Phoenix
DECO2015 Responsible Design for Innovation Assignment 03 Prepared By: Chanel Li | chli7877 Mingna Zang | mzan8153 Jayden Lee Jian Lin | jlee2621 Ashley Kuan Shu Lin | skua8198
DECO2015 Responsible Design for Innovation
Assignment 03
Prepared By:
Chanel Li | chli7877
Mingna Zang | mzan8153
Jayden Lee Jian Lin | jlee2621
Ashley Kuan Shu Lin | skua8198
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Due to the company's vulnerability and weak security
protection, it provided an opportunity for fraud
organizations to gain control and access to the company’s
database which stores crucial customer data. Aurora was
one of the victims. This caused another problem, Jake used
the stolen data from Aurora to approach Aurora through
messaging and establish an intimate relationship with her.
Aurora had a strong affection for Justin, and Jake’s
behavior made Aurora feel familiar and comfortable. She
fell into this carefully crafted trap setup by Jake. Exploiting
his close relationship with Aurora, Jake kept asking Aurora
for money, and she conceded to Jake’s request regardless of
any conditions. When Aurora was cheated of all her
savings, Jack vanished into thin air.
When the customer’s data is leaked, fraudulent
organizations can use the data to mimic someone’s
information and personality, such as home address, phone
number, and other details. They exploit the data and
commit fraud. Other parties might be keen to purchase
another user’s data for identity theft. Victims may be
cheated out of their money and psychological damage
might be caused.