Assignment
9A- Testing the Hypothesis, Part 2
1) Who:
Hersh Dave- Father, computer engineer at for cerebral palsy in NY.
Although cyber security threats and
hacking is so prevalent in today’s day and age why do you think you are better
protected from it? When coders and other developers see an opportunity to
provide safer platforms for businesses, to boost customer trust, why do you
think you will not be influenced?
What: Do you think cyber security
falls into the same category as data breaching, hacking and leaks? At what
point does cyber security differ from similar needs?
Why: Why do you believe your needs
regarding cyber security are different from others?
-
I believe I am better protected from
threats to cyber security because I know many of the tricks that hackers use
when trying to access private data. For this reason, I try to share as little
as possible and only conduct business on reliable sites that are heavily
protected. In my company I manage thousands of computers and servers that are
constantly under attack. However, with the proper safety system in place and
constant monitoring, leaks can be prevented. I can see how there is a big
market for businesses and companies boost consumer confidence by enhancing
their security, however I am already so careful about what I use and share that
I don’t believe I would be heavily influenced by such moves. I think cyber
security is related to data breaching, hacking and leaks. Whenever cyber
security is penetrated by hackers there is threat for a large scale data breach
that can implicate many people. Despite this, I do cyber security differs from
what we traditionally think. For instance, when someone gets hacked, there
immediate reaction may be concern about the information that was stolen. While
this is valid reasoning, we must also consider how the perpetrator got around
the firewall/protective measures of the system, what the individual that got
hacked shared online and if the perpetrator had any help from an outside
company, so taking all these factors into account, cyber security differs from
traditional firewalls/anti-virus programs. I believe my needs for cyber
security are different because I manage an IT department with thousands of
computers and sensitive patient information. Therefore, I know many of the ways
in which I can protect my company and keep data secure.
2) Shaan
Dave- Cousin, Software Developer
-
I believe I have better understanding of
cyber security because my day to day job involves data security. I have to
ensure that my company’s data and important client information cannot be
accessed by anyone else. Therefore, I’m aware of different softwares and protective
measures I can implement in my daily life to prevent a breach. Although I
understand while this may be a great opportunity for businesses to build
consumer support and trust, no business or company will ever by a hundred
percent secure and there is always a possibility of a leak. Its best to not
perform mobile banking or share too much personal information online in
general. Since I have seen what can occur due to oversharing, I don’t think I
would be heavily influenced by companies making their platforms more secure.
Yes, I definitely think cyber security includes all these factors but goes
beyond them. As I alluded to cyber security differs because it also includes
the machinery you are operating on, the data you share and the method in which
this was hacked. I believe my needs regarding cyber security may be different
from the average person because I hardly ever put anything personal online.
Even when it comes to transactions, I try to only perform them on the computer
and never on a public/open network.
3) Hari
Patel- Grandfather
-
I think I’m protected from cyber security
threats because I don’t have a laptop or smartphone. I use a regular cell phone
that I only call family, friends and doctor’s offices with. I don’t think it
will matter to me if safer platforms to conduct business online are put out by
countries because at this stage in my life I hardly doubt I will learn how to
use a laptop/smartphone and make online transactions. I think cyber security
differs from hacks or leaks because it is more comprehensive. From what I’ve
seen in the news, it entails many more factors then a specific threat or
instance of theft. I think my needs regarding cybersecurity are different because
I never go online and only have to worry about my family members who go on
their daily for business.
4) Pujan
Kavi- Cousin – works in cybersecurity
-
I feel well protected from cyber security
threats and hacks because I’ve learned of the systems and safety precautions
that can be implemented to prevent such occurrences. Even though a completely
secure network is impossible, there are protective measures that can be taken
to minimize risk. Although I understand the premise behind businesses
advertising their websites and social media platforms as secure and safe, I don’t
think I’ll be heavily swayed by these marketing techniques because I already have
systems in place that keep my data private and minimize risk for hacks/leaks. I
think cyber security differs from similar needs because it is often overlooked
on a daily basis. When there is a massive hack or scandal everyone starts to
panic and pay attention to the situation. What people have to realize is that
there are people trying to access your records and private information every
day, individuals must have security measures to protect against these attacks
and virus causing programs. I think my needs regarding cybersecurity are unique
since I already work in the field. My needs primarily center on the new ways
viruses and threats are evolving to evade security systems.
5) Nita
Dave- Anesthesiologist @ Mt. Sinai in New York
-
I think I’m well protected from cyber
security threats because I hardly ever purchase anything online and have no social
media. In addition, since I work with so many patient records, my center has a
division solely focused on data protection. As I mentioned before, I hardly do
online shopping or have personal information online so I don’t think I would be
influenced by businesses ramping up their cybersecurity. Yes, I feel as though
cybersecurity, leaks, data breaching and hacks are all related. Cybersecurity
may differ from similar needs because it often goes unnoticed. For example when
we think of typical security we think of a guard or someone we can see
protecting something, however in the online world different codes/programs go
unnoticed but protect sensitive information. I think my needs regarding
cybersecurity are different because they are primarily for my patients. I want
to make sure their medical history and private records are kept safe.
|
Inside the Boundary
|
Outside the Boundary
|
|
Who: People that participate in online
shopping, banking, school, social media etc..
|
Who: The elderly, people that don’t use
the internet for banking, shopping, school, social media etc. People in IT or
cybersecurity field that already have protective systems they can use
|
|
What: Protecting private data and
records
|
What: They don’t have private data
online so their need isn’t towards protecting this information
|
|
Why: The world is becoming increasingly
cyber meaning that online threats are becoming even more prevalent
|
Why: Either they already have proper
safety measures in place to prevent hacks or don’t use the internet for
transactions/social media
|
The points for protecting private data and records effect everyone! My mom is a baby bomber who has her social security information stolen while she was filing for taxes, my point is that even though the elder do not use apps, their information is publically exchanged whether it is by accountants for tax information or credit card information at gas stations.
ReplyDeleteHi Shivani,
ReplyDeleteVery well written blog post. These interviews are really helpful in finding out who is most willingly to buy your product. This is found by comparing each different consumer group you interviewed. People who are most likely to have a cyber security threat are gonna be the people who are most likely to buy your product. You can use this information to your advantage by gearing your product towards your target market.
This is an amazing research, you have done a great job interviewing and going into many different aspects and details. I think data protection and privacy is very important. Although nowadays voice recognition technology makes it it easy to spy on you, it happens a lot with me when you discussing something, for example a store or some product, and that store or product appears on your phone as a paid ad on facebook or instagram
ReplyDelete