Overview
Per the IBM terms of use contract, if IVK were to lease Watson Analytics and then terminate the contract, all previously entered data would be lost. IBM’s policy is to destroy the data when the contract ends. (IBM, 2015, October 10) This poses valuable data loss to IVK if the company decides to eliminate some or all user accounts. The risk of data loss becomes greater the longer the firm utilizes Watson services and with each department’s implementation of Watson Analytics, making switching vendors more challenging and less rewarding should it be necessary in the future. Considering the recent loss of 3M USD before ending the relationship with vendor Netifects, IVK should take extreme caution before committing to Watson Analytics and be sure to fully investigate its application toward IVKs business goals before importing massive amounts of data and be sure to store source data separately.
Privacy
Implementing Watson Analytics behooves IVK to be critically aware of unauthorized access to data. Utilizing Watson Analytics in human resources, marketing, and sales as suggested, requires particular attention to the personal data of employees and customers that may be entered. The greater risk of powerful analytics is precisely what makes Watson Analytics powerful-- when its cognition framework results in “the automatic data linkages between seemingly non-identifiable data” (Cavoukian, A., Stewart, D., & Dewitt, B., n.d, p.5) that actually provides a profile of an individual. When data sets are linked together, they may reveal patterns in “lifestyle, consumer habits, social networks...even if no single data set reveals this personal information” (p.5). By the nature of the Watson cognitive question-answer model, such linkages are likely to occur. As IVK is likely to benefit strategically from reviewing spending habits of customers and work habits of employees, for example, even if IVK attempts to protect personally identifiable information, decisions regarding the extent to which personal data will be analyzed is essential to limit risk at the entry point. Even basic directory information can be combined with other data to identify someone’s home and just an email or IP address is sufficient to identify consumer habits and social networks. IVK needs to determine how much information they want to collect, analyze, and store in the cloud as “these risks can include reputational harm, legal action, regulatory sanctions, disruption of internal operation and weakened customer loyalty – all of which can result in revenue and profit losses” (p.5). Other examples of privacy risk include unauthorized disclosure and loss or data theft. If IVK elects to engage in nudging, “the use of identifiable data to profile individuals in order to analyze, predict and influence their behavior,” (p.5) for marketing and sales purpose that may be viewed as invasive by some clients. Lastly, IVK must be cautious not to violate privacy agreements via secondary use of data. “In general, [IVK] can only use individuals’ personal information for the purpose(s) identified at the time they collected the information with the person’s consent. Using that information in analytics may be considered a secondary use and unless the individual gave express consent, that can be seen as a breach” (p.5).
Security
Risk v. Benefits
Should IVK determine that privacy risks associated with Watson Analytics fall within the firm’s ethical standards, the immense return expected after implementing the system justifies its use. While some customers may find the linkage of datasets painting a portrait of IVK clients, the practice of analyzing consumer behavior is widely used by data scientists across consumer industries (Golbeck, 2013, 3:18). The same data mining that allows stores to predict consumer behavior and personalized advertisements can allow IVK to identify potential loan customers. Advanced analytics would even allow the firm to predict potential clients’ ability to pay (Watson Analytics, n.d.), eliminating other risks. Security vulnerabilities associated with Watson Analytics are not solely risks to the company through the analytics system. Other web-based applications used by the bank such as customer online banking accounts are also vulnerable to encryption-based attacks and user-error. Some of the value brought in by Watson Analytics should, of course, be applied toward security expansion in order to mitigate risks associated with opening additional ports and managing additional server space and firewalls, particularly in the aftermath of the security breach from previous bad patches between systems.
References
Cavoukian, A., Stewart, D., & Dewitt, B. (n.d.). Having it all: Protecting privacy in the age of analytics. Retrieved from http://www2.deloitte.com/content/dam/Deloitte/ca/Documents/Analytics/ca-en-analytics-ipc-big-data.pdf
Golbeck, Jennifer. (2013, October). TedX MidAtlantic 2013. The curly fry conundrum: Why social media “likes” say more than you think. Retrieved from http://www.ted.com/talks/jennifer_golbeck_the_curly_fry_conundrum_why_social_media_likes_say_more_than_you_might_think/transcript?language=en
IBM. (2015, June 6). Security bulletin: Vulnerabilities in IBM Java Runtime affect Watson Explorer, Watson Content Analytics, and OmniFind Enterprise Edition (CVE-2015-0138, CVE-2014-6593, CVE-2015-0400, CVE-2015-0410). Retrieved from https://www-304.ibm.com/support/docview.wss?uid=swg21700625
IBM. (2015, June 26). Security bulletin: Vulnerability in Diffie-Hellman ciphers affect Wastson Explorer, Watson Content Analytics, and OmniFind Enterprise Edition (CVE-2015-4000). Retrieved from https://www-304.ibm.com/support/docviews.wss?uid=swg21960236
IBM Knowledge Center. (n.d.). Security in IBM® Watson Content Analytics. Retrieved from http://www-01.ibm.com/support/knowledgecenter/SS5RWK_3.5.0/com.ibm.discovery.es.ad.doc/iiysasecure.htm
IBM Watson Analytics. (2015, October 10). IBM Watson Analytics security frequently asked questions (FAQ). Retrieved from https://community.watsonanalytics.com/wp-content/uploads/2015/10/IBM-Watson-Analytics-Security-FAQ-10202015.pd
IBM Watson Analytics. (n.d.). Easy analytics for finance. Retrieved from http://www.ibm.com/analytics/watson-analytics/finance?watsonanalytics=true&cm_mmc=WAMicrositeOrganic--C24803SW&S_TACT=C24803SW
Gallaugher, John. (2015). Information systems: a manager's guide to harnessing technology, v. 2.0. Available from http://catalog.flatworldknowledge.com/bookhub/reader/12375?e=fwk-38086-ch12_s02#fwk-38086-chab
Victor. (2015, March 4). FREAK attack. [Infographic]. Retrieved from http://blog.gsmarena.com/new-freak-ssl-exploit-may-major-threat-online-security/
Zariga Tongy. (2015, May 20). Logjam tls vulnerability. [Videofile]. Retrieved from https://www.youtube.com/watch?v=87s1nkATfzk
No comments:
Post a Comment