Professional Documents
Culture Documents
Assignment Questions
1. Which of the risks posed by Alexa are the greatest threat to Amazon and Alexa
users?
Alexa required no preface before the "Alexa" wake-up command. The ease of
unintentionally waking up the system posed a threat to privacy as well as personal
and financial security.
Alexa was able to detect sounds outside the range of human hearing. Although the
devices are not meant to handle ultrasound, if anything is put just outside the
human hearing range, the assistant can still detect it.
--Small changes to audio files can lead Alexa to interpret sounds differently than a
human would. These techniques might be attractive to hackers, especially when
owners of Alexa-enabled gadgets have not trained Alexa to respond to only one
person's voice.
if audio files are altered slightly, Alexa may interpret sounds differently than a
human would. These tactics may be appealing to hackers, particularly if the owners
of Alexa-enabled devices have not trained Alexa to recognise only a single voice.
Voice squatting is a technique that could be used by hackers to deceive users into
providing them permission to access their personal data or to listen their
conversations.
--This is achieved by using a skill with a name that sounds very similar to a legitimate
application." Some of them include "Fish Facts" instead of "Phish Facts"; "Car Fax"
instead of "Cat Facts": "Capital Won" instead of "Capital One; and Rap Game"
instead of "Rat Game." Once opened, the skills can cause significant security risk.
2. What could and should Amazon should do to ensure the security of its devices and
its customers’ data? How much responsibility should the company accept when
security breaches occur?
Security and privacy are the two biggest challenges facing the sector as it adopts AI
for its businesses and offers. The industry must overcome these concerns to
expedite client acceptance.
Amazon must take steps to safeguard the security of client information. Technology
will be the most essential instrument for achieving this goal. The technology must
become increasingly resilient so that it cannot be compromised by hackers.
In order to enhance the security of its devices and data, Amazon can also forego
some functions.
Amazon should have a transparent privacy policy that is accessible to users so they
are aware of who has access to their data. This will bring about openness.
They should also distribute a guideline for users to follow in order to prevent security
breaches. In the event of a breach, Amazon can determine the extent to which users
adhered to the standards. Consequently, they can assume liability for the security
violation.
If the users were found to have followed all of the rules, then Amazon must bear
responsibility for the security breach.
3. Some parents and educators are concerned that easy access to Alexa’s AI might
harm children’s development. Should Amazon takes action to address this concern?
Alexa learns from the data it receives. To improve Alexa's performance, more and
more information must be provided to it. In addition to quantity, the quality and
variety of the data being given to the system are also crucial. Therefore, Amazon
should attempt to improve Alexa's ability to comprehend commands by familiarising
it with the accents and dialects of people from throughout the world. Once Alexa is
better able to understand and recognise commands, Alexa’s responses will also
improve.
6. What risk management framework/ risk response protocol that Amazon could use
for the crises related to Alexa?