As the world continues its digital evolution, more aspects of our lives are dependent on data and digital devices. This shift has required technology manufacturers to emphasize encryption and robust security in their evolving designs. While this pursuit of security is necessary to keep users' critical personal information safe, criminals and terrorist organizations are using these same security technologies to make it difficult or even impossible for authorities to access that data. Law enforcement agencies claim that they need the technical ability to lawfully access digital data, while many technology and privacy advocates hold that authorities should never, under any circumstances, force companies to weaken or circumvent security.<br><br>The conflict between privacy and security is examined in this case, starting with the 2016 legal challenge when, after a mass shooting, the U.S. Federal Bureau of Investigation sought a court order directing Apple, Inc. to create software that would unlock the suspect's iPhone. Although that legal challenge was dismissed, the issues remain live and pressing.
As the world continues its digital evolution, more aspects of our lives are dependent on data and digital devices. This shift has required technology manufacturers to emphasize encryption and robust security in their evolving designs. While this pursuit of security is necessary to keep users' critical personal information safe, criminals and terrorist organizations are using these same security technologies to make it difficult or even impossible for authorities to access that data. Law enforcement agencies claim that they need the technical ability to lawfully access digital data, while many technology and privacy advocates hold that authorities should never, under any circumstances, force companies to weaken or circumvent security. The conflict between privacy and security is examined in this case, starting with the 2016 legal challenge when, after a mass shooting, the U.S. Federal Bureau of Investigation sought a court order directing Apple, Inc. to create software that would unlock the suspect's iPhone. Although that legal challenge was dismissed, the issues remain live and pressing.
This is an MIT Sloan Management Review article. Dozens of markets of all types are in the early stages of a revolution as the Internet and related technologies vastly expand the variety of products that can be produced, promoted, and purchased. Although this revolution is based on a simple set of economic and technological drivers, the authors argue that its implications are far-reaching for managers, consumers, and the economy as a whole. Looks at what has been dubbed the "Long Tail" phenomenon, examining how customers derive value from an important characteristic of Internet markets: the ability of online merchants to help consumers locate, evaluate, and purchase a far wider range of products than they can typically buy via the traditional brick-and-mortar channels. The article examines the Long Tail from both the supply side and the demand side and identifies several key drivers. On the supply side, the authors point out how e-tailers' expanded, centralized warehousing allows for more offerings, thus making it possible for them to cater to more varied tastes. On the demand side, tools such as search engines, recommender software, and sampling tools are allowing customers to find products outside of their geographic area. The authors also look toward the future to discuss second order amplified effects of Long Tail, including the growth of markets serving smaller niches.