Technology’s Threat to Democracy

Katia Vales discusses how advances in technology have not only brought countless benefits to humanity but have also infringed on people’s privacy. The author suggests that continuing to use technology to protect the very liberties that the same technology jeopardizes stands as a significant contradiction to the institutions of this country. While it may feel “justified” to use these invasive technologies because of criminal actions, it is vital to consider the bigger picture and think about what it means for citizens to exist in a state of continuous monitoring.

Read More

Biometric Security

Halle Steffensmeier discusses how biometrics have become increasingly prevalent, citing examples such as retina scans in the Metaverse, fingerprints to access mobile devices, and law enforcement leveraging facial recognition solutions. Biometrics and cyber security are increasingly critical topics of discussion, particularly concerning individual privacy. By providing a complete picture of biometrics and a report on recent events in biometric security, the author hopes to illustrate the troubling reality of biometric data collection: our intimate data in the hands of the world's largest technology companies.

Read More

Bitcoin—An ESG Nightmare?

Drew Grimstead discusses the incredibly complex aspects of evaluating the cryptocurrency Bitcoin through an environmental, social, and governance (ESG) framework. Issues like climate change and equity are as pressing as ever, and without careful consideration for the future, these issues could mature into disastrous outcomes. Bitcoin is incredibly nuanced from an ESG perspective and can be transformative for better or worse, depending on how regulators and participants interact with the network.

Read More

"Zooming" Into Risky Business

Jacob Kim discusses the risks of Zoom Video Communications, Inc. (“Zoom”), in relation to a series of incidents reported by its consumers from 2016 through 2020. Specifically, this paper focuses on the company’s cybersecurity, inappropriate business practices, legal and liability risks, and regulatory non-compliance risks that emerged from Zoom’s procedures, systems, and external sources during this time.

Read More

Implications of Ransomware in Education

Drew Grimstead discusses the changing risk landscape of ransomware attacks on academic institutions. As learning becomes more digitized, the scope of assets and technologies that need protection increases. Federal and localized governance combined with values such as “Academic Freedom” make education a particularly challenging sector to secure. This paper deconstructs various risks associated with ransomware attacks and proposes possible mitigations both from an organizational and legislative lens.

Read More

Password Security: Protecting the Front Door

Matthew Karyadi discusses how account passwords represent the “front door” in terms of the security of accounts and systems for organizations and individuals alike. When a password is compromised, this control failure poses a significant risk for both organizations and individuals. This paper explores the weaknesses and vulnerabilities in password controls, examines existing standards and frameworks, and recommends potential updates to these standards and measures to shore up password security for companies and individuals alike.

Read More

Main Engine Cutoff at SpaceX

Drew Grimstead discusses how corporations in emerging technologies such as reusable spacecrafts and commercial spaceflight must often leverage significant risk to have a chance at success. SpaceX has unique risk relating to its role in the sector, which inherently has significant regulatory uncertainty, including areas such as monopolization and climate change. While innovation requires taking risks, additional mitigation strategies would help SpaceX better manage their risk profile.

Read More

The Ethical Line Between Email Marketing and Consumers

Jiun Ting Wang discusses the ethical line of email marketing for businesses in relation to consent, content, and data privacy. Through the lens of a marketing professional, the paper also highlights some existing laws in the United States that protect consumers and new technology features that enhance email privacy.

Read More

Disinformation Led to Corporate Personhood

Gavin Murphy discusses the origins of corporate “personhood”—the idea that corporations have some of the same rights as individual people. Specifically, the paper examines the sequencing of events that have led to the current way that corporations have entangled themselves into the American political system, and the potential risks that accompany this current approach.

Read More

Compliance and Breaches: A VMware Inc. Analysis

Elbert Cheng discusses the evolution of virtual machine (VM) technologies, and the story of VMware Inc. Due to VMware Inc.’s international nature, the organization must comply with the laws and policies across the globe. Relatively recent compliance requirements, such as the European Union’s General Data Protection Regulation (GDPR), have changed the operating and compliance landscape. Due to the high-profile clients who uses VMware’s technology, breaches and vulnerabilities pose a major risk in the technological space, consequently, the company has continued to evolve the way it responds to these changing risk conditions.

Read More

Buying into the Next “Bitcoin”: A Look into Ethereum

Thanh Nguyen discusses the cryptocurrency craze at the start of 2022 and how, despite the risks, people continue to invest. Ethereum, the second-most popular crypto stock, is characterized both by high levels of volatility and lack of regulation, due in part to its decentralized approach. A handful of potential strategies are examined that could strengthen Ethereum’s ability to mitigate the reputation and liability risks of their enterprise.

Read More

Ring, Ring. Who’s There? A Burglar

Allison Gibbons discusses the security vulnerabilities around Amazon’s Ring doorbell and how that has led to user information being leaked and accessed without proper authorization. One vulnerability that is touched on is Ring’s relationship with police departments and the privacy concerns that came from police having too much access to Ring doorbell footage. There are ways for users to secure their Ring doorbell and protect their information against these vulnerabilities, and it’s recommended that users take these steps to ensure their personal networks aren’t hacked.

Read More