...Background We have been hired by Gaby Darbyshire Gawker Medias president and chief operating officer to analyze their new blog site preggers.com and their magazine titled Teen Pregnancy. Gawker wants to see if this site will be a successful business decision. We have already put it up in a focus group and it has already stirred up a lot of anger among a few and others thinking it will be a good idea. We think it is a good business decision in with making this an actual website. The amount of attention that it got already says that it will be a success because it will generate profit from the amount of clicks you will have on the site. Many will go on to criticize and ridicule the site and others will go on to give tips on how to handle pregnancy. Gawker will need: * The right structure. * teams of analyzers, * the right technology, * And the right control over the site for it to be a success. With the way Gawker is and how all its other sites are set up; with their “snarky” attitude with the whole thing. They should do the same to this site as well. Even though that many different media groups such as MTV, TLC, and Oxygen have teen shows that express the teen life and their issues; Gawker will still have a success rate because the shows only have a “reality” based show. Now everyone knows that teens do get pregnant either by choice or not. This site will generate a lot of pop in the media world. Gawker is a network business with many internal structures...
Words: 1046 - Pages: 5
...I agree with the statement because as a society putting up with disagreeable speech this gives journalist ideas on what is going on in the world and getting the right story will eventually fall into place. This being called better speech as a journalist getting more out there can educate many people and make the story more interesting so people are dialed in to make a big headline. People do have free press to write or share a certain topic and Gawker did do that with stories not even thought about or forgotten. Some of his stuff being very hilarious, it was very wrong to expose Hulk Hogan the way he did being a role model to so many people Hulk Hogan truly is an american hero. While watching this documentary it shocked me as a fan, definitely...
Words: 252 - Pages: 2
...“IPad’s” Security Breach BUS 508: Contemporary Business August 16, 2011 Strayer University Dr. Robert L. Kight Assignment 4: iPad’s Security Breach This document will attempt to discuss hacking into a Web site. Is it ever justifiable? The document will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. The document will discuss whether it is important for organizations like Gawker Media to be socially responsible. It will determine factors CEOs should consider when responding to a security breach. Finally, it will create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue and state the rationale. Apply your theory to a real-world case in which someone hacked into a system, including the name of the company and details. As I attempt to discuss this assignment, I could not avoid thinking about the age-old opinion that Apple products were unique, and that they were protected against criminal encroachments. As such, Apple became one of the hottest technological innovations in the industry. Today, like most other such technology, Apple is becoming increasingly vulnerable to intrusion. It is becoming a medium for posing threats to an entire corporate network as well as devices for official and unofficial use. My answer to this question is twofold. In other words qualification of any kind for such conduct must be based...
Words: 1981 - Pages: 8
...iPad’s Security Breach Samuel D. Brown Dr. Daniel Frost Contemporary Business - BUS508013VA016-1116-001 August 21, 2011 Security and ethical issues has become very common over the past couple years. Recently we have seen an increase in e-crime. Boone and Kurtz (2011) states that “Computers provide efficient ways for employees to share information. But they may also allow people with more malicious intentions to access information. Companies may install firewalls, use encryption software, and passwords. But as fast as software developers invent new and more elaborate protective measures, hackers seem to break through their defenses. Thus, security is an ongoing battle” (pg. 509). A great example of this is the group call “Anonymous”. They have successfully hacked into a number of companies and government agencies. They also have plans to takedown or hack in to the most popular social website, Facebook. Determine if hacking into a Website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. Over the years we have heard of individuals hacking into computers, but in the last couple of years we are seeing more and more websites being hacked into. If an individual can get convicted and arrested for breaking into a department store and taking complete control of it or even robbing a store or department store a person that hacks into a company’s website should get the same treatment...
Words: 2401 - Pages: 10
... IPAD’S SECURITY BREACH Abstract Across the globe AT&T is known as the world’s leading integrated companies-applying innovative technologies to discover, develop and complete construction of the first transcontinental broadband-communications network. This paper will investigate and discuss some of the major issues involving Apple’s security breach. First determine if hacking into a website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. We will create a corporate ethics statement for a computer security firm that would allow or even encourage activities like hacking. Secondly discuss if it is important for organizations like Gawker Media to be socially responsible; determine what factors CEOs should consider when responding to a security breach. Lastly, create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue IPAD’S SECURITY BREACH Determine if hacking into a website is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. According to Bosker (2010), recently, private information of iPad owners have been exposed through a security breach that has brought major embarrassment to Apple Company. Because of the said incident, it was speculated that buyers of the cellular-enabled tablet are...
Words: 1991 - Pages: 8
...IPad’s Security Breach Apple successfully sold its first iPad on June 4th, 2010 and within days a security breach was announced. Hackers from Goatse Security firm tracked down about a 100,000 email ids of new iPad owners which included government officials, politicians, journalists, and other important famous people (IPad Security Breach, 2010). The question now arises is that what are the reasons that forced Goatse Firm from hacking into AT&T’s website? Goatse Security officials shared the email addresses and network ID’s to Gawker Media, LLC, after they informed AT&T and the vulnerability was closed (IPad Security Breach, 2010). Some expressed little concern over the security breach stating that it was “only email addresses” and not personal or financial information. The FBI doesn’t concur. AT&T responded quickly and has worked to mitigate the damage (FBI Investigating iPad Breach, 2010). Goatse’s Firm Objectives The following objectives might help us explain the possible factors that lead to the hacking of the AT&T’s website (Elinor, 2010). • The Goatse Security tricked the AT&T site into disclosing the e-mail addresses by sending HTTP (Hyper text transport protocol) requests that included SIM card serial numbers for iPads. This was because it contained serial numbers called ICC-IDs (Integrated circuit card identifiers) that are generated sequentially which helped the researchers to track down 1000’s of ids. • According to the AT&T spokesman the attack would allow...
Words: 1158 - Pages: 5
...website Gawker had its database hacked by a group called “Gnosis.” It was confirmed that more than 1.3 million accounts were hacked for usernames and passwords. Gawker also operates other websites such as, Lifehacker and Gizmodo, and usernames and passwords were stolen from there as well. A security firm, Duo Security, came in and did an analysis of the hack. They found out that many of the passwords were very easy to guess with passwords such as 12345678 and letmein. Duo Security brute-forced 400,000 password hashes of the 1.3 million stolen by Gnosis and 200,000 of them were cracked in less than an hour. Other interesting things that Duo Security found out were that 99.45% of the cracked passwords were only alphanumeric and did not contain any special characters or symbols. There were a few ways that this hack could have been prevented. The first would be to require the users to have a password with at least 8 characters and have upper case and lower case letters, numbers, and specials characters or symbols. This would deter the cybercriminals from trying to hack the website because it would take much longer and they would need a more powerful computer. Another control that could have been used would be to have the account lock out after so many incorrect tries of the password. This would make it much more difficult for the hackers to keep trying different passwords. The last thing I think they could have done was upgrading their encryption. Gawker used a 56-bit...
Words: 318 - Pages: 2
...The Escalation of Gamer Gate The Gamer Gate controversy is a polarized debate that occurred between many individuals, many of whom are associated with the video game industry. Initially sparked by feminist criticisms of video gaming, Gamer Gate eventually escalated into a fiasco of hateful tirades, threats, and violence. In this paper, we hope to illuminate the factors which contributed to Gamer Gate evolving into its final form and Gamer Gate’s ultimate impact onto the industry that birthed it. To objectively describe the components of this extremely polarized conflict, we must sift through the bountiful amounts of opinionated material related to the matter, until we can depict Gamer Gate’s progression in an unbiased manner. What is Gamer Gate? The phrase Gamer Gate can refer to multiple things. The overall controversy known as Gamer Gate, in essence, is a polarized debate that began with criticisms of the videogame industry's misogynistic culture. In response to these claims, individuals amassed under a Twitter campaign of the same name to slander critics of the videogame industry and those that spread those claims. Eventually, slander became threats and these threats metamorphosed into a fiasco of indistinguishable muckraking that shook the video gaming industry to its core. Advocates of Gamer Gate and its crusading supporters rally against a supposed unethical reporters. They engage in a variety of extreme actions against anyone or anything they deem to be...
Words: 5257 - Pages: 22
...Goatse Security By Derek Peacock 5-28-11 Strayer University The Business Enterprise Instructor: Alan Tillquist Abstract In this paper, I plan to determine if hacking a Web site system is justifiable and explain why Goatse Security hacking of AT&T was. Then, explain why IT Hack Solutions, a computer security firm would encourage hacking. Next, I plan to discuss why and how companies like Gawker Media are socially responsible for finding threats. Third, I plan to explain how CEOs should respond to security breach in the IT network. Finally. I will write an email by AT&T to customers explaining informing, the security breach and what was done to correct the issue. Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. Yes, there are justifiable means for web site and network system to be hacked. Hacking is both a science and an art what isn’t taught by colleges. Companies that are hacked can suffer significant losses, and their customers made vulnerable to other crimes, privacy violations, and unwanted contact. However when a company wants to get business or show off skills then, hacking is like building a resume. Once hackers have proven themselves, they can show off their resume to both government and corporation for business. For example, the AT&T and Apple IPad hacking by Goatse Security was justifiable for three reasons. One...
Words: 1126 - Pages: 5
...examples of weaknesses with the prevention efforts and some of them are as follows: old software or software that has not been patched, default passwords that are poorly chosen, disabled security controls and web servers with poor configuration, just to name a few (Sabadash, V. 2004). With this assignment, I have reviewed some information regarding the security breach of Apple/AT & T’s IPad. The information has influenced my opinion of the questions to be answered. This paper will give my thoughts as to whether or not hacking into a web site is ever justifiable, create a corporate ethics statement for a computer firm that would allow or even encourage activities such as hacking and discuss if it is important for organizations like Gawker to be held socially responsible. Based on the incident with Apple’s IPad, I...
Words: 1664 - Pages: 7
...iPad’s Security Breach Samantha Phillips Dr. Prakash G. Menon BUS 508: The Business Enterprise May 29, 2011 Justifying Hacking into a Web site In 2010, McDonald’s said that customer information was exposed after a security breach involving an email marketing managing firm. McDonald’s released a statement explaining that information was obtained by an “unauthorized third party”, but added that financial information and social security numbers were not part of the data accidentally exposed. (Security Magazine, 2010) A security breach exposed iPad owners including dozens of CEOs, military officials, and top politicians. They, and every other buyer of the cellular-enabled tablet, were vulnerable to spam marketing and malicious hacking. The breach, which came just weeks after an Apple employee lost an iPhone prototype in a bar, exposed the most exclusive email list on the planet, a collection of early-adopter iPad 3G subscribers that includes thousands of A-listers in finance, politics and media, from New York Times Co. CEO Janet Robinson to Diane Sawyer of ABC News to Mayor Michael Bloomberg. It even appears that White House Chief of Staff Rahm Emanuel's information was compromised. In fact, it is believed 114,000 user accounts were compromised, although it's possible that confidential information about every iPad 3G owner in the U.S. has been exposed. (Tate, 2010) Earlier this year, the names and e-mails of customers of Citigroup Inc. and other large U.S. companies...
Words: 3288 - Pages: 14
...iPad’s Security Breach Zul-Jalaal Abdullah Strayer University Shelby Oaks campus Business Enterprise-508 April 21, 2011 Dr. Carolyn Tippett Discuss Goatse Security firm possible objective when they hacked into AT&T’s Website. Here’s what happened: Goatse Security discovered a rather stupid vulnerability on the AT&T site that returned a customer email if a valid serial number for the iPAD sim card was entered. (Arrington, 2010, para. 2). An invalid number returned nothing, a valid number returned a customer email address. Goatse created a script and quickly downloaded 114,000 customer emails. It was then turned over to Gawker, after, they say, AT&T was notified and the vulnerability was closed (Arrington, 2010, para. 2). Gawker published some of the data with the emails removed. Stated Goatse: “All data was gathered from a public web server with no password, accessible by anyone on the Internet. There was no breach, intrusion, or penetration, by any means of the word. ”(Arrington, 2010, para. 2). AT&T is characterizing the incident as “unauthorized computer “hackers” maliciously exploited a function designed to make your iPad log-in process faster by pre-populating an AT&T authentication page with the email address you used to register your iPad for 3G service (Arrington, 2010, para. 3). ”We don’t see much hacking here, and we don’t see anything really malicious (Arrington, 2010, para. 3). AT&T was effectively publishing the information on the open...
Words: 1778 - Pages: 8
...IPad Security Breach Kimberly Parker Dr. Brenda Harper The Business Enterprise- BUS 508 Strayer University May 25, 2011 Hacking a Website A group of expert hackers breached Eidos Montreal website which disclosed information of more than 25,000 email addresses along with more than some 350 resumes dated May 13, 2011. The details of the incident were reported by the company as "Square Enix who could verify that several hackers gained entry to portions of Eidosmontreal.com website along with several of the merchandise locations. Our company immediately removed the sites to further investigate the incident of what other information had been compromised. After a lengthy and thorough investigation, our company began to take the necessary precaution to safeguard the safety of these and of all our websites, before permitting the sites to go on-line again"(Square enix confirms data lifted in website raids • the register ). Nonetheless, data related with online e-commerce transactions and credit cards was available but not associated with the website. Similarly, many applicants have applied for recent job openings at the studio, their resumes were also stolen, revealing educational background, home address and contact numbers. However, the organization claimed that only email addresses were stolen. The businesses did however, verified that individual email addresses were also taken. However, the organization...
Words: 1946 - Pages: 8
...barbaric. We’ve moved passed them, having figured out more humane ways to deal with crime. Why, then, the resurgence of public shaming, namely the mainstream acceptance of the “dox,” which, in its purest form, is the digging up of a target’s personal information—name, phone number, address, Social Security number, familial relationships, financial history—and exposing it online to encourage harassment from others? This practice has gradually been popularized by Anonymous, the amorphous collective of trolls and “hacktivists” that alternately terrorize tween girls and disable government websites. In 2012, this practice was broadly adopted by media outlets. In October, Gawker unmasked a creep, notorious for facilitating the sharing sexualized images of women (underage and otherwise) taken without their consent. Gawker declared him “the biggest troll on the web.” Its sister blog Jezebelcalled for the naming of names of such creeps, and later exposed a bunch of teenage Twitter users making racist remarks about Obama, going so far as to personally alert the administrators of their schools by phone. This trend runs silly, as well—Buzzfeed ridiculed spoiled teens whining about their Christmas presents, while every media outlet covered Nice Guys of OK Cupid, a blog that ridicules clueless misogyny by sharing photos of hapless bros with regrettable stances on gender politics. Prepare to see a lot more of this sort of thing now that Facebook has released its Graph Search tool, which makes...
Words: 1468 - Pages: 6
...Native Advertising: Media Savior or Just the New Custom Campaign? Publishers and Marketers Seek Solutions Beyond the Traditional Display Ads By: Jason Del Rey Published: October 29, 2012 If you're having trouble seeing past the glare emanating from some of your favorite websites these days, it might be the "new" shiny monetization method that carries one of the following labels: native advertising, custom content, sponsored content, branded content, content marketing or perhaps the very latest: collaborative content. While there are varying definitions of each, the underlying thesis beneath them all is that web readers, viewers and social-network users are more likely to respond positively to marketing tactics that don't look like advertising and instead take the form of the rest of the content on the website or platform. On Twitter, that means promoted accounts and tweets; on Facebook, sponsored stories. And on media properties, that amounts to written, video or image-rich posts that look a lot like the editorial content on the site and which would make proponents of church-and-state divides between advertising and editorial departments cringe. Mercedes ad complements its content on TheAtlantic.com But whatever form these content-centric marketing products take, the rush of media companies looking to invest in them tells you one thing: They believe a sole reliance on display ads isn't the best way to turn, maintain or grow profits. The question, though, is whether...
Words: 1611 - Pages: 7