Projects
PROJECT 2.1: Comparing Security Policy Templates
Search online for “cybersecurity policy templates.”
Read the documents and compare them.
Identify the policy components that were covered in this chapter.
Search for a real-world policy, such as Tufts University’s Two-factor Authentication Policy, at https://it.tufts.edu/univ-pol.
Choose a couple terms in the policy that are not defined in the policy definitions section and write a definition for each.
PROJECT 2.2: Researching New York City’s AI Bias Law
The objective of this project is to research the requirements, implications, and real-world application of New York City’s AI Bias Law in hiring practices and why it was failing after being enacted.
PART 1: Background Research
Goal: Gain a foundational understanding of the AI Bias Law and its objectives.
Research and read articles, official documents, and other credible sources detailing New York City’s AI Bias Law. Focus on understanding the definitions of Automated Employment Decision Tools (AEDTs) and the scope of the law.
Summarize the key elements of the law:
What are AEDTs?
What requirements does the law impose on employers using these tools?
What are the intended outcomes of the law?
PART 2: Exploring Implications and Challenges
Goal: Analyze the potential impacts of the law on employers and job seekers, and identify challenges in its implementation.
Consider the implications for employers in terms of compliance costs and changes to hiring practices. Reflect on how the law affects job seekers, especially those from marginalized groups.
Investigate any reported difficulties or controversies associated with implementing the law. Consider technical, legal, and ethical challenges.
Identify any criticisms or support from various stakeholders including businesses, advocacy groups, and legal experts.
Examine how companies have responded to the law and the real-world effectiveness of such regulations.
Choose one or more companies that have implemented measures to comply with the AI Bias Law. If specific company examples are scarce, consider hypothetical scenarios based on industry standards.
Analyze the steps these companies have taken to audit their AEDTs.
Evaluate the transparency of the published audit results and any actions taken based on those results.
Write a detailed report on your findings, highlighting effective practices and areas where companies may fall short in compliance.
PROJECT 2.3: Testing the Clarity of a Policy Document
Locate your school’s cybersecurity policy. (It may have a different name.)
Select a section of the policy and use the U.S. Army’s Clarity Index to evaluate the ease of reading. (See the “In Practice: U.S. Army Clarity Index” sidebar for instructions.)
Explain how you would make the policy more readable.