with its advantages and disadvantages.
Answer:
Task 1: personal and ethical implication of Government’s Smart Sensor Network
a) Types of people affected by this proposal:
Types of people
activities
People with reckless attitude at traffic
Often breaks traffic rules such as marinating permitted speed at traffic, follow traffic signal
People who does not care about environment
Often throw garbage at improper places
People who commit crime at congested area such as bus stops and other public place
Doing illegal activities such as stealing
Government agencies dedicated for collecting garbage form public places
Manage garbage collection from public places
Traffic police
Marinating law and order at traffic
b) Behavioural change from normal people:
Due to installation of smart networks and camera at traffic light people will be more conscious at maintaining proper law and order at the traffic because of constant monitoring, at least what people will be thinking. There will be an increase in the number of people using the rubbish bean properly installed at various public places. A notion of cleanliness will be established among the people if not naturally, but for the increased level of monitoring. People will think twice before committing anything that violates law and order as they will be caught easily from analysing the camera footage. However the feeling of being constantly monitored will make people worried about their privacy, of course at the standard what is permitted in public places.
c) Changes in individual behaviour:
More organised:
In order to avoid heavy traffic and eliminating the need for breaking traffic rules to reach destination in time, people will try to follow proper time schedule and hence they will be more organised in terms of planning their schedule for travel.
Maintenance of cleanliness:
People will be more accustomed to use the rubbish beans installed at various places for disposing garbage. Now it will not come naturally, some people will even dislike such thing, but at the end all be following the same thing which in turn will contribute to cleaner environment.
Less amount of crime:
As it will be known to the people that avoiding the consequences of committing a crime will not be easy at all due to the increasing level of monitoring. Hence people will not use these palaces as crime spot which are often most targeted due to less amount of security.
Task 2: personal and ethical implications on Government’s Smart Wi-Fi Network
a) Peoples who are affected by this proposal:
The proposal of the free Wi-Fi in the CBD will affect a range of people based on their activity. Bellow it is presented in a table format
Types of people
activities
Peoples who likes online entertainment
Downloading, viewing and sharing content across various genre
Peoples who like social engagement
More and more engagement with social media platform
Peoples who like to study
Accessing study material from online
Peoples who travels a lot
Checking travel related info for hassle free travel experience
Peoples who are not so good in managing household activities
Managing household activities like shopping , paying bills for various household needs
Peoples who have online business
Advertise online for attracting people to grow business.
b) Behavioural change:
Whenever people associate with new activities, it is most probable that their behaviour is likely to be effected. In the age of technology, the behaviour of people has changed dramatically than what it used to be before. In the age of internet, a lot of people are connected, yet there are so many people that still don’t have access to internet or better to say a lot of people has a limited internet connection. Hence, when these people will be introduced to an internet connection that is free, the impact will be on this people more. A public Wi-Fi is always an attraction to the people as it provide free connectivity to all the people. A free connectivity will result in increased online activities. A lot of people loves to embrace the digital world but does not afford it due to cost of having internet everywhere. A behavioural change is expected form this people as they will prefer online activities over obtaining it offline. Such activities include purchase of product, make payment. People will visit less to the offline store for shopping as it is much more convenient to order them online. People will then pay less attention for organising thing as they will tend to manage everything online. This fact that internet makes people less organised is not blame on the internet alone, it has something to do with the behavioural approach of the people who associate with it. People will try to be updated with the news around the world as it will be easier to access. Social engagement will increase through the virtual platform due to easier access to the online world. Overall there will be increased online activities among the people in collective. As it will be easier to connect with the virtual social life, people who finds it difficult to communicate in public, will be more inclined towards it and as they will be more comfortable in this form of communication they are likely to share with others more easily. This will bring behavioural change in this group of people for sure.
c) Changes in individual behaviour:
Entertainment on the go:
Now a days, thanks to the advancement, a new form of entertainment is now taking precedence. Everything people finds entertaining, is available online. Everything from movies, plays, song, and tech is available online. Now with the free Wi-Fi, the preference for the digital entertainment will increase. A lot of users will now download movies, song from the internet and will less likely prefer to buy or rent it offline. In addition to the free versions, contents that needs to be purchased or needs to be rented, is also available online. Although this will influence people of all age groups, but it is expected to see more participants from the younger groups.
Exploring the city like never before:
A free public will be of great benefits for the traveller. A lot of travellers like to explore the city on their own than to be guided by someone else as they are completely strangers. Now it is not difficult to find information about a place from finding best attractions to visit to book cabs and hotel at the best price. A free and public Wi-Fi will surely make the travel experience easier and they will be much more confident and independent while exploring the city comfortable on their own.
Education that is free:
People who love to study often find it difficult to go to public library to borrow book and return it in time to avoid extra charges. The presence of a free Wi-Fi will help to download books online and read it anywhere anytime. In addition to that there will be no requirement of returning the book. Hence people might access the library less and prefer reading online for convenience.
Social affair with more engagement:
An easier access to the internet will increase the number of people who wants to connect with friends all over the world in the shortest time possible. A more social engagement will make people less focused in the world that actually exists around them. People will be busier in chatting, updating status, sharing pictures with friends and followers which people might find hard to refrain from.
Work from anywhere:
Today jobs not only require to be present at the office and performs duty that individuals are assigned to. As the technology is shaping the world, it is also influencing the way communication takes place. Electronic communications like email are more preferred today for it much more effective. A seamless access to this is required to manage the job life more easily. Professionals and to some extents the students too will make use of the free internet to see emails, reply to them so that no important message is missed that matters most.
Embracing the digital economy:
The presence of digital economy is already becoming strong. People these days prefer to go cashless as the payment with digital wallets are much easier and hassle free. No requirement for carrying cash and cards, all it needs is a smart phone with an active internet connection. Hence with the free Wi-Fi it is expected that there will be increased number of users opting for digital payments for all payment related matters.
d) Protection of sensitive information in public Wi-Fi:
In order to protect sensitive information while using the mobile device in the public Wi-Fi, some steps are recommended bellow (Sathiaseelan et al., 2016):
The internet traffic must be secured with the help of VPN. An active VPN connection while surfing the internet will ensure that the all the internet traffic will be transferred through a secured and encrypted data tunnel,, thus increasing the security
If VPN is not configured, it should be made sure that each time the device is connected to the internet via the public Wi-Fi, the session is encrypted. For this, sites which have HTTPS in the URL instead of HTTP, should be used.
Transaction which uses FTP or the file transfer protocol should be avoided.
When connecting to a public Wi-Fi hotspot it should be checked whether there more than one hotspot with the same name. These hotspots should be avoided as they are often hard to recognize which one is more legitimate and hence should be avoided to be in the safer side for protecting sensitive information on the mobile device.
Task 3: Effectiveness of digital identity for ensuring online privacy:
A digital identity is the information that is stored online to identify the presence of the individual, organizations or the electronic devices that are operated online. The presence of unique identifiers or the user patterns generated through the interactions of the system with the network makes it possible. As the users share personal informations to avail some service online like shopping, social networking , this adds to the digital identities of the individual or the devices used. Digital data are often contextual as it contains sensitive information (Abelson et al., 2016). The data is collected by the service provider for authenticating the user online. In a world where digitalization is major trend, the protection of user’s data is major issue. Hence, maintain online privacy is an important issue. Hackers are in constant effort to steal these sensitive data available online for financial gain. Hence the online data are not safe as people thinks. Digital identity is an important step towards securing these data and maintain privacy. Digital identity is capable of addressing these issues which makes it an effective choice for the online data security:
Increased transactions volume:
Due to an increased demand in online purchase, there is an increase in the transaction volume. Now in order to maintain these transaction customised and safe for individuals, digital identity important. The presence of digital identity makes it possible to authenticate the transaction by individual users so that the transaction is only performed for whom it actually belongs to (Costa & Torres, 2015). Thus making the process much more customised and easier to organise.
Increase in complexity of transactions:
With addition to the volume, the financial activities has become much more complex with addition to new technology to make it much more convenient and attractive. Although this has improved consumer experience, it has made the process complex in nature. In order to address this complexity the users should be identified properly to enable the service correctly. This is where digital identity is an effective choice.
Effective regulations:
Digital identity enforces strong regulatory standards for data protections. The standards make it mandatory for the service provider to ensure that the data is protected with strong security measures and it must be made clear to the users that how the data is collected and share across networks. However, to ensure that the users have to provide necessary informations identified as digital identity as demanded by the service provider to avail a particular service (Diamandaki, 2014).
Digital identity consist of several layers (Kennedy, 2016), serving different purpose ensures data privacy in the following way:
Consistency and coordination:
This layer ensure that the online activities is governed in a such a way that there is no issue with the data consistency and the data is perfectly coordinated for better security. If the data is inconsistence or not coordinated properly, it is easier to hack or steal.
Attribute collection:
This layer ensure that all the user attributes are properly collected , stored and most importantly protected with strong security standards. Data attribute is an important step towards data security. It identifies data in terms of the sensitivity and importance and thus applying stronger security for the data that needs more protection.
Authentication:
This layer deals with the user authentication. Authentication is important measure of data security. A lot of inconsistence authentication is performed for acquiring digital data. However, this particular layer ensures that inconsistent authentication is avoided to ensure optimal data security.
Exchange of attributes:
This layer provide mechanism to exchange attributes between different parties. Although the data is exchanged across different platforms, the exchange of attributes ensures that the importance and privacy of the data is consistent throughout the process.
Drawback:
The above discussion might give the impression that the data is highly secure with digital identity. Although this is true that digital identity is an effective way to maintain data security, it has limitations too. Before identifying the limitations, it is important to have a look at the level of information that is collected with the digital identity (Buccafurri, 2015). Some services that are available online only requires some basic information like username, password and an email address register for a service. However, the information that the user wants to share with the service completely depends on the individual users. Sometimes people often creates password that are not so strong and it can be easily interpreted by the hackers (Mosco, 2016). If one becomes successful in stealing the password, it is easier to steal the identity of the owner and hence becomes easier to perform actions on behalf of the owner. Although some service provides two step verification before the information becomes accessible, but it is not impossible to hack that too. Some services makes it optional for the user that what kind of informations is shared online, other services makes it mandatory to share the details such as passport scans, physical addresses, Social Security numbers, and birthdate details to form digital identity. These information are highly sensitive in nature and reveals a lot of personal information about the user. Services that asks for such sensitive information are opening of savings account or availing passport and specially services offered by government (Khatchatourov, Laurent & Levallois-Barth, 2015). One problem with the digital identity is that the concept is still relatively new as compared to the physical identity (Laurent & Bouzefrane, 2015). Due to this techniques that are deployed for securing these data, still requires modifications and a lot of issues needs to be addressed. Although, companies claims that they ensures the privacy of the customer data, security flaws is there. Hence it is not possible to protect the digital data by just having digital identity. The presence of digital identity helps the users to have secure accounts but it exposes a lot of data online about than the individual think. Hence a lot of criminal activities are performed online to steal these data, which is relatively easier (Laurent et al., 2015). The problem with the digital identity is not exchange of data, it is how the data is actually exchanged online and the activities performed with it after it is shared by the users. Hence, it can be said that digital identity is an effective approach for creating online data privacy but requires some issues to be addressed for strengthening the security techniques (Kolko, 2015).
Task 4: Protection of digital identity:
The digital identity, as it contains a lot of information about the person online is always at target of the hackers. Once the identity is stolen, a lot of activities like financial transaction is easier to perform on behalf of the identity owner. Now although it is possible to protect the identity completely, some actions should be initiated from the user side so that it is not possible for the hackers to steal that identity easily (Elbirt, 2015). These steps are:
Strong password:
Whenever any account is created online, it should be made sure that password created for the account should be strong. A preferred way to create a strong password is to make the password at least 8 character long with a combination of alphabets and special cases. Another thing which should be remembered is that every account related to the financial activities should be secured with different password (Windley, 2015). Otherwise, a hack into one of the account will put all the accounts at risk.
Verification of authenticate site:
One thing that should always be remembered that not every site exist on the internet is authenticate one. Some sites are created for stealing user data and some site even do not have enough security for preventing data hack. Hence, it is important to identify which sites are authentic and have better security in place. Although nothing on the internet is secure as such, however visiting trusted sites will make it relatively more secure. There are some possible and verified ways which let the user know about the authenticity and security of the site.
The sites which are secured must have the symbol “s” in the URL of the website. The letter s confirms that the site is secured via strong encryption technology. Sites which does not have this feature should be avoided, especially for doing any financial related activities.
Selective about information shared online:
People, in order to make the social networking profile more attractive or without any special purpose often share personal information more than what is needed. It might have broader impact on the security than what people thinks or ignore in most of the cases. If the social profile is somehow hacked, a lot of information put there will be visible to the hackers and that might be used for exploiting other profiles that contains similar information (Ribble, Bailey & Ross, 2015). Hence it is advisable to be selective about what and how much information is shared online for create better protection for the digital identity.
Identify emails and messages:
Emails and messages that are lucrative in nature, especially those promises giveaway of prize money, should be avoided at any cost. These emails and messages, in most of the cases turns out to be an easier way for the hackers to steal personal information about the users. Another things to be noted that links provided in the emails and messages should not be clicked as this another way to extract personal information by hacking the devices from where those links are accessed (Liginlal, Sim & Khansa, 2014). The system once hacked, becomes vulnerable and becomes easier for others to obtain whatever data they want to extract. Hence these steps should be avoided for better security of the digital identity.
Two step verification:
The safest way as recommended by expert is to form some kind of smart card that will provide digital security in a personalised way. Another effective approach is to turn on the two step verification process for accessing all kind of digital data related to the digital identity of any individual. The combination of both will ensure optimal security as it will require others to prove the required authentication through this two-step verification process before the data become accessible to anyone else other than the owner (Palfrey & Gasser, 2015).
These are the several possible ways that are recommended for securing the digital identity online as there are constant effort to steal these data that are of major importance.
References:
Abelson, H., Lessig, L., Covell, P., Gordon, S., Hochberger, A., & Kovacs, J. (2016). Digital identity in cyberspace. White paper submitted for, 6.
Buccafurri, F., Fotia, L., Lax, G., & Mammoliti, R. (2015, September). Enhancing Public Digital Identity System (SPID) to Prevent Information Leakage. In International Conference on Electronic Government and the Information Systems Perspective (pp. 57-70). Springer, Cham.
Costa, C., & Torres, R. (2015). To be or not to be, the importance of Digital Identity in the networked society. Educação, Formação & Tecnologias-ISSN 1646-933X, 47-53.
Diamandaki, K. (2014). Virtual ethnicity and digital diasporas: Identity construction in cyberspace. Global Media Journal, 2(2), 26.
Elbirt, A. J. (2016). Who are you? How to protect against identity theft. IEEE Technology and Society Magazine, 24(2), 5-8.
Kennedy, H. (2016). Beyond anonymity, or future directions for internet identity research. New media & society, 8(6), 859-876.
Khatchatourov, A., Laurent, M., & Levallois-Barth, C. (2015, August). Privacy in Digital Identity Systems: Models, Assessment, and User Adoption. In International Conference on Electronic Government (pp. 273-290). Springer, Cham.
Kolko, B., Nakamura, L., & Rodman, G. (2015). Race in cyberspace. Routledge.
Laurent, M., & Bouzefrane, S. (2015). Digital identity management. Elsevier.
Laurent, M., Denouël, J., Levallois-Barth, C., & Waelbroeck, P. (2015). Digital identity. In Digital identity management (pp. 1-45).
Liginlal, D., Sim, I., & Khansa, L. (2009). How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. computers & security, 28(3-4), 215-228.
Mosco, V. (2016). The digital identity: Myth, power, and cyberspace. Mit Press.
Palfrey, J. G., & Gasser, U. (2015). Born digital: Understanding the first generation of digital natives. ReadHowYouWant. com.
Reeder, R., & Schechter, S. (2015). When the password doesn’t work: Secondary authentication for websites. IEEE Security and Privacy, 9.
Ribble, M. S., Bailey, G. D., & Ross, T. W. (2014). Digital citizenship: Addressing appropriate technology behavior. Learning & Leading with technology, 32(1), 6.
Sathiaseelan, A., Mortier, R., Goulden, M., Greiffenhagen, C., Radenkovic, M., Crowcroft, J., & McAuley, D. (2014, December). A feasibility study of an in-the-wild experimental public access wifi network. In Proceedings of the Fifth ACM Symposium on Computing for Development (pp. 33-42). ACM.
Windley, P. J. (2015). Digital Identity: Unmasking identity management architecture (IMA). ” O’Reilly Media, Inc.”.
Free Membership to World’s Largest Sample Bank
To View this & another 50000+ free samples. Please put
your valid email id.
Yes, alert me for offers and important updates
Submit
Download Sample Now
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
UploadUnique Document
DocumentUnder Evaluation
Get Moneyinto Your Wallet
Total 15 pages
PAY 9 USD TO DOWNLOAD
*The content must not be available online or in our existing Database to qualify as
unique.
Cite This Work
To export a reference to this article please select a referencing stye below:
APA
MLA
Harvard
OSCOLA
Vancouver
My Assignment Help. (2020). Cloud Privacy And Security. Retrieved from https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/changes-in-individual-behaviour.html.
“Cloud Privacy And Security.” My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/changes-in-individual-behaviour.html.
My Assignment Help (2020) Cloud Privacy And Security [Online]. Available from: https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/changes-in-individual-behaviour.html[Accessed 18 December 2021].
My Assignment Help. ‘Cloud Privacy And Security’ (My Assignment Help, 2020)
My Assignment Help. Cloud Privacy And Security [Internet]. My Assignment Help. 2020 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/changes-in-individual-behaviour.html.
×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}
×
Thank you for your interest
The respective sample has been mail to your register email id
×
CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.
Account created successfully!
We have sent login details on your registered email.
User:
Password:
Are you looking for the best essay writing service all over the internet? Conclude your search right here for MyAssignmenthelp.com is here to provide with the much-needed help. We understand students can’t always afford to pay a fortune for an essay with their limited and no earning. Therefore, at MyAssignmenthelp.com, we have designed a wide range of value-for-money services. To ensure that you don’t need to think twice before hiring our services, we also offer massive discounts, lucrative packages, redeemable loyalty points and bonus all year around. You can also opt for our free essay eamples to gain relevant insights into the quality we offer. Hence, next time you wonder “Can I pay someone to write my paper?”- be sure to place an order with MyAssignmenthelp.com!
Latest Management Samples
div#loaddata .card img {max-width: 100%;
}
MPM755 Building Success In Commerce
Download :
0 | Pages :
9
Course Code: MPM755
University: Deakin University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More
SNM660 Evidence Based Practice
Download :
0 | Pages :
8
Course Code: SNM660
University: The University Of Sheffield
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration
BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20
Course Code: BSBHRM513
University: Tafe NSW
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More
MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5
Course Code: MKT2031
University: University Of Northampton
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration
MN506 System Management
Download :
0 | Pages :
7
Course Code: MN506
University: Melbourne Institute Of Technology
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology
Next