DATA4300 Data Security and Ethics
IT – Case Study
Your Task -
• This assessment is to be done individually.
• Students are to write a 1000-word report on the monetisation of data and submit it as a Microsoft word file via Turnitin on Tuesday week 3 at 23:55pm (AEST).
• You will receive marks for content, appropriate structure and referencing.
Part A: Introduction and use on monetisation
• Introduce the idea of monetisation.
• Describe how it is being used in by the company you chose.
• Explain how it is providing benefit for the business you chose.
Part B: Ethical, privacy and legal issues
• Research and highlight possible threats to customer privacy and possible ethical and legal issues arising from the monetisation process.
• Provide one organisation which could provide legal or ethical advice.
Part C: GVV and code of conduct
• Now suppose that you are working for the company you chose as your case study for assignment help. You observe that one of your colleagues is doing something novel for the company, however at the same time taking advantage of the monetisation for themself. You want to report the misconduct. Describe how giving voice to values can help you in this situation.
• Research the idea of a code of conduct and explain how it could provide clarity in this situation.
Part D: References and structure
• Include a minimum of five references
• Use the Harvard referencing style
• Use appropriate headings and paragraphs
Part A: Introduction and use of monetization
The idea of monetization
The most popular method of using information to increase revenue is data monetization. The highest performing and fastest growing businesses have embraced data monetization and integrated it into their operations. Offering direct access to your information to outsiders is part of direct information monetization. One can sell it in its original, unsophisticated form or in a structure that has been modified to include research and knowledge titbits (Tucci and Viscusi, 2022.). Common models include contact configurations for new commercial opportunities or discoveries that have an impact on the businesses and organizations of purchasers, where things become interesting is with aberrant information monetization. Information-based improvement comes first and foremost. This involves dissecting your data to find experiences that can improve how your association does business. Information may help you understand how to approach clients and how to interpret client behaviour so one can move your transactions forward. Information might also include where and how to cut expenses, avoid risks, and simplify procedures.
Use of monetization in Telstra
The last several years have seen activity in the field of big data monetization in telecoms. But telecoms' competitiveness has changed over time because of the complexity of delivering and selling such a wide variety of goods, as well as because different verticals have distinct income potential opportunities. The success of other new telco products, particularly IoT, as implied by the connection between various Telstra information and examination items and IoT arrangements, has also significantly impacted Telstra's desire to pursue information monetization approaches (Cunneen and Mullins, 2019.). In many cases, IoT information monetization is the main system, as shown in the scenario above, but in other cases telecommunications administrators can handle opportunities independently of IoT administrations.
The benefit of monetization in Telstra
The arrangement of understanding distraction/wearing scenarios is a fairly typical use case in today's world that makes use of sensor data and client development expertise. Also available for examination are crucial areas like client division and behaviour. For Telstra, it is harder to find various open doorways around pleased usage designs. Although it is a mature market used to consuming various types of information, and it doesn't seem to be a well-known use case, Telstra may well know about its set-top boxes and various stages that will be important to content suppliers.
Part B: Ethical, privacy, and legal issues
Threats to customer privacy and possible ethical and legal issues arising from the monetization process
Big Data, artificial intelligence, and information-driven advancements provide enormous benefits for society as a whole and numerous fields. On the other hand, their abuse might cause information work procedures to ignore moral obligations, security expectations, and information insurance regulations (Al Falasi Jr, 2019). If using big data effectively inside a framework that is ethically sound and culturally focused is capable of acting as an empowering agent of favourable outcomes, using big data for money outside of such a structure poses several risks, potential issues, and ethical dilemmas. A few examples of the impact modern reconnaissance tools and information collecting techniques have on security include group protection, advanced profiling, automated guidance, and biased rehearsals.
Everything in modern society can be scored, and fundamentally innovative opportunities are still up in the air thanks to such scoring systems, which are typically obtained by opaque predictive equations applied to data to determine who is valuable. Therefore, it is essential to guarantee the decency and accuracy of such scoring frameworks and that the decisions based on them are acknowledged legally and morally, avoiding the risk of defamation suited to affect people's chances (Kumar et al. 2020). In a similar vein, it's critical to prevent the alleged "social cooling." This deals with the long-lasting undesirable effects of information-driven improvement, particularly those caused by such scoring frameworks and the standing economy. It may be seen, for instance, in the phrasing of self-awareness, danger avoidance, and the absence of free speech activity in large information works that are conducted without a moral foundation.
The human-information interaction under Internet of Things (IoT) settings, which is boosting the amount of information acquired, the speed of the cycle, and the variety of information sources, is another crucial morality issue (Rantala et al. 2021). Researching new viewpoints such as "responsibility for" and other barriers is important, especially because the administrative landscape is developing much more slowly than the Internet of Things and the advancement of Big Data technologies.
The organization which could provide legal or ethical advice
The Office of Legal Services Coordination works to guarantee that Australian Government entities get trustworthy and well-written legal services. This group might offer advice on the impact of modern observation tools and information gathering techniques on security, including group security, advanced profiling, computerized direction, and unfair practices.
Part C: GVV and code of conduct
Report the misconduct
The GVV framework including Values, Choice, Normalization, Purpose, Self-Knowledge & Alignment, Voice, and Reasons & Rationalizations can be noted to be denied in the abuse of the monetization frameworks may result in disruptions and extraordinary results. The weaponization of monetization poses the most obvious risk. The projected risk of computerizing protection engineering is that it would lead to widespread obliteration that is not reversible (Truong et al. 2019). The tactical application of adaptability, such as the use of independent weapons, might result in a different and more destructive style of combat.
It should also be taken into consideration because a study on the corrupt use of money found that adaptation might make already existing threats like cybercrime worse and the deliberate misuse of the GVV framework should be reported. The advancement of adaptability may also herald the appearance of novel threats. They might easily sabotage current safety initiatives, interfere with a system's operation, or damage any stored information. Additionally, futurists warn that money might be misused in a variety of ways, like as:
• Through the propagation of false ideologies, the majority is subjugated and subject to social control.
• The increase of automated systems that can spread fake news and change public opinion
• Attacks against the fundamental pillars of the economy, such as banks, media communications, utilities, and so on, can be launched by cybercriminals using money.
• Large businesses can use adaption-controlled techniques for adaptation to mine confidential customer information.
Code of conduct and its usage
A code of conduct is essential in this case because it provides employees with clear guidance on how to behave and operate while carrying out their jobs. While some businesses want their employees to abide by a code with many requirements, others keep things simple. An aspiring employee may determine whether they can work in a certain organization by learning about the standards, methods, and assumptions, and a current representative can excel at their job by doing so (Dagg et al. 2022). The new legislation for information protection and other moral concerns requires that businesses manage their internal information operations following these new rules, which is the importance of the code of conduct. Additionally, even if change at large firms is dramatic, information pioneers should seriously assess such changes as business opportunities rather than burdens.
Part D: References
Al Falasi Jr, R., 2019. Personal Data Monetization Strategy: Systematic Review and a Case Study of UAE (Doctoral dissertation, The British University in Dubai).
Cunneen, M.A.R.T.I.N. and Mullins, M.A.R.T.I.N., 2019. Framing Risk, The New Phenomenon of Data Surveillance and Data Monetization; from an ‘Always-On’culture to ‘Always-On’artificial Intelligence Assistants. Hybrid Worlds, p.65.
Dagg, N., Kostick, C., Fallon, J., O’Neill, A., Yilmaz, M., Messnarz, R. and Clarke, P.M., 2022. Socially-Critical Software Systems: Is Extended Regulation Required?. In European Conference on Software Process Improvement (pp. 610-622). Springer, Cham.
Rantala, T., Valjakka, T., Kokkonen, K., Hannola, L., Timperi, M. and Torvikoski, L., 2021, November. Selling the value of complex data-based solution for industrial customers. In Working Conference on Virtual Enterprises (pp. 345-353). Springer, Cham.
Kumar, A., Anand, A. and Kesri, V., 2020. Industry 4.0 to education 4.0: An Indian Student Perspective. International Journal of Innovative Research in Technology, 6(12), pp.417-423.
Tucci, C. and Viscusi, G., 2022. Perspectives on the value of Big Data sharing. Information Technology & People.
Truong, H.T.T., Almeida, M., Karame, G. and Soriente, C., 2019, July. Towards secure and decentralized sharing of IoT data. In 2019 IEEE International Conference on Blockchain (Blockchain) (pp. 176-183). IEEE.