Friday, 14 February 2020

Testing the Hypothesis Pt. 2



Assignment 9A- Testing the Hypothesis, Part 2
1)      Who: Hersh Dave- Father, computer engineer at for cerebral palsy in NY.
Although cyber security threats and hacking is so prevalent in today’s day and age why do you think you are better protected from it? When coders and other developers see an opportunity to provide safer platforms for businesses, to boost customer trust, why do you think you will not be influenced?
What: Do you think cyber security falls into the same category as data breaching, hacking and leaks? At what point does cyber security differ from similar needs?
Why: Why do you believe your needs regarding cyber security are different from others?

-          I believe I am better protected from threats to cyber security because I know many of the tricks that hackers use when trying to access private data. For this reason, I try to share as little as possible and only conduct business on reliable sites that are heavily protected. In my company I manage thousands of computers and servers that are constantly under attack. However, with the proper safety system in place and constant monitoring, leaks can be prevented. I can see how there is a big market for businesses and companies boost consumer confidence by enhancing their security, however I am already so careful about what I use and share that I don’t believe I would be heavily influenced by such moves. I think cyber security is related to data breaching, hacking and leaks. Whenever cyber security is penetrated by hackers there is threat for a large scale data breach that can implicate many people. Despite this, I do cyber security differs from what we traditionally think. For instance, when someone gets hacked, there immediate reaction may be concern about the information that was stolen. While this is valid reasoning, we must also consider how the perpetrator got around the firewall/protective measures of the system, what the individual that got hacked shared online and if the perpetrator had any help from an outside company, so taking all these factors into account, cyber security differs from traditional firewalls/anti-virus programs. I believe my needs for cyber security are different because I manage an IT department with thousands of computers and sensitive patient information. Therefore, I know many of the ways in which I can protect my company and keep data secure.
2)      Shaan Dave- Cousin, Software Developer
-          I believe I have better understanding of cyber security because my day to day job involves data security. I have to ensure that my company’s data and important client information cannot be accessed by anyone else. Therefore, I’m aware of different softwares and protective measures I can implement in my daily life to prevent a breach. Although I understand while this may be a great opportunity for businesses to build consumer support and trust, no business or company will ever by a hundred percent secure and there is always a possibility of a leak. Its best to not perform mobile banking or share too much personal information online in general. Since I have seen what can occur due to oversharing, I don’t think I would be heavily influenced by companies making their platforms more secure. Yes, I definitely think cyber security includes all these factors but goes beyond them. As I alluded to cyber security differs because it also includes the machinery you are operating on, the data you share and the method in which this was hacked. I believe my needs regarding cyber security may be different from the average person because I hardly ever put anything personal online. Even when it comes to transactions, I try to only perform them on the computer and never on a public/open network.
3)      Hari Patel- Grandfather
-          I think I’m protected from cyber security threats because I don’t have a laptop or smartphone. I use a regular cell phone that I only call family, friends and doctor’s offices with. I don’t think it will matter to me if safer platforms to conduct business online are put out by countries because at this stage in my life I hardly doubt I will learn how to use a laptop/smartphone and make online transactions. I think cyber security differs from hacks or leaks because it is more comprehensive. From what I’ve seen in the news, it entails many more factors then a specific threat or instance of theft. I think my needs regarding cybersecurity are different because I never go online and only have to worry about my family members who go on their daily for business.
4)      Pujan Kavi- Cousin – works in cybersecurity
-          I feel well protected from cyber security threats and hacks because I’ve learned of the systems and safety precautions that can be implemented to prevent such occurrences. Even though a completely secure network is impossible, there are protective measures that can be taken to minimize risk. Although I understand the premise behind businesses advertising their websites and social media platforms as secure and safe, I don’t think I’ll be heavily swayed by these marketing techniques because I already have systems in place that keep my data private and minimize risk for hacks/leaks. I think cyber security differs from similar needs because it is often overlooked on a daily basis. When there is a massive hack or scandal everyone starts to panic and pay attention to the situation. What people have to realize is that there are people trying to access your records and private information every day, individuals must have security measures to protect against these attacks and virus causing programs. I think my needs regarding cybersecurity are unique since I already work in the field. My needs primarily center on the new ways viruses and threats are evolving to evade security systems.
5)      Nita Dave- Anesthesiologist @ Mt. Sinai in New York
-          I think I’m well protected from cyber security threats because I hardly ever purchase anything online and have no social media. In addition, since I work with so many patient records, my center has a division solely focused on data protection. As I mentioned before, I hardly do online shopping or have personal information online so I don’t think I would be influenced by businesses ramping up their cybersecurity. Yes, I feel as though cybersecurity, leaks, data breaching and hacks are all related. Cybersecurity may differ from similar needs because it often goes unnoticed. For example when we think of typical security we think of a guard or someone we can see protecting something, however in the online world different codes/programs go unnoticed but protect sensitive information. I think my needs regarding cybersecurity are different because they are primarily for my patients. I want to make sure their medical history and private records are kept safe.  
Inside the Boundary
Outside the Boundary
Who: People that participate in online shopping, banking, school, social media etc..
Who: The elderly, people that don’t use the internet for banking, shopping, school, social media etc. People in IT or cybersecurity field that already have protective systems they can use
What: Protecting private data and records
What: They don’t have private data online so their need isn’t towards protecting this information
Why: The world is becoming increasingly cyber meaning that online threats are becoming even more prevalent
Why: Either they already have proper safety measures in place to prevent hacks or don’t use the internet for transactions/social media

3 comments:

  1. The points for protecting private data and records effect everyone! My mom is a baby bomber who has her social security information stolen while she was filing for taxes, my point is that even though the elder do not use apps, their information is publically exchanged whether it is by accountants for tax information or credit card information at gas stations.

    ReplyDelete
  2. Hi Shivani,

    Very well written blog post. These interviews are really helpful in finding out who is most willingly to buy your product. This is found by comparing each different consumer group you interviewed. People who are most likely to have a cyber security threat are gonna be the people who are most likely to buy your product. You can use this information to your advantage by gearing your product towards your target market.

    ReplyDelete
  3. This is an amazing research, you have done a great job interviewing and going into many different aspects and details. I think data protection and privacy is very important. Although nowadays voice recognition technology makes it it easy to spy on you, it happens a lot with me when you discussing something, for example a store or some product, and that store or product appears on your phone as a paid ad on facebook or instagram

    ReplyDelete