Facebook Weak Controls and Risk Mitigation Opportunities

Macay Fischer discusses the wake of the 2021 hack of Facebook user data, which highlighted yet again how critical it is that a massive public company like Facebook requires robust risk management practices integrated through all levels of the business. The author identifies potential risk mitigation opportunities—including increasing the effectiveness of existing internal controls—that Facebook could implement going forward to reduce its risks in these areas.

Read More

Safeguarding Children’s Privacy

Kate Peterson discusses the risks associated with the practice of “sharenting” where parents post photos and share detailed information on social media about their child’s life. As a result, many children now have a digital footprint long before they can use the internet or create social media accounts themselves. Being able to crowdsource challenges and share information with other parents can function as an important part of a caregiver’s support system. However, the practice also increases a child’s risk of identity theft, stalking, cyberbullying, and may violate a child’s privacy, resulting in serious—if unintended—consequences.

Read More

Epic Games Vs. Apple

Raphael Kyle Caoile Manansala discusses the actions of Epic Games on August 13, 2020 when the company introduced a gaming update that included a new payment system where revenue would go directly and entirely to Epic Games. This was accomplished by circumventing Apple’s 30% fee by not using Apple’s in-app payment system that all Apple Store applications (“app(s)”, also referred to as program(s)) are subjected to use. Because Epic Games knowingly violated the App Store’s terms and conditions, Apple removed the game from the App Store. Epic Games responded with an anti-trust lawsuit against Apple. If Epic proves that Apple’s practices are anti-competitive and an unfair monopoly, it could lead to the App Store fundamentally changing.

Read More

Tech Abuse Through a Feminist Ethics Lens

Aki Shibuya discusses the outcome of assessing technology-enabled abuse through a feminist ethical framework. If culturally dominant understandings of social constructs such as privacy minimize or exclude the experiences of women, these ideas can negatively impact policy decisions made around issues like tech abuse. Applying feminist ethics to issues such as tech abuse encourages a re-examination of how ethical frameworks can influence current norms and policies.

Read More

Zoombombing

Serah Prakkat discusses the privacy issues and risk exposures related to Zoombombing, the invasion of video meetings by malicious parties intent on disrupting teleconference sessions. Topics include the risk conditions that led to the issue, changes made by organizations, government regulations, and recommendations aimed at mitigating the risks and preventing the practice.

Read More

Privacy, Innovative Technology, and the Fourth Amendment

Arthur Man explores the intersection of the U.S. Constitution’s Fourth Amendment, innovations in the technology realm, and privacy rights. The author argues that the evolution of technology has allowed governments and corporations alike to infringe on the privacy rights of everyday people. Ultimately, this paper discusses the risk that this violation will continue, dependent upon the public’s willingness to trade privacy rights for comfort and ease of use.

Read More

Helping the Planet—As Long as It’s Convenient

Roshani Ravi discusses the current risk conditions and operational conditions facing Coca-Cola after the beverage company was named the world’s largest polluter of plastics for the third consecutive year in 2020. The enterprise faces significant levels of reputational, environmental, operational, and compliance risks. Taking into the larger negative implications of environmental pollution, the author argues for Coca-Cola to take deliberate actions to improve conditions and mitigate future risks.

Read More

ESD—System Under Fire

Kha Nguyen discusses how the use of effective controls within an organization is critical for safeguarding the reputation of the company as well as the safety and assets of its customers. During the COVID-19 pandemic, the Washington State’s Employment Security Department (ESD) experienced major failures of its systems and controls, leading to tens of thousands of fraudulent claims made worth hundreds of millions of dollars.

Read More

From FinTech Darling to Bankruptcy

Vincent Xu discusses the recent bankruptcy of Wirecard, which has been called as one of the worst financial disasters in Europe since the financial crisis. A combination of opaque business practices, ignorant culture of non-compliance and lack of business partner control all contributed to the eventual revelation that $2 billion was missing from the company’s accounts. The downfall of the German fintech darling sparked conversation about the trend of false optimism in the up-and-coming fintech industry “disruptors.” As the success of the fintech industry relies heavily upon the trust that is given by society, fintech companies must close the gaps in regulatory policies and compliance practices.

Read More

Amazon Prime Air: A Disaster Waiting to Happen?

Greyson Fields discusses the potential rewards and numerous risks Amazon faces as the technology firm pursues the implementation of Prime Air, an ultra-fast e-commerce delivery solution. The successful operationalization of Prime Air will result in the speedy delivery of consumer goods via drones—but to achieve this, Amazon will need to mitigate public safety risks, physical property damage risks, and system integration and process coordination risks. Recommendations include applying the RACI tool—at a large scale—to increase the likelihood of Amazon succeeding in this innovation effort.

Read More

The Global Paradox of Digital Divides in a Shrinking Village

Gabriel McCoard discusses the duality of how the evolution of information and communications technologies (ICTs) has resulted both in greater connectedness (the “global village”) and greater inequalities in access to that connectedness (the digital divide). The paper examines some of the root causes for this current state, and some of the various efforts that have been made to address the disconnect. Ultimately, the idea of a “global village” certainly exists, but the author asks how much of the world is included in that village, and whether the village is the same one for everyone.

Read More

B Corporations: Purpose-Driven Business for the Good of All

Rochelle Robison discusses how B corporations, or benefit corporations, have risen in the past 15 years in response to a growing recognition that business can be profitable and purpose driven. Given the rise in socially consciousness and the business community’s outsized impact on daily lives around the globe, this is the time to reassess how for-profit businesses are incorporated, including their responsibility to stakeholders, not just shareholders.

Read More

Accenture's Technology Vision 2020 for Innovation DNA

Sophia Werner discusses how over three fourths of C-level executives believe that the stakes for innovation have never been higher. Yet, the world has also seen a rise in concern and expectation for handling security and privacy. Accenture's Technology Vision 2020 pushes for ideas that will take C-level companies' innovation in the right direction. It is a vision that advocates for constant innovation realized on a systems level and commoditized beyond its original purpose. As long as Accenture communicates that the company's brand image should be at the pinnacle, that innovation is done meticulously, and that updates are frequent, Technology Vision 2020 may also help reach the security and privacy levels the world has begun to demand as well.

Read More

Kyoto Animation Arson Attack Risk Analysis

Bingyan Wang conducts an assessment of the risk conditions leading up to the 2019 arson of Kyoto Animation’s Studio 1 building, which killed 36 people and injured 33 more. The risk conditions included reputational risk and multiple types of operational risk, and some of the various preventative controls that failed to prevent this tragedy. The analysis includes suggestions for lessons learned going forward for companies of all types.

Read More

A Consequentialist Argument For A Centralized Genetic Databank

Amanda Phillips discusses the argument for a centralized genetic database through the lens of consequentialism. The author examines the possible positive and negative consequences of establishing such a genetic repository, including threats to privacy and the risk of increasing systematic bias. The author concludes with the results of the evaluation of how a centralized genetic database might both provide benefits to people as well as how it might cause harm.

Read More

NASDAQ’s Exploration into Blockchain Technology

Allessandra Quevedo discusses how NASDAQ Inc. continues to explore the integration of Blockchain technology to both the private and public markets. Whether it is NASDAQ’s enterprise Blockchain platform or whether it is the future of trading on the NASDAQ stock exchange as a whole, the technology promises a more efficient form of performing trade settlements and transactions—while reducing the number of individuals who need to be ‘hands on.’ Blockchain promises for a more optimal form of conducting business, one that is more transparent and promotes trust between investors.

Read More

Deepfakes on Instagram: Mitigating Event and Process Risk

Kate Peterson discusses the rising level of risk stemming from deepfakes—videos modified using highly sophisticated technology—and the challenge that arise when these are widely and rapidly shared on social media platforms. Specifically, this analysis focuses on the external event and process control failures related to deepfakes on Instagram as well as suggestions for their mitigation.

Read More

COVID-19 Vaccine Supply Chain Risks

Vincent Xu discusses the global dissemination of COVID-19 vaccines, perhaps the biggest and most consequential product launch in modern history. Challenges have arisen from brand new ultra-cold refrigeration equipment requirements, far-reaching nation-state malicious cyberattacks, and crucial weak links discovered in logistic processes. The challenge that the worldwide health sciences sector faces requires an agile coordination amongst law enforcement, threat intelligence, pharmaceutical firms, and logistics providers.

Read More