Shouyang Wang discusses the trade-offs between personal privacy and national security. Through the lens of various philosophical theories, constitutional rights, and judicial rulings, the paper examines how as the surveillance level goes up, the ethical constraints should gradually move from a consequentialist approach to a deontological one.
Read MoreFacebook Weak Controls and Risk Mitigation Opportunities
Macay Fischer discusses the wake of the 2021 hack of Facebook user data, which highlighted yet again how critical it is that a massive public company like Facebook requires robust risk management practices integrated through all levels of the business. The author identifies potential risk mitigation opportunities—including increasing the effectiveness of existing internal controls—that Facebook could implement going forward to reduce its risks in these areas.
Read MoreSafeguarding Children’s Privacy
Kate Peterson discusses the risks associated with the practice of “sharenting” where parents post photos and share detailed information on social media about their child’s life. As a result, many children now have a digital footprint long before they can use the internet or create social media accounts themselves. Being able to crowdsource challenges and share information with other parents can function as an important part of a caregiver’s support system. However, the practice also increases a child’s risk of identity theft, stalking, cyberbullying, and may violate a child’s privacy, resulting in serious—if unintended—consequences.
Read MoreEpic Games Vs. Apple
Raphael Kyle Caoile Manansala discusses the actions of Epic Games on August 13, 2020 when the company introduced a gaming update that included a new payment system where revenue would go directly and entirely to Epic Games. This was accomplished by circumventing Apple’s 30% fee by not using Apple’s in-app payment system that all Apple Store applications (“app(s)”, also referred to as program(s)) are subjected to use. Because Epic Games knowingly violated the App Store’s terms and conditions, Apple removed the game from the App Store. Epic Games responded with an anti-trust lawsuit against Apple. If Epic proves that Apple’s practices are anti-competitive and an unfair monopoly, it could lead to the App Store fundamentally changing.
Read MoreTech Abuse Through a Feminist Ethics Lens
Aki Shibuya discusses the outcome of assessing technology-enabled abuse through a feminist ethical framework. If culturally dominant understandings of social constructs such as privacy minimize or exclude the experiences of women, these ideas can negatively impact policy decisions made around issues like tech abuse. Applying feminist ethics to issues such as tech abuse encourages a re-examination of how ethical frameworks can influence current norms and policies.
Read MoreThe Ethical Implications of Clearview as a Surveillance Tool
Zach Smithingell discusses the ethical implications of using facial recognition technology as a tool for surveillance. The author makes the case that any use of such extremely powerful technology, such as the product offered by the company Clearview AI, is inherently unethical and poses too many risks.
Read MoreZoombombing
Serah Prakkat discusses the privacy issues and risk exposures related to Zoombombing, the invasion of video meetings by malicious parties intent on disrupting teleconference sessions. Topics include the risk conditions that led to the issue, changes made by organizations, government regulations, and recommendations aimed at mitigating the risks and preventing the practice.
Read MorePrivacy, Innovative Technology, and the Fourth Amendment
Arthur Man explores the intersection of the U.S. Constitution’s Fourth Amendment, innovations in the technology realm, and privacy rights. The author argues that the evolution of technology has allowed governments and corporations alike to infringe on the privacy rights of everyday people. Ultimately, this paper discusses the risk that this violation will continue, dependent upon the public’s willingness to trade privacy rights for comfort and ease of use.
Read MoreHelping the Planet—As Long as It’s Convenient
Roshani Ravi discusses the current risk conditions and operational conditions facing Coca-Cola after the beverage company was named the world’s largest polluter of plastics for the third consecutive year in 2020. The enterprise faces significant levels of reputational, environmental, operational, and compliance risks. Taking into the larger negative implications of environmental pollution, the author argues for Coca-Cola to take deliberate actions to improve conditions and mitigate future risks.
Read MoreESD—System Under Fire
Kha Nguyen discusses how the use of effective controls within an organization is critical for safeguarding the reputation of the company as well as the safety and assets of its customers. During the COVID-19 pandemic, the Washington State’s Employment Security Department (ESD) experienced major failures of its systems and controls, leading to tens of thousands of fraudulent claims made worth hundreds of millions of dollars.
Read MoreFrom FinTech Darling to Bankruptcy
Vincent Xu discusses the recent bankruptcy of Wirecard, which has been called as one of the worst financial disasters in Europe since the financial crisis. A combination of opaque business practices, ignorant culture of non-compliance and lack of business partner control all contributed to the eventual revelation that $2 billion was missing from the company’s accounts. The downfall of the German fintech darling sparked conversation about the trend of false optimism in the up-and-coming fintech industry “disruptors.” As the success of the fintech industry relies heavily upon the trust that is given by society, fintech companies must close the gaps in regulatory policies and compliance practices.
Read MoreAmazon Prime Air: A Disaster Waiting to Happen?
Greyson Fields discusses the potential rewards and numerous risks Amazon faces as the technology firm pursues the implementation of Prime Air, an ultra-fast e-commerce delivery solution. The successful operationalization of Prime Air will result in the speedy delivery of consumer goods via drones—but to achieve this, Amazon will need to mitigate public safety risks, physical property damage risks, and system integration and process coordination risks. Recommendations include applying the RACI tool—at a large scale—to increase the likelihood of Amazon succeeding in this innovation effort.
Read MoreThe Global Paradox of Digital Divides in a Shrinking Village
Gabriel McCoard discusses the duality of how the evolution of information and communications technologies (ICTs) has resulted both in greater connectedness (the “global village”) and greater inequalities in access to that connectedness (the digital divide). The paper examines some of the root causes for this current state, and some of the various efforts that have been made to address the disconnect. Ultimately, the idea of a “global village” certainly exists, but the author asks how much of the world is included in that village, and whether the village is the same one for everyone.
Read MoreB Corporations: Purpose-Driven Business for the Good of All
Rochelle Robison discusses how B corporations, or benefit corporations, have risen in the past 15 years in response to a growing recognition that business can be profitable and purpose driven. Given the rise in socially consciousness and the business community’s outsized impact on daily lives around the globe, this is the time to reassess how for-profit businesses are incorporated, including their responsibility to stakeholders, not just shareholders.
Read MoreAccenture's Technology Vision 2020 for Innovation DNA
Sophia Werner discusses how over three fourths of C-level executives believe that the stakes for innovation have never been higher. Yet, the world has also seen a rise in concern and expectation for handling security and privacy. Accenture's Technology Vision 2020 pushes for ideas that will take C-level companies' innovation in the right direction. It is a vision that advocates for constant innovation realized on a systems level and commoditized beyond its original purpose. As long as Accenture communicates that the company's brand image should be at the pinnacle, that innovation is done meticulously, and that updates are frequent, Technology Vision 2020 may also help reach the security and privacy levels the world has begun to demand as well.
Read MoreKyoto Animation Arson Attack Risk Analysis
Bingyan Wang conducts an assessment of the risk conditions leading up to the 2019 arson of Kyoto Animation’s Studio 1 building, which killed 36 people and injured 33 more. The risk conditions included reputational risk and multiple types of operational risk, and some of the various preventative controls that failed to prevent this tragedy. The analysis includes suggestions for lessons learned going forward for companies of all types.
Read MoreA Consequentialist Argument For A Centralized Genetic Databank
Amanda Phillips discusses the argument for a centralized genetic database through the lens of consequentialism. The author examines the possible positive and negative consequences of establishing such a genetic repository, including threats to privacy and the risk of increasing systematic bias. The author concludes with the results of the evaluation of how a centralized genetic database might both provide benefits to people as well as how it might cause harm.
Read MoreNASDAQ’s Exploration into Blockchain Technology
Allessandra Quevedo discusses how NASDAQ Inc. continues to explore the integration of Blockchain technology to both the private and public markets. Whether it is NASDAQ’s enterprise Blockchain platform or whether it is the future of trading on the NASDAQ stock exchange as a whole, the technology promises a more efficient form of performing trade settlements and transactions—while reducing the number of individuals who need to be ‘hands on.’ Blockchain promises for a more optimal form of conducting business, one that is more transparent and promotes trust between investors.
Read MoreDeepfakes on Instagram: Mitigating Event and Process Risk
Kate Peterson discusses the rising level of risk stemming from deepfakes—videos modified using highly sophisticated technology—and the challenge that arise when these are widely and rapidly shared on social media platforms. Specifically, this analysis focuses on the external event and process control failures related to deepfakes on Instagram as well as suggestions for their mitigation.
Read MoreCOVID-19 Vaccine Supply Chain Risks
Vincent Xu discusses the global dissemination of COVID-19 vaccines, perhaps the biggest and most consequential product launch in modern history. Challenges have arisen from brand new ultra-cold refrigeration equipment requirements, far-reaching nation-state malicious cyberattacks, and crucial weak links discovered in logistic processes. The challenge that the worldwide health sciences sector faces requires an agile coordination amongst law enforcement, threat intelligence, pharmaceutical firms, and logistics providers.
Read More