Reference no: EM134012040
Organizational Cyber Security
Portfolio Overview: [words 800-1000]
With the growth of online shopping, consumer data has become an asset for e-commerce businesses. However, this increased data collection raises significant privacy concerns. As an online shopper, personal information such as names, addresses, payment details, browsing behaviour, and preferences are often collected and stored. This project will explore the data privacy risks faced by individuals during online shopping and evaluate the existing controls or mechanisms that e-commerce platforms use to protect user privacy. Additionally, students will propose innovative strategies and best practices to mitigate the risks associated with online shopping. Concepts related to Information Technology And System and secure data handling are highly relevant in this context.
Portfolio Questions on Data Privacy in Online Shopping:
What types of personal data are typically collected during online shopping through Google Analytics (e.g., payment info, browsing history)?
Identify and explain three privacy risks associated with online shopping (e.g., data breaches, phishing, tracking).
Evaluate the data privacy controls of a popular online shopping platform (e.g., Amazon, eBay). Are they sufficient?
How can e-commerce platforms improve data protection during payment transactions? Consider principles associated with Data Communication And Networking when discussing secure transmission of information.
Propose two new privacy measures to help online shoppers maintain control over their personal data.
What are the legal and regulatory considerations regarding consumer privacy in online shopping?
How can consumers protect their privacy when shopping online (e.g., using VPNs, managing privacy settings)?
Design a simple user guide for online shoppers to manage their privacy settings effectively.
Describe a recent online shopping data breach and its impact on consumers. What could have been done to prevent it? Topics involving Data Mining and responsible use of consumer information may be considered when analysing such incidents.
How can blockchain or decentralized systems enhance privacy in online shopping?
Describe a recent case of a cybersecurity breach in Australia. The discussion may also draw on concepts from Software Engineering and Database Management Dbms when evaluating security failures and mitigation strategies.