The Launch Cable Case Study

Improved Essays
The unauthorized disclosure of personal data became a particularly widespread problem in Ecuador. Criminal gangs were sold personal information, including credit card information. No one notices these frequent crimes because of the relatively small monetary, until the local news shocked the public.

There are electronic communication technologies, consist of five dimensions, social presence, media richness, asynchronicity, permanence, and spreadability. For the Launch Cable case, there are three aspects continuing to the widespread problem, including social presence, media richness, permanency, spreadability.

Media richness is a theory that described the capacity a communication medium can carry information. (Alberts, Nakayama& Martin,
…show more content…
Social presence refers to people experiencing psychological feelings of closeness or immediacy during interactions. (Alberts, Nakayama& Martin, 2007) While selling the private data, the law-breaking employee could conceal their identity easily since the medium was lean as mentioned before. The medium could not carry their personal information. Also, the medium they used is low in social presence that lack of personal touch. The basic, obvious traits about nature and cultural character, which were accustomed to in the physical world, were absent (Donath, 1999). The information of the wrongdoers was not included or evident that could trace back to them. They could deny responsibility when the crimes were discovered. These characteristics of electronic communication technologies eased the employees’ fear of getting caught by the authority. Hence, the unauthorized disclosure problem became particularly widespread.

According to Jenkins, Ford and Green (2013), spreadability refers to the media make some kinds of content circulate easier than other media, the attribute of the circulated information interesting enough that people exchange it. The concept can apply in the Launch Cable case in two ways. First, in the case, the customer database was stored in a computer system, which had high spreadability. This medium could induce employees to copy the documents, and resulted in many copies being produced and spread
…show more content…
Permanency of a medium expresses whether a message can easily be stored in a permanent way. Documents can either store digitally or in hard copy. In the Launch Cable case, whether the company chose to store the data digitally or keep a hard copy of them, either way the employees could always have access to the information. Even if the company wanted to destroy the data, any employees could have had a copy themselves on the sly. Once information or pictures are up online, even for a short period, there is no telling that who made a copy or copies of them and where they might be exposed (Kendall, 2008). Inappropriate activities towards this kind of confidential information will lead to unintended audiences. The employees, who could access the data readily, could have easily stored the clients’ personal information to any device any time. Then they could make use of the data whenever they wanted to. We can see from the case, ‘all Juan had to do was copy the data to an Excel file…’ that it was not difficult for the Launch Cable staff to store the data in other means. In this way, the customers’ personal information could be stored permanently. This effortless practice fostered the

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The book Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis has often given me the impression that this book was intended to warn its audience of the many dangers of technology, and that the benefits of using technology are not worth the risks. The book’s third chapter, “Ghosts in the Machine,” however, was different, because I noticed that the authors were just giving information about things that computers do that people may not realize, but not necessarily implying that all of these abilities are dangerous or harmful. For this reason, and for many other reasons, I enjoyed reading this chapter of Blown to Bits more than I have enjoyed reading any other chapter so far. The first topic discussed in this chapter left me with feelings of both concern and relief.…

    • 871 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Presently, electronic media remains unavoidable (Tuning in to Electronic Media, 2011, p.1). We live in an interconnected world with society having a variety of means to communicate and stay connected to one another locally and globally. In addition, electronic media can reach people by the masses. For instance, electronic media notifies the public about world news, advises us of local news and events, provides entertainment, recommends products and even warns the population about potential dangers. Advertising, a major component of electronic media plays a huge role in the U.S economy (Advertising, 2011, p.129).…

    • 817 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Blown To Bits Analysis

    • 346 Words
    • 2 Pages

    Blown to Bits Chapter 2 showed us how private the digital world is. Headline spoke upon different types about privacy around the globe. The main topic was Radio Frequency Identification Tags (RFID). The topic entirely went into detail about how it knows almost everything about a person or company. This Chapter reveled benefits, effects of technology being in our private lives and the change it has had on our society as a whole.…

    • 346 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Paper 1 – USF Infrastructure The video describes the core of the University of South Florida infrastructure that is two redundant devices that provides 100Gbps and 10Gbps connectivity to the distribution layer devices. Cat 5e or Cat 6 wires are used for connections throughout the campus. The computers are on the edge of the network meaning they are the closest to the user. The wires are connected to the network by a patch cord going into a wall outlet that then leads into a wiring closest that is call intermediate distribution frame or IDF, which serves as an aggregation point of the network.…

    • 762 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This arrest of Raul Gutierrez is a successful example of intelligence sharing among different countries. In this case Colombia, Spain, and the United States worked together to combat a terrorist threat. Terrorism and cybercrimes are worldwide threats that affect many nations and businesses. Intelligence sharing between government and even businesses can have huge benefits in combating against sector threats and allowing for demolishment of these threats. If communities share openly in their sectors, threat actors may have a harder time breaching companies because of defense mechanisms put in place from shared intelligence and therefore current threat plots are more likely to fail.…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Modern life today has made people look at their lives with a different eye. They require more in life, and one of the greatest needs is an entertainment. Today, in the context of globalization with the outstanding development of science and technology, there are many information technology services which are created to meet the increasing demands of the people. Among the most important achievements that humanity achieved in recent times, the development of media technology is an amazing phenomenon and has the most powerful impact. One of the leading services is the mass media.…

    • 1442 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In today’s society, we are exceptionally technologically advanced. With things such as internet, computers, cell phones, ATM’s, Genome mapping, DVD’s, and one hundred and fifty channels on television to keep up to date and in the know; we are advanced in many areas such as education, medicine, and communication. However many believe that our desire to live a lifestyle complete with the latest technology symbolizes a wave of materialism through our nation.…

    • 536 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Impact of Symbolic Interactionism on Self Identity As one interacts with the world, they are bound on change their behavior based on the meanings they give to the social interactions. The things that individuals perceive as reality are socially constructed because they are derived from the communications and interactions of individuals. In the past, the face-to face encounter was the main mode of communication that shaped the behavior of individuals. In the modern world, the impact of face-to-face encounters as not as much because there are other modes of communication where people interact.…

    • 1202 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Capitalism Influence Paper

    • 1391 Words
    • 6 Pages

    How has Capitalism contributed to and shaped the rise of the surveillance society? From the watchful eye of the omnipresent CCTV camera to the tracking ability of smartphones, surveillance, in the modern era, is an inescapable aspect of life. Arguably, if not for the dominant role Capitalism plays in the modern world, surveillance would not have been able to progress as rapidly or to have become so societally acceptable. In particular, two main characteristics of Capitalism, commodification and consumerism, have contributed greatly to the rise of the surveillance age.…

    • 1391 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Persuasive Speech When you hear the term “Organized Crime”, what is some of the first thoughts that pop into your head? According to Calderón, “Organized crime” is briefly described as an illegal act committed in exchange for some kind of profit (Calderón, 2015, p. 52-53). Since organized crime affects citizens directly and indirectly, normally a topic that is skipped over when brought up in the news or discussion. By presenting information about the history, the wealth, the government’s view, and real life examples of organized crime, it will show the reader how big of an impact organized crime actually makes in society and everyone’s daily lives.…

    • 619 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    We might detest how technology can track our daily lives in ways that might be deemed as unethical to many of us. Yet, when it comes to the greater good technology does definitely aid. Looking back into history, the development of a variety of technological devices have improved our security. CCTV footage helps immensely with surveillance; it helps identify individuals, deter robbery and produce a safe environment for society. In addition, digital footprints while collected without our consent inevitably helps locate and single out individuals that have malicious intentions.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Marshall McLuhan, Understanding Media: The Extensions of Man. McGraw-Hill, 1964. Reviewed by Kayla M. Piper, Pittsburg State University, KS. Medium Is the Message, a part of the book Understanding Media, is a critical evaluation and interpretation of Media Ecology, a communications theory.…

    • 1143 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Digital Privacy Case Study

    • 1089 Words
    • 4 Pages

    “Yesterday afternoon, I went to the White House and asked the President to be allowed, for personal reasons, to resign from my position as Director of CIA, David H. Petraeus”. Since the Director of the Central Intelligence Agency was not able to keep his personal digital content private, can anyone expect their email to be protected from law enforcement without a warrant? Why should anyone have to face such embarrassment about their personal life when it’s not affecting their career? Whether there’s enough protection against obtaining someone information has always been a huge debate with digital privacy. Finding that the director of CIA was having an affair can be seen as a small offense, but what if information was obtained showing that he has been…

    • 1089 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    “Some dismiss [communication studies] as “fluffy,” or easy” (Frierson, 2012). However, people seem to not understand that a communication studies program can prepare you for a variety of careers. Frierson (2012) states, “In fact, the U.S. Bureau of Labor Statistics lists more career opportunities for communications graduates than any other major, including computer science, engineering and mathematics.” “Communication Studies is a broad discipline that covers rhetorical theory from the ancient Greeks to the latest in digital media.…

    • 1144 Words
    • 5 Pages
    Superior Essays