Alexa: A Pandora’s Box of Risks Case Study Help
Balance between privacy and security
International organizations and the government of respective states are facing issues regarding the protection and defending the interest of national security and the human rights, which primarily include the rights to security and privacy.(Accord, 2019)Amazon’s voice assistants have represented serious issues and challenges, considering the information confidentiality i.e. the concerns regarding the privacy of the children, emailing the conversation of an American couple to a contact, an ease of Alexa’s unintentional wake up function and its compliance with the government to share the customers’ data.
Considering the approaches to maintain the balance between privacy and security; the national security officials of the US government oppose the full encryption by the American technological firms. This is primarily based on the argument that the country would be less safe due to the unavailability of backdoor. Thus, the determination of the approaches regarding the balance are based on the identification of the right solutions that allow a specified visibility level for the detection of malicious activity on the network i.e. a high-level protection of the user’s privacy.
Such approaches mainly include:
Real-time monitoring – For rapid identification and responding to both internal and external threats.
Attribute-based access control – Deals in the provision of authorization requests and data of activity log that can be significantly used to bring an improvement in the protocols of reporting and monitoring.
Customer identity and access management – Focuses on the provision of an improved customer experience through the control of user’s access to services and applications.
Cloud-Native Security–Movement of business infrastructure to cloud, through the incorporation of three pillars:
People: Creation of security and privacy culture through proper training and restricting the needs of security.
Process: Alignment and implementation of common business pro ceduresin order to encourage cooperation and achievement of secure operations.
Technology: Required for an effective management of technical security debt through leveraging the technology for the reduction of attack surface over the organization.
Incident Response Plan –Development of an incident response plan to address the issues of the business, assigning different roles, identification of the key performance indicators for the measurement of event and the implementation of right tools.(Zola, 2018)
Usefulness of AI agents
Intelligent agents are generally considered to be the new paradigms for the development of software applications. The approach of agent-based computing has been hailing as the next breakthrough in the development of software. The use of agents has increased through a variety of applications, which range from small systems like email filters to large, complex, open, mission critical systems like the control of air traffic.
(Wooldridge, 1998)The usefulness of Artificial Intelligence agents has been grouped in the form of PEAS – Performance, Environment, Actuators, and Sensors. (Gupta, 2017)An ideal rational agent is known to have the capability to perform expected actions for maximizing the measurement of performance based on the built-in knowledge and percept sequence.
Conclusion
A number of issues have raised while using of Alexa as reported by its users. Based on the challenges related to the privacy and security issues; the voice assistant management can be significantly done through the consideration of the approaches for balancing the privacy and security. This would allow the organization to monitor and report the performance of the AI products, in an efficient manner..............................
This is just a sample partical work. Please place the order on the website to get your own originally done case solution.