Equifax’s Breach of Trust
Earlier this semester, we analyzed and applied ethical challenges from Vallor’s list of the “Ten Ethical Challenges” to the Equifax Data Breach.
For Case Response Paper 3, we will examine the Equifax Data Breach and its impact on trust using another case from Ethics Unwrapped at the McCombs School of Business, University of Texas at https://ethicsunwrapped.utexas.edu/case-studies.
In this case, we will focus on Trust and Privacy issues. Although the security incident itself is an important area to examine, we will delve more into how Equifax and its leadership did not handle many of the trust and privacy challenges well. Framing much of our study using the concept of loss aversion, as well as pertinent ethical theories, we will extend our analysis beyond Equifax to another company.
To prepare for this case, please do the following:
Read over the Equifax’s Breach of Trust web page at https://ethicsunwrapped.utexas.edu/video/equifaxs-breach-of-trust. There also is a PDF download of this entire page. Make sure to watch the case video.
Watch the Loss Aversion Video at https://ethicsunwrapped.utexas.edu/glossary/loss-aversion.
Return to the Equifax’s Breach of Trust web page at https://ethicsunwrapped.utexas.edu/video/equifaxs-breach-of-trust.
Read the Bibliography links at https://ethicsunwrapped.utexas.edu/video/equifaxs-breach-of-trust#video-section-5. There are quite a few hyperlinks to articles here. You can use many of these as resources for the Equifax discussion. However, you will need to find additional articles for responses to questions 5, 6, and 7 in particular.
In Section1 of the paper, answer Discussion Questions 1-4 using supported academic arguments at https://ethicsunwrapped.utexas.edu/video/equifaxs-breach-of-trust#video-section-4.
In Section2 of the paper, answer Discussion Questions 5-7 using supported academic arguments at https://ethicsunwrapped.utexas.edu/video/equifaxs-breach-of-trust#video-section-4.
In Section3 of the paper, answer Discussion Questions 8 & 10 using supported academic arguments at https://ethicsunwrapped.utexas.edu/video/equifaxs-breach-of-trust#video-section-4.
Please note the following:
Make sure to use headings of Section1, Section2, and Section3 in the paper.
Number all responses by question number.
Make sure to answer all parts of each question.
Pay particular attention to key words in the questions. For example some questions require responses within a loss aversion context.
Remember to follow the General Response Paper Guidelines.
Use headings and sub-headings to organize your paper. At a minimum, we need three (3) section headings and each question number should be a sub-heading. This is in addition to an Introduction and Conclusion section for five (5) total headings.
Requirements: 1000 only the answers
Case Response Paper Guidelines and ParametersCase Response Paper RationaleEach paper focuses on an ethical dilemma involving information technology and/or cybersecurity. In these papers students will be asked to develop supported arguments to answer various questions or situations using a rational, systematic analysis of the conduct presented in each case.Some of the papers will require students to use specific ethical theories (e.g., social contract theory) and others will permit students to choose which theory to use when analyzing the case. By crafting ethical responses to difficult scenarios, students will develop ethical stances concerning the various cybersecurity challenges they may encounter. Case Response Paper ApproachLeading up to each paper, we will discuss topics that provide the background that enables us to expand, extrapolate, and apply analysis to the particular case topics. Guided by these discussions, students will be asked to answer questions using supported academic arguments. These arguments will include propositions needed for an argument, such as premises to include grounds, warrants, and backing (Quinn, App. B). Make sure to review how to construct valid, supported arguments in the textbook.Case Response Paper Guidelines1 of 3
General Guidelines•Four (4) times throughout the semester students will be assigned a case response paper that will enable them to research, examine, and apply concepts and techniques that we have covered in class.•The case response paper must:◦Meet 1000 words at a minimum. If a paper is over 1250 words, contact the instructor for guidance. This does not include references.◦Use numbered headings and sub-headings (e.g., 1.0, 2.0, 2.2) to organize the content. In case responses with numerical questions, please use the question number as a heading.◦All case response papers must have an Introduction and Conclusion section.◦Use 2.0 spacing.◦Use a standard 12-point font. Serif, sans-serif, or monospace font family. Cursive or fantasy font families are not acceptable.◦Use American English spellings (color versus colour, or realize versus realise).◦Cite at least eight (8) sources. News coverage of the case can be cited, but the majority of sources should contain academic and/or technical resources. These can be found at https://libguides.wmich.edu/cybersecurity ◦The textbook can be cited, but does not count as one of the eight (8) minimum references.◦Be submitted as a properly-named PDF file.•All references—both in text and the references list—must be in APA format, 6th edition. (APA 7th edition also is OK.)Not meeting the above guidelines will result in a point deduction.Case Response Paper Guidelines2 of 3
Writing AssistanceIf writing is challenging, consider visiting the WMU Writing Center:https://wmich.edu/writingcenter / They have both in-person and virtual appointments: https://wmich.mywconline.com/After students set up an account they can schedule appointments. The Writing Center can also be contacted via email (firstname.lastname@example.org) or phone (269.387.4615).A well-written paper is important if students wish to receive a passing evaluation.Response Paper DeliverableFor each response, turn in a PDF document (.pdf). The response should be at least 1000 words (not including references). Please include a cover page with name, classID, date, topic, and paper#. For example:Bubba Jonesbjones424210/08/2021Digital DownloadsCase Response Paper 1Each file should be named using the student’s classID and response paper number:bjones4242CaseResponsePaper1.pdfBefore the due date, students need to upload their paper into the eLearning environment under the dropbox and submit it for evaluation.Please refer to the syllabus for due date policies.Sample APA CitationUtter, C. J., & Rea, A. (2015). The “Bring Your Own Device” Conundrum for Organizations and Investigators: An Examination of the Policy and Legal Concerns in Light of Investigatory Challenges. Journal of Digital Forensics, Security & Law, 10(2), 55–72. https://doi.org/10.15394/jdfsl.2015.1202 Case Response Paper Guidelines3 of 3
Equifax’s Breach of Trust