Question Description

I’m studying for my Computer Science class and need an explanation.


In response to your peers:

  • Discuss whether or not you agree with your peers’ perspectives on informed consent and personal data usage.
  • What advantages and disadvantages does widespread data sharing offer society?


The pillar of the CIA triad informed consent falls under is integrity. The Internet of Things (IoT) consists of many devices embedded with sensors and software exchanging and sharing data with network components across the internet. Consent is agreeing and accepting vendors’ terms and conditions before downloading or using their product and, in most cases agreeing to accept any risk.

I believe I can provide informed consent when accessing a smart device and application. The information must be something I understand, or in a language and at a level I can understand, including security and safety. It is good to understand the terms provided before accessing a smart device or apps.

As data breaches become more common and more severe, consumers are sensitive to providing their personal information and more concerned about how businesses use or share it. The organization certainly benefits from maintaining trust, reputation, loyalty, and brand value to secure customer’s data and value individual privacy rights. As more and more folks rely on IoT for business purposes, there is a higher risk of getting compromised and your data getting misused. IoT devices are less secure and more vulnerable because of the lack of frequent software updates and advanced security features than corporate network devices. The most secure way to segment IoT devices is by creating a dedicated VLAN, making it virtually impossible for the IoT devices to affect the rest of the network. With a dedicated VLAN, you can also monitor the IoT segment for questionable activity and remove access to suspicious devices.


Internet of things (IoT) is any physical object that you connect to the internet and also a collision of physical systems and information systems as explained by NIST video. Internet of things as explained by Oracle describes the network of physical objects – “things” – that are embedded with sensors, software, and other technologies to connecting and exchanging data with other devices and systems over the internet. The pillar of the CIA triad that “informed consent” falls under is integrity. As many of our devices are connected via the internet from our smart devices to our refrigerator to our vehicles, our data and technological identity is being shared across the spectrum of different networks. We, as customers, are placing our trust within these companies to play an integral part in protecting our identities and valuables from sharing our data and information from the “outside world” despite providing our authorization or agreement in using IOTs.

As a user, I do feel like I can provide informed consent when accessing a smart device. Nowadays most to all applications are bounded to providing consent to be able to access that particular application. Without these consents, there will be less functionality in using the applications or any other devices despite the potential risk. That is why it is important to do some research to determine the legitimacy of anything that works over the internet and also identifying whether that application or device is needed.

From the perspective of an IT professional, the kind of responsibility organizations needs to have in protecting or sharing collected personal data is ensuring to their customers that their information will only be used within the organization and no information will be made available without first reaching out to the individual. Organizations need to ensure that they have security measures and information technology policy and procedure in securing all of their customer’s privacy and database. Since IOTs are connected through our daily lives, it is very difficult for organizations to be able to track customers’ devices, but it is possible as many applications and devices require some sort of connection to a smart device such as phones or tablets, and computers. These steps allow individuals to create an account with a username and password and sometimes provide an additional step for a two-step authentication which does help organizations in protecting collected personal data. When it comes to organizations sharing data, it comes down to integrity with the CIA triad in protecting collected personal data from unauthorized people. Making sure the personal data is not changed or altered.

Do you have a similar assignment and would want someone to complete it for you? Click on the ORDER NOW option to get instant services at

Do you have a similar assignment and would want someone to complete it for you? Click on the ORDER NOW option to get instant services at We assure you of a well written and plagiarism free papers delivered within your specified deadline.