Ch04 Baltzan
Ch04 Baltzan
TWO
ESSENTIALS OF
INFORMATION
SYSTEMS
> CH APTE R 4: Ethics and information security
> CH APTE R 5: Enterprise architectures
> CH APTE R 6: Databases an d d ata ware h o u ses
> CHAPTE R 7: Networks, telecommunications and mobile
tec h n o lo g y
Part Two concentrates on the essential key organisational resource and can give a
components of information systems. Most company a definite competitive advantage.
people view IT strictly from a technological The bottom line is that managers who treat
paradigm, but in fact, ITs power and influence information as a corporate asset yield
is not so much a factor of its technical success in the marketplace.
nature, but rather of what that technical The section begins by covering
infrastructure carries, houses, and supports: information ethics and information security.
information. And information is power to an With the many new governance and
organisation. Part Two highlights this point compliance regulations, all managers must
and raises awareness of the significance understand the ethical issues surrounding
of information to organisational success. information. As a key organisational resource,
Understanding how enterprise architectures information must be protected from misuse
support information, how employees access and harm. This involves addressing ethical
and analyse information to make business concerns around the collection, storage, and
decisions, and how wireless and mobile usage of information; protecting information
technologies can enable information access privacy; and ensuring that information is
24/7 are the primary learning goals of Part secure against unauthorised access and
Two. Properly managing information is a attack.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
Case Study
Tax Companies must keep their records relating to the income tax collected
regulations from their employees. They must keep these records for 5 years.
Companies must also keep records that relate to their payment of
Goods and Services Tax (GST). They must keep these records for 5
years.
Corporate Companies must keep the records which explain their financial
regulations statements (such as profit and loss statements and balance sheets).
This includes invoices, receipts, cheques and orders which may be
stored electronically, but must be guarded against damage, destruction
and falsification. The records must be available for inspection. These
records must be kept for 7 years.
Privacy Companies must inform individuals how their personal information will
regulations be used and how it will be protected. All personal information must be
accurate and up to date. Irrelevant or useless information cannot be
kept indefinitely.
Individuals have the right to access their personal information on
request.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
162
Case Study
Implementing a record retention system
Implementing a record retention system may require a great deal of work across all
departments, although it is the IT department which must get the process up and running.
The following are a few practical considerations for companies planning to implement a
record retention system.
> The company must define what records are to be kept and clearly state how long
those records should be maintained. These definitions must be reviewed by the legal
department who should liaise with the IT team to ensure they are being properly
interpreted.
> The company must invest in the appropriate technology and infrastructure to retain their
records. Experts believe that 80 per cent of corporate communication is electronic via
email and instant messaging,1 so any technology must be capable of capturing and storing
that voluminous data in a searchable format. The technology must also be able to meet
?
regulatory demands. Companies which archive hard copies of their records must ensure QUESTIONS
their documents are suitably protected from damage, destruction or falsification. TO FOLLOW
> The company must regularly test and review their record retention system to ensure that
data can be accessed and retrieved quickly, the system continues to meet regulatory
requirements and employees are implementing the system appropriately.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
163
Introduction
Ethics and security are two fundamental building blocks for all organisations. In recent
years, corporate scandals such as those affecting HIH and OneTel along with terrorist
events such as the September 11 attack on New York and the Bali bombings have shed new
light on the meaning of ethics and security. When the behaviour of a few individuals can
destroy billion-dollar organisations, the value of ethics and security should be evident.
4.1 ETHICS
ET HI CS
Ian Clarke, the inventor of a file-swapping service called Freenet, decided to leave the
United States for the United Kingdom, where copyright laws are more lenient. Wayne
Rosso, the inventor of a file-sharing service called Grokster, left the United States for
Spain, again saying goodbye to tough US copyright protections. Sharman Networks is
the owner of popular file-sharing application KaZaA. Interestingly, although it has its
headquarters in Australia, the company is incorporated in Vanuatu, and abides by US
copyright laws.2 While Australian copyright laws have a reputation for being concise,
regulated and adhered to, the same cannot be said for US copyright laws, which may be
why an Australian company would prefer to be regulated under the US system.
The Australian copyright laws, designed decades before the invention of the Internet,
make file sharing and many other Internet technologies illegal. Although some individuals
use file sharing in unethical ways, such as downloading music and movies illegally,
file sharing has many positive benefits, such as improving drug research, software
development and the flow of information.3
The ethical issues surrounding copyright infringement and intellectual property
rights are consuming the e-business world. Advances in technology make it easier for
people to copy everything from music to pictures. Technology poses new challenges for
our ethicsthe principles and standards that guide our behaviour toward other people.
Table 4.1 presents an overview of concepts, terms and ethical issues stemming from
advances in technology.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
164
Intellectual property The collection of rights that protect creative and intellectual effort.
TABLE 4.1
Copyright The exclusive right to do, or omit to do, certain acts with intangible Technology-related
property such as a song, video game and some types of proprietary
ethical issues
documents.
Fair use doctrine In certain situations, it is legal to use copyrighted material.
Pirated software The unauthorised use, duplication, distribution, or sale of
copyrighted software.
Counterfeit software Software that is manufactured to look like the real thing and sold as
such.
In 2002, the Victorian Supreme Court awarded $400 000 to dying 51-year-old smoker
Rolah McCabe. Justice Geoffrey Eames struck out the defence of British American Tobacco
on the basis that it had deliberately destroyed or removed documents that would have
been relevant to the case. From 1989 onwards, American lawyers had come to Australia to
oversee the British American Tobaccos document retention policy. The judge found that
the company, and its solicitors Clayton Utz, acted with the deliberate intention of denying
a fair trial to the plaintiff, and the strategy to achieve that outcome was successful. This
decision was largely overturned on appeal, but negative publicity led to new Victorian
legislation that outlawed the destruction of certain documents.
Regardless of who is to blame, the bigger issue is that the destruction of files after
litigation has begun is both unethical and illegal. A direct corporate order to destroy
information which is the basis for litigation poses a dilemma for any professional. Comply,
and you participate in potentially unlawful activities; refuse, and you might find yourself
looking for a new job.
Privacy is one of the largest ethical issues facing organisations. Privacy is the interest of
a person in protecting their life from unwanted intrusion and public scrutiny. In Australia,
there is no general right to privacy. However, unlawful interference with an individuals
privacy, family, home or correspondence is protected by the commonwealth Privacy Act
1988. Privacy is related to confidentiality, which is the principle that certain information
will remain outside the public domain. Some of the most problematic decisions facing
organisations lie in the murky and turbulent waters of privacy. The burden comes from
the knowledge that each time employees make a decision regarding issues of privacy, the
outcome could potentially sink the company.
Trust between companies, customers, partners and suppliers is the support structure
of e-business. One of the main ingredients in trust is privacy. Privacy continues to be one
of the primary barriers to the growth of e-business. People are concerned their privacy
will be violated because of interactions on the web. Unless an organisation can effectively
address this issue of privacy, its customers, partners and suppliers might lose trust in
the organisation, which would hurt its business. In keeping with its mandate to gather
intelligence, the Australian Security and Intelligence Commission (ASIO) has stated that
the Internet can provide valuable input to ASIOs analytical and investigative work.4 In
America, the CIA is watching YouTube. US spies, working for the Director of National
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
165
Intelligence (DNI), are looking increasingly online for intelligence; they have become
major consumers of social media. Were looking at YouTube, which carries some unique
and honest-to-goodness intelligence, said Doug Naquin, director of the DNI Open Source
Center. Were looking at chat rooms and things that didnt exist five years ago, and trying
to stay ahead. We have groups looking at what they call Citizens Media: people taking
pictures with their cell phones and posting them on the Internet. Table 4.2 displays some
relevant community attitudes towards privacy on the Internet.
1 Sixty-two per cent of respondents were more concerned about the security of their
TABLE 4.2
personal information than usual when using the Internet.
Attitudes towards
2 Two-thirds of respondents reported that they had read the privacy policy attached to an
privacy issues on
Internet site.
the Internet5
3 Three in ten respondents admitted to having provided false information when filling
out a form online. This is relevant for organisations which ask for customer information
when selling products online.
I NFO R M ATI O N E TH I CS
Information ethics concern the ethical and moral issues arising from the development and
use of information technologies, as well as the creation, collection, duplication, distribution
and processing of information itself (with or without the aid of computer technologies).
Individuals determine how to use information and how information affects them. How
individuals behave toward each other, and how they handle information and technology,
are largely influenced by their ethics. Ethical dilemmas usually arise not in simple, clear-
cut situations but out of a clash between competing goals, responsibilities and loyalties.
Inevitably, the decision-making process has more than one socially acceptable correct
decision. Table 4.3 contains examples of ethically questionable or unacceptable uses of
information technology.
questionable or Employees search organisational databases for sensitive corporate and personal information.
unacceptable Organisations collect, buy and use information without checking the validity or accuracy of the
information information.
technology use Individuals create and spread viruses that cause trouble for those using and maintaining IT
systems.
Individuals hack into computer systems to steal proprietary information.
Employees destroy or steal proprietary organisation information such as schematics, sketches,
customer lists and reports.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
166
Reidenberg received an offer for a mobile phone service from AT&T Wireless. The offer
revealed that AT&T Wireless had used Equifax, a credit reporting agency, to identify Joe
Reidenberg as a potential customer. Overall, this strategy seemed like good business. Equifax
could generate additional revenue by selling information it already owned and AT&T Wireless
could identify target markets, thereby increasing response rates to its marketing campaigns.
Unfortunately, the Fair Credit Reporting Act (FCRA) in the US forbids repurposing
credit information except when the information is used for a firm offer of credit or
insurance. In other words, the only product that can be sold based on credit information
is credit. A representative for Equifax stated, As long as AT&T Wireless (or any company
for that matter) is offering the cell phone service on a credit basis, such as allowing the use
of the service before the consumer has to pay, it is in compliance with the FCRA.6
In Australia, the position would likely be different. In 2008, the Australian Privacy
Commissioner found that a betting agency that obtained access to consumer credit
information files held by a credit reporting agency breached the Privacy Act 1988. Under
the Privacy Act, credit providers can obtain access to credit information in the possession or
control of a credit reporting agency. The Commissioner found that the betting agency was
not a credit provider, even though the agency provided betting services to its customers on
credit.7 However, the American scenario raises an important questionis an act ethical
just because it is legal?
Technological advancements, and newfound ways of collecting and presenting
customer information, are providing new ethical dilemmas for organisations. Because
much technology is so new and pervasive in unexpected ways, the ethics surrounding
information are still being defined. Figure 4.1 displays the four quadrants of ethical and
legal behaviour. The ideal goal for organisations is to make decisions within quadrant I
that are both legal and ethical.
Legal Illegal
FIGURE 4.1
Acting ethically
Ethical I II and legally are not
always the same
Unethical III IV
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
167
Rode fired the errant marketing company and immediately developed a formal policy
for the use of customer information. The customer doesnt see ad agencies and contracted
marketing firms. They see Saab USA spamming them, Rode said. Finger-pointing after
the fact wont make your customers feel better.8
Information has no ethics. Information does not care how it is used. It will not stop
itself from spamming customers, sharing itself if it is sensitive or personal, or revealing
details to third parties. Information cannot delete or preserve itself. Therefore, it falls on
the shoulders of those who own the information to develop ethical guidelines on how to
manage the information. Table 4.4 provides an overview of some of the important laws that
individuals must follow when they are attempting to manage and protect information.
Crimes Act 1914 It is an offence to unlawfully access or use data held by the
TABLE 4.4
Australian government.
Established
Freedom of Information The object of this Act is to extend as far as possible the right of
information-related
Act 1982 the Australian community to access information in the possession
Australian laws
of the Australian government.
Privacy Act 1988 This Act sets national standards for dealing with personal
information by organisations and ensures that personal
information of those organisations will be stored, used and
disclosed in a fair and appropriate way.
Credit Reporting Code of The Code imposes legally binding obligations on credit reporting
Conduct 1991 agencies and credit providers. Companies must inform individuals
how their personal information will be used and how it will be
protected. All personal information must be accurate and up to
date. Irrelevant or useless information cannot be kept indefinitely.
Data-Matching Program The Act authorises the transfer of information between
(Assistance and Tax) Act government agencies about persons and allows the matching of
1990 information held by other agencies with the information held by
the Department of Social Security.
Similar provisions exist in the National Health Act 1953, Income
Tax Assessment Act 1936, Taxation Administration Act 1953,
Freedom of Information Act 1982 and Archives Act 1983.
Patents Act 1990 Subject to this Act, a patent gives the owner of the patent the
exclusive rights, during the term of the patent, to exploit the
invention and to authorise another person to exploit the invention.
Electronic Transactions Any requirement (such as signing or producing a document)
Act 1992 imposed under an Australian Commonwealth law can be met in
electronic form.
Corporations Act 2001 Companies must keep the records which explain their financial
statements (such as profit and loss statements and balance sheets)
for 7 years.
Sarbanes-Oxley Act 2002 Seeks to protect investors by improving the accuracy and reliability
(USA) of corporate disclosures and requires companies to (1) implement
extensive and detailed policies to prevent illegal activity within
the company, and (2) to respond in a timely manner to investigate
illegal activity.
X Co ntinued
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
168
Designs Act 2003 The registered owner of a registered design has the exclusive right,
during the term of registration of the design, to exploit the design and
to authorise another person to exploit the design.
Spam Act 2003 Sets a scheme for regulating commercial electronic messages.
These must include information about the individual or
organisation who authorised the sending of the message and must
contain a functional unsubscribe facility. Unsolicited commercial
electronic messages must not be sent.
1 Information is a valuable corporate asset and should be managed as such, like cash,
TABLE 4.5
facilities, or any other corporate asset.
CIO magazines
2 The CIO is steward of corporate information and is responsible for managing it over its
six principles for
life cyclefrom its generation to its appropriate destruction.
ethical information
3 The CIO is responsible for controlling access to and use of information, as determined by
management
governmental regulation and corporate policy.
4 The CIO is responsible for preventing the inappropriate destruction of information.
5 The CIO is responsible for bringing technological knowledge to the development of
information management practices and policies.
6 The CIO should partner with executive peers to develop and execute the organisations
information management policies.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
169
Et hi c al c ompu te r u se policy
In a case that illustrates the perils of online betting, a leading Internet poker site reported
that a hacker exploited a security flaw to gain an insurmountable edge in high-stakes,
no-limit Texas hold-em tournamentsthe ability to see his opponents hole cards. The
scam was eventually discovered by an Australian IS graduate Michael Josem, but not
before much damage had been done.9 The cheater, whose illegitimate winnings were
estimated at between US$400 000 and US$700 000 by one victim, was an employee of
AbsolutePoker.com, who hacked the system to show that it could be done. Regardless of
what business a company operateseven one that many view as unethicalthe company
must protect itself from unethical employee behaviour.
One of the essential steps in creating an ethical corporate culture is establishing an ethical
computer use policy. An ethical computr use policy contains general principles to guide
computer user behaviour. For example, the ethical computer use policy might explicitly
state that users should refrain from playing computer games during working hours. This
policy ensures the users know how to behave at work and the organisation has a published
standard by which to deal with user infractions. For example, after appropriate warnings, the
company may terminate an employee who spends significant amounts of time playing
computer games at work.
There are variations in how organisations expect their employees to use computers
but, in any approach, the overriding principle when seeking appropriate computer use
should be informed consent. The users should be informed of the rules and, by agreeing
to use the system on that basis, consent to abide by the rules.
An organisation should make a conscientious effort to ensure all users are aware of the
policy through formal training and other means. If an organisation were to have only one
e-policy, it should be an ethical computer use policy since it is the starting point and the
umbrella for any other policies the organisation might establish.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
170
some purpose, such as record keeping or billing. Then, a sales or marketing professional
figures out another way to use it internally, share it with partners, or sell it to a trusted third
party. The information is unintentionally used for new purposes. The classic example
of this type of unintentional information reuse is the Australian Medicare card, which
started simply as a way to access government-provided universal healthcare and is now
used as a sort of substitute personal ID.
An organisation that wants to protect its information should develop an information
privacy policy. An information privacy policy contains general principles regarding
information privacy. Table 4.6 highlights a few guidelines an organisation can follow
when creating an information privacy policy.
Ac c ep t able us e p oli c y
An acceptable use policy (AUP) is a policy that a user must agree to follow in order to be
provided access to a network or to the Internet.
Many businesses and educational facilities require employees or students to sign an
acceptable use policy before gaining network access. When signing up with an Internet
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
171
service provider (ISP), each customer is typically presented with an AUP, which states that
they agree to adhere to certain stipulations (see Table 4.7).
policy stipulations 3 Not posting commercial messages to groups without prior permission.
4 Not attempting to send junk email or spam to anyone who does not want to receive it.
5 Not attempting to mail bomb a site. A mail bomb is sending a massive amount of email to
a specific person or system resulting in filling up the recipients email disk space, which,
in some cases, may be too much for the server to handle and may cause the server to
stop functioning.
Emai l p ri va cy policy
Email is so pervasive in organisations that it requires its own specific policy. According
to experts in the field such as David Thompson, Managing Director of AXS-One Pty Ltd,
80 per cent of corporate communication is done electronically via email and instant
messaging (IM). While email and IM are common business communication tools, there
are risks associated with using them. For instance, a sent email is stored on at least three
or four different computers (see Figure 4.2). Simply deleting an email from one computer
does not delete it from the other computers. Companies can mitigate many of the risks of
using electronic messaging systems by implementing and adhering to an email privacy
policy.10
FIGURE 4.2
Email is stored on
multiple computers
Email message Email message
Senders Recipients
computer computer
Senders email Recipients email
providers server providers server
Deleting an email from the recipients computer does not delete it from the senders
computer or the providers computers.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
172
One of the major problems with email is the users expectations of privacy. To a large
extent, this expectation is based on the false assumption that email privacy protection exists
somehow analogous to that of Australia Posts Registered Mail service. This is simply not
true. Take the example of London lawyer Richard Phillips. After his secretary spilled a little
ketchup on his pants, Phillips demanded restitution from hervia emailin the amount
of a measly 4 (approximately $10). The subject line of that email: Ketchup Trousers.
The secretary failed to pay immediately, owing to her mothers sudden death, but quickly
made the David versus Goliath matter public, humiliating Phillips. His firm later said
Phillips had resigned, but it was careful to note that the departure had nothing to do with
the trousers incident.
The issue of employers monitoring emails sent by their employees is one that has
received considerable attentionhowever the surveillance of employees emails is an
unclear legal area. Under the Privacy Act 1988, organisations must collect, use and store
information obtained by tracking an employees emails in a certain way. To overcome
these obstacles organisations should have a robust email privacy policy. Organisations
should have a policy that:
> clearly sets out how employees may use email and the Internet for private and non-
employment purposes;
> states what activities are permitted and those which are not permitted;
> details the type of information that will be recorded and the members of the organisation
that will have access to that information; and
> provides for the monitoring and auditing process that will consider the information.11
Organisations must create an email privacy policy. Table 4.8 displays a few of the key
stipulations generally contained in an email privacy policy.
I n t ernet us e p oli c y
Similar to email, the Internet has some unique aspects that make it a good candidate for
its own policy. These include the large amounts of computing resources that Internet
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
173
users can expend, thus making it essential that such use be legitimate. In addition, the
Internet contains numerous materials that some believe are offensive and, hence, some
regulation is required. An Internet use policy contains general principles to guide the
proper use of the Internet. Table 4.9 lists a few important stipulations that might be
included in an Internet use policy.
1 The policy should describe available Internet services because not all Internet sites allow
TABLE 4.9
users to access all services.
Internet use policy
2 The policy should define the organisations position on the purpose of Internet access and
stipulations
what restrictions, if any, are placed on that access.
3 The policy should complement the ethical computer use policy.
4 The policy should describe user responsibility for citing sources, properly handling
offensive material and protecting the organisations good name.
5 The policy should clearly state the ramifications if the policy is violated.
A nt i -s p am policy
Spam is unsolicited email. An anti-spam policy simply states that email users will
not send unsolicited emails (or spam). Spam plagues all levels of employees within an
organisation from receptionists to CEOs. Estimates indicate that spam accounts for 40
to 60 per cent of most organisations email traffic. According to Ferris Research, spam
cost the major global economies $64 billion in 2005, and organisations in developed
economies without spam filtering software face costs of US$1000 per mailbox.12
SunRice, a popular producer of Australian rice and rice products, has approximately
800 employees and a presence in about 60 national markets. The company receives
somewhere between 50 000 and 60 000 legitimate work-related emails a month, but in
2006 it received up to 350 000 emails a month. That amount of spam was taking up a lot
of the IT departments time and effort.
After introducing a spam filter, the company made significant productivity gains.
All employees spent less time perusing junk mail, but the impact on the companys
IT department was the most pronounced. Weve gone from spending three or four
days a week managing email problems to maybe one hour all up each week, says Col
Thompson, SunRices IT business services team leader.13
Spam clogs email systems and siphons IT resources away from legitimate business
projects. It is difficult to write anti-spam policies, laws or software because there is no
such thing as a universal litmus test for spam. One persons spam is another persons
newsletter. End users have to be involved in deciding what spam is because what is
unwanted can vary widely not just from one company to the next, but from one person
to the next. What looks like spam to the rest of the world could be essential business
communications for certain employees.
John Zarb, CIO of Libbey, a manufacturer of glassware, china and flatware, tested
Guinevere (a virus and subject-line filter) and SpamAssassin (an open source spam
filter). He had to shut them off after 10 days because they were rejecting important
legitimate emails. As Zarb quickly discovered, once an organisation starts filtering
email, it runs the risk of blocking legitimate emails that look like spam. Avoiding an
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
174
unacceptable level of false positives requires a delicate balancing act. The IT team
tweaked the spam filters and today, the filters block about 70 per cent of Libbeys spam.
According to Zarb the false positive rate is far lower, but still not zero. At SunRice, the
software is so accurate we probably get around 20 (wrongly quarantined files) a week,
says Col Thomson. The false positives at SunRice are so low because their software
allows administrators to easily set exceptions and bypasses which handle anomalies
that would otherwise get categorised as spam.14 Table 4.10 highlights a few methods an
organisation can follow to prevent spam.
> Disguise email addresses posted in a public electronic place. When posting an email address in
TABLE 4.10
a public place, disguise the address through simple means such as replacing jsmith@domain.
Spam prevention
com with jsmith at domain dot com. This prevents spam from recognising the email address.
tips
> Opt out of member directories that may place an email address online. Choose not to
participate in any activities that place email addresses online. If an email address is placed
online be sure it is disguised in some way.
> Use a filter. Many ISPs and free email services now provide spam filtering. While filters are not
perfect, they can cut down tremendously on the amount of spam a user receives.
ETHI CS I N T HE WO R K P L AC E
Concern is growing among employees that infractions of corporate policieseven
accidental oneswill be a cause for disciplinary action. The whitehouse.gov Internet
site displays the US presidents official website and updates on bill signings and new
policies. However, whitehouse.com leads to a parody site that lampoons the famous
office, and before that, whitehouse.com was a trashy, pornographic website. A simple
mistype from .gov to .com could once have potentially cost someone her or his job if the
company had a termination policy for viewing illicit websites. Monitoring employees is
one of the largest issues facing CIOs when they are developing information management
policies.
Legal precedents that hold businesses financially responsible for their employees
actions drives the decision of whether to monitor what employees do on company time
with corporate resources. Increasingly, employee monitoring is not a choice; it is a risk-
management obligation. Michael Soden, CEO of the Bank of Ireland, issued a mandate
stating that company employees could not surf illicit websites with company equipment.
Next, he hired Hewlett-Packard to run the IT department. A Hewlett-Packard employee
soon discovered illicit websites on Sodens computer. Soden resigned.15
Surveillance of employees in the workplace remains a controversial topic. A survey
conducted on behalf of the Australian Privacy Commissioner found that 23 per cent of
people believe that employers should be able to read emails sent to their employees
work accounts whenever they choose. However, 34 per cent believe they should not have
this right at all and 38 per cent believe they should only be able to do so if they suspect
the employee of wrong-doing. Respondents to the survey had similar feelings regarding
employers monitoring what is typed into a work computer or using surveillance
equipment.16
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
175
1 Employee absenteeism is on the rise. The Australian Bureau of Statistics research indicates
TABLE 4.11
that 37 per cent of absences from work are either sick leave or unapproved leave.20 The
Employee
lesson here might be that more employees are missing work to take care of personal
monitoring effects
business. Perhaps losing a few minutes here or thereor even a couple of hoursis cheaper
than losing entire days.
2 Studies indicate that electronic monitoring results in lower job satisfaction, in part because
people begin to believe the quantity of their work is more important than the quality.
3 Electronic monitoring also induces what psychologists call psychological reactance: the
tendency to rebel against constraints. If you tell your employees they cannot shop, they
cannot use corporate networks for personal business, and they cannot make personal phone
calls, then their desire to do all these things will likely increase.
This is the thinking at SAS Institute, a private software company consistently rated as
an employer of choice in the US. SAS does not monitor its employees web usage. The
company asks its employees to use company resources responsibly, but does not mind if
they occasionally check sports scores or use the web for shopping.
Many management gurus advocate that organisations whose corporate cultures
are based on trust are more successful than those whose corporate cultures are based
on distrust. Before an organisation implements monitoring technology it should ask
itself, What does this say about how the organisation feels about its employees? If the
organisation really does not trust its employees, then perhaps it should find new ones. If
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
176
FIGURE 4.3
Big Brother
eyes: workplace
monitoring has
risks and rewards
an organisation does trust its employees, then it might want to treat them accordingly. An
organisation that follows its employees every keystroke is unwittingly undermining the
relationships with its employees.21
Information technology monitoring is tracking peoples activities by such measures
as number of keystrokes, error rate and number of transactions processed. Table 4.12
displays different types of monitoring technologies currently available.
Key logger, or key trapper, software A program that, when installed on a computer, records
TABLE 4.12
every keystroke and mouse click.
Common
Hardware key logger A hardware device that captures keystrokes on their
monitoring
journey from the keyboard to the motherboard.
technologies
Cookie A small file deposited on a hard drive by a website
containing information about customers and their web
activities. Cookies allow websites to record the comings
and goings of customers, usually without their knowledge
or consent.
Adware Software that generates ads that install themselves on a
computer when a person downloads some other program
from the Internet.
Spyware (sneakware or Software that comes hidden in free downloadable software
stealthware) and tracks online movements, mines the information
stored on a computer, or uses a computers CPU and
storage for some task the user knows nothing about.
Web log Consists of one line of information for every visitor to a
website and is usually stored on a web server.
Clickstream Records information about a customer during a web
surfing session such as what websites were visited, how
long the visit was, what ads were viewed and what was
purchased.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
177
Monitoring employee behaviour should not just extend to the employee, but to how
employees monitor each other. In 2002 a 14-year-old Canadian boy named Ghyslain
Raza innocently swung a golf-ball retriever around in a quiet corner of his high school,
pretending he was The Phantom Menaces Darth Maul. He videotaped it and left the
tape at school, where it was found several months later. Not long after, Raza became an
Internet sensation, known today as the Star Wars kid, with fans adding lightsabre effects
and music and creating video revisions that number over a hundred. The embarrassing
footage has since become one of the Internets most popular, having been spoofed on TV
shows ranging from American Dad to The Colbert Report to Arrested Development. In 2003,
Raza sued the individuals who posted the video online, and the case was settled.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
178
1 Be as specific as possible.
TABLE 4.13
2 Always enforce the policy. Employee
3 Enforce the policy in the same way for everyone. monitoring
4 Expressly communicate that the company reserves the right to monitor all employees. policy stipulations
5 Specifically state when monitoring will be performed.
6 Specifically state what will be monitored (email, IM, Internet, network activity, etc.).
7 Describe the types of information that will be collected.
8 State the consequences for violating the policy.
9 State all provisions that allow for updates to the policy.
10 Specify the scope and manner of monitoring for any information system.
11 When appropriate, obtain a written receipt acknowledging that each party has
received, read and understood the monitoring policies.
Case Study
HOW M U C H W I L L D OW N TI ME COST YO U R
BU SI NESS?
The old business axiom time is money needs to be updated to more accurately reflect
the crucial interdependence between IT and business processes. To reflect the times, the
phrase should state uptime is money. The leading cause of downtime is a software failure
followed by human error, according to Infonetics research. Unplanned downtime can
strike at any time from any number of causes, ranging from cyclones to sink overflows to
network failures to power outages. Although natural disasters may appear to be the most
devastating causes of IT outages, they are hardly the most frequent or biggest threats to
uptime. Table 4.14 highlights sources of unplanned downtime.
According to the Gartner Group, on average, enterprises lose US$108 000 of revenue
every hour their IT infrastructure is down. Figure 4.4 displays the four categories associated
with downtime, according to the Gartner Group. A few questions companies should ask
when determining the cost of downtime include:
> How many transactions can the company afford to lose without significantly impacting
business?
> Does the company depend upon one or more mission-critical applications to conduct
business?
> How much revenue will the company lose for every hour a critical application is
unavailable?
> What is the productivity cost associated with each hour of downtime?
> How will collaborative business processes with partners, suppliers and customers be
affected by an unexpected IT outage?
> What is the total cost of lost productivity and lost revenue during unplanned downtime?
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
180
The reliability and resilience of IT systems have never been more essential for success
as businesses cope with the forces of globalisation, 24/7 operations, government and trade
regulations and overextended IT budgets and resources. Any unexpected IT downtime in
todays business environment has the potential to cause both short- and long-term costs
with far-reaching consequences. Section 4.2 explains how you can use security to combat
the threat of downtime. Understanding how to secure a business network is critical to
keeping downtime to a minimum and uptime to a maximum.
FIGURE 4.4
Revenue The cost of
Financial performance downtime
Direct loss
Revenue recognition
Compensatory payments
Cash flow
Lost future revenue
Payment guarnatees
Billing losses
Credit rating
Investment losses
Stock price
Lost productivity
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
181
T HE F I R ST L I N E O F D E F E N C E P EO P L E
With current advances in technologies and business strategies, organisations are able to
determine valuable information such as who are the top 20 per cent of the customers
that produce 80 per cent of all revenues. Most organisations view this type of information
as valuable intellectual capital, and they are implementing security measures to prevent
the information from walking out the door or falling into the wrong hands. Enterprises
can implement information security lines of defence through people first and through
technology second.
Adding to the complexity of information security is the fact that organisations
must enable employees, customers and partners to access information electronically
to be successful in this electronic world. Doing business electronically automatically
creates tremendous information security risks for organisations. Surprisingly, the
biggest issue surrounding information security is not a technical issue, but a people
issue.
Most information security breaches result from people misusing an organisations
information either advertently or inadvertently. For example, many individuals freely give
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
182
up their passwords or write them on sticky notes next to their computers, leaving the door
wide open to intruders.25
The director of information security at a large health care company discovered how
easy it was to create an information security breach when she hired outside auditors
to test her companys security awareness. In one instance, auditors found that staff
members testing a new system had accidentally exposed the network to outside
hackers. In another, auditors were able to obtain the passwords of 16 employees when
the auditors posed as support staff; hackers frequently use such social engineering to
obtain passwords. Social engineering is using ones social skills to trick people into
revealing access credentials or other information valuable to the attacker. Dumpster
diving, or looking through peoples trash, is another way social engineering hackers
obtain information.26
Information security policies identify the rules required to maintain information
security. An information security plan details how an organisation will implement the
information security policies. Table 4.15 is an example of the University of the Sunshine
Coasts information and communication technology (ICT) security policy.27
The first line of defence an organisation should follow is to create an information
security plan detailing the various information security policies . A detailed
information security plan can alleviate people-based information security issues.
Table 4.16 displays the five steps for creating an information security plan.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
183
> In assessing risks to Information Systems, the Business Systems Owner must consider the
security of the information in all media formats that are used (e.g. hardcopy). Furthermore,
consideration is required when information may be stored on mobile equipment which can be
transported offsite.
> Remote access to Restricted Information Systems will only be provided with the explicit
authorisation of the Business System Owner.
> Operations Management
> Appropriate systems will be in place to facilitate the detection and prevention of malicious
software into the Universitys ICT environment (e.g. the use of antivirus software).
> Appropriate activity logging will be in place for all Information Systems.
> ICT Security incidents will be dealt with in a manner consistent with the Universitys Critical
Incident ManagementInstitutional Operating Policy.
> Confidential information is only to be transmitted across any accessible part of the network in
an encrypted manner.
Compliance
> The University monitors and logs activity on its Information Systems and carries out security
audits as required. These activities may be used to investigate faults, security breaches,
inappropriate use or unlawful activity. For the diagnosis of problems, investigation of issues or
for security audits, the University reserves the right to access individual files.
> Breaches of this policy shall be treated as misconduct or serious misconduct and are dealt
with under relevant University statutes, rules and policies including the Code of Conduct and
the Student Conduct and Discipline Policy.
5 Obtain stakeholder Gain the approval and support of the information security polices from
support the board of directors and all stakeholders.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
184
Businesses consider desktop users to be the biggest security risk to their networks,
despite increased concern over outsourced labour and remote users. Recent breaches of
privacy regulations governing the Australian Commonwealth public sector have resulted
in both the warning and firing of Centrelink staff. Investigations found 547 instances
where breaches occurred and 367 proven breaches. The majority of breaches in this
instance occurred by way of staff accessing client records. In response, Centrelink issued
written warnings, fines and reprimands. Twenty-four staff resigned as a consequence (this
came on top of 100 resignations for the same reason the previous year).28
Table 4.17 provides the top 10 questions that managers should ask to ensure their
information is secure, according to Ernst & Young.
1 Does our board of directors recognise information security is a board-level issue that
TABLE 4.17
cannot be left to the IT department alone?
Top 10 questions
2 Is there clear accountability for information security in our organisation?
managers should
3 Do our board members articulate an agreed-upon set of threats and critical assets? ask regarding
How often do we review and update these?
information
4 How much is spent on information security and what is it being spent on? security
5 What is the impact on the organisation of a serious security incident?
6 Does our organisation view information security as an enabler? (For example, by
implementing effective security, could we enable our organisation to increase business
over the Internet?)
7 What is the risk to our business of getting a reputation for low information security?
8 What steps have we taken to ensure that third parties will not compromise the security
of our organisation?
9 How do we obtain independent assurance that information security is managed
effectively in our organisation?
10 How do we measure the effectiveness of our information security activities?
TH E SECO ND LI NE OF D E F E N C ETEC H N O LO GY
The University of Western Sydney (UWS) recently completed a major network upgrade
that facilitates network access and provides IT support for staff and UWSs 38 000
students. UWS has installed an active Intrusion Detection System (IDS) that deals with
an attack on the network by shutting off access to the system. A passive system simply
logs the intrusion and alerts IT support. Universities dont want to be denied access to
anything [on the Internet] so we need an active IDS to monitor traffic, said UWS IT
security coordinator Darren Geddes.28
Once an organisation has protected its intellectual capital by arming its people with a
detailed information security plan, it can begin to focus its efforts on deploying the right
types of information security technologies such as the IDS installed at the University of
Western Sydney.
Organisations can deploy numerous technologies to prevent information security
breaches. When determining which types of technologies to invest in, it helps to understand
the three primary information security areas:
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
185
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
186
A Melbourne offender was able to obtain the birth certificates of four babies who passed
TABLE 4.18
away in the 1970s. During an eight-month period the offender claimed $20 857 in
Identity theft
unemployment benefits. He was able to support his unemployment claims using a variety
examples
of identity documents (learner driver permits, mobile phone accounts, student cards, rental
documents and bank cards).
A Sydney man was sentenced to six years imprisonment in 2006 after pleading guilty to
55 charges of tax fraud. He used the identities of 17 former clients to create false payment
summaries, and lodged 51 income tax returns on their behalf. He will serve four and a half years
before being eligible for parole.
An Englishman immigrated to Western Australia. Identity thieves, who obtained his credit card
information from an online flower purchase, then contacted his credit card company and informed
them that the man had moved back to England, forwarding a new address in East London. The
thieves increased the credit card limit and spent $15 000 in computer shops around the UK.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
187
P revent i on a n d re sista n ce
Prevention and resistance technologies stop intruders from accessing intellectual capital.
A division of Sony Inc., Sony Pictures Entertainment (SPE), defends itself from attacks
by using an intrusion detection system to detect new attacks as they occur. SPE develops
and distributes a wide variety of products including movies, television, videos and DVDs.
A compromise to SPE security could cost the company valuable intellectual capital
as well as millions of dollars and months of time. The company needed an advanced
threat-management solution that would take fewer resources to maintain and require
limited resources to track and respond to suspicious network activity. The company
installed an advanced intrusion detection system allowing it to monitor all of its network
activity including any potential security breaches.34
The cost of downtime or network operation failures can be devastating to any business.
For example, eBay experienced a 22-hour outage in June 2000 that caused the companys
market cap to plunge an incredible US$5.7 billion. Downtime costs for businesses can
vary from $100 to $1 million per hour. An organisation must prepare for and anticipate
these types of outages, which result most commonly from the work of hackers and viruses.
Technologies available to help prevent and build resistance to attacks include content
filtering, encryption and firewalls.35
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
188
E n cryp t i on
Encryption scrambles information into an alternative form that requires a key or
password to decrypt the information. If there is an information security breach and the
information was encrypted, the person stealing the information will be unable to read it.
Encryption can switch the order of characters, replace characters with other characters,
insert or remove characters, or use a mathematical formula to convert the information
into some sort of code. Companies that transmit sensitive customer information over
the Internet, such as credit card numbers, frequently use encryption. Some encryption
technologies use multiple keys like public key encryption. Public key encryption (PKE) is
an encryption system that uses two keys: a public key that everyone can have and a private
key for only the recipient (see Figure 4.6). When implementing security using multiple
keys, the organisation provides the public key to all of its customers (end consumers and
other businesses). The customers use the public key to encrypt their information and
FIGURE 4.6
Public key Public key
Originating business encryption (PKE)
Encrypted information system
Sends the same
public key to all Public key
customers Encrypted information
Uses a private key
to decrypt the Public key
information received
Encrypted information
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
189
send it along the Internet. When it arrives at its destination, the organisation would use
the private key to unscramble the encrypted information.
Fi rewalls
One of the most common defences for preventing a security breach is a firewall. A firewall
is hardware and/or software that guards a private network by analysing the information
leaving and entering the network. Firewalls examine each message that wants entrance
to the network. Unless the message has the correct markings, the firewall prevents it
from entering the network. Firewalls can even detect computers communicating with the
Internet without approval. As Figure 4.7 illustrates, organisations typically place a firewall
between a server and the Internet.
Melbourne
FIGURE 4.7
Sample firewall
architecture Database
Sydney
connecting systems
located in Sydney, Firewall Server
Melbourne and Internet
Database
Brisbane Brisbane
Server Firewall
Database
Firewall Server
D et ec t i on a n d re spon se
The final area where organisations can allocate resources is in detection and response
technologies. If prevention and resistance strategies fail and there is a security breach, an
organisation can use detection and response technologies to mitigate the damage. The
most common type of defence within detection and response technologies is antivirus
software.
A single worm can cause massive damage. In August 2003, the Blaster worm infected
over 50 000 computers worldwide and was one of the worst outbreaks of the year. Jeffrey
Lee Parson, 18, was arrested by US cyber investigators for unleashing the damaging worm
on the Internet. The worm replicated itself repeatedly, eating up computer capacity, but
did not damage information or programs. The worm generated so much traffic that it
brought entire networks down.
The FBI used the latest technologies and code analysis to find the source of the worm.
Parson, charged with intentionally causing or attempting to cause damage to a computer,
was sentenced to 18 months in prison, three years of supervised release and 100 hours
of community service. What youve done is a terrible thing. Aside from injuring people
and their computers, you shook the foundation of technology, US District Judge Marsha
Pechman told Parson.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
190
With this arrest, we want to deliver a message to cyber-hackers here and around the
world, said US Attorney John McKay in Seattle. Let there be no mistake about it, cyber-
hacking is a crime. We will investigate, arrest, and prosecute cyber-hackers.37
The global fight against Internet hackers has reached Australian shores. Hew Griffiths,
of New South Wales central coast region, spent three years in an Australian gaol fighting
extradition to the United States on a charge of conspiring to commit a criminal copyright
infringement. Eventually, Griffiths was sentenced by a US court to 51 months jail,
backdated to the time of his arrest in Australia.38
Typically, people equate viruses (the malicious software) with hackers (the people).
While not all types of hackers create viruses, many do. Table 4.19 provides an overview of
the most common types of hackers and viruses.
Hackerspeople very knowledgeable about computers who use their knowledge to invade other TABLE 4.19
peoples computers.
Hackers and
> White-hat hackerswork at the request of the system owners to find system vulnerabilities
viruses
and plug the holes.
> Black-hat hackersbreak into other peoples computer systems and may just look around
or may steal and destroy information.
> Hactivistshave philosophical and political reasons for breaking into systems and will often
deface the website as a protest.
> Script kiddies or script bunniesfind hacking code on the Internet and click-and-point
their way into systems to cause damage or spread viruses.
> Crackera hacker with criminal intent.
> Cyber-terroristsseek to cause harm to people or to destroy critical systems or
information and use the Internet as a weapon of mass destruction.
Virusessoftware written with malicious intent to cause annoyance or damage.
> Worma type of virus that spreads itself, not only from file to file, but also from computer
to computer. The primary difference between a virus and a worm is that a virus must attach
to something, such as an executable file, in order to spread. Worms do not need to attach to
anything to spread and can tunnel themselves into computers.
> Denial-of-service attack (DoS)floods a website with so many requests for service that
it slows down or crashes the site.
> Distributed denial-of-service attack (DDoS)attacks from multiple computers that
flood a website with so many requests for service that it slows down or crashes. A common
type is the Ping of Death, in which thousands of computers try to access a website at the same
time, overloading it and shutting it down.
> Trojan-horse virushides inside other software, usually as an attachment or a
downloadable file.
> Backdoor programsviruses that open a way into the network for future attacks.
> Polymorphic viruses and wormschange their form as they propagate.
Some of the most damaging forms of security threats to e-business sites include
malicious code, hoaxes, spoofing and sniffers (see Table 4.20).
Implementing information security lines of defence through people first and through
technology second is the best way for an organisation to protect its vital intellectual
capital. The first line of defence is securing intellectual capital by creating an information
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
191
security plan detailing the various information security policies. The second line of
defence is investing in technology to help secure information through authentication
and authorisation, prevention and resistance and detection and response.
TABLE 4.20 > Elevation of privilege is a process by which a user misleads a system into granting
unauthorised rights, usually for the purpose of compromising or destroying the system. For
Security threats to
example, an attacker might log onto a network by using a guest account, and then exploit a
e-business
weakness in the software that lets the attacker change the guest privileges to administrative
privileges.
> Elevation of privilege is a process by which a user misleads a system into granting
unauthorised rights, usually for the purpose of compromising or destroying the system. For
example, an attacker might log onto a network by using a guest account, and then exploit a
weakness in the software that lets the attacker change the guest privileges to administrative
privileges.
> Hoaxes attack computer systems by transmitting a virus hoax, with a real virus attached.
By masking the attack in a seemingly legitimate message, unsuspecting users more readily
distribute the message and send the attack on to their co-workers and friends, infecting many
users along the way.
> Malicious code includes a variety of threats such as viruses, worms and Trojan horses.
> Spoofing is the forging of the return address on an email so that the message appears to
come from someone other than the actual sender. This is not a virus but rather a way by which
virus authors conceal their identities as they send out viruses.
> Spyware is software that comes hidden in free downloadable software and tracks online
movements, mines the information stored on a computer, or uses a computers CPU and
storage for some task the user knows nothing about. There are no statistics specific to
Australia regarding spyware, but anecdotally there has been a significant increase in the
amount of spyware on the Internet that has begun to infect Australian computer users.39
According to a US study conducted by the National Cyber Security Alliance, 91 per cent of
respondents had spyware on their computers that can cause extremely slow performance,
excessive pop-up ads, or hijacked home pages.
> A sniffer is a program or device that can monitor data travelling over a network. Sniffers
can show all the data being transmitted over a network, including passwords and sensitive
information. Sniffers tend to be a favourite weapon in the hackers arsenal.
> Packet tampering consists of altering the contents of packets as they travel over
the Internet or altering data on computer disks after penetrating a network. (In the
telecommunications arena, a packet is a discrete unit of information transmitted through
a data network.) For example, an attacker might place a tap on a network line to intercept
packets as they leave the computer. The attacker could eavesdrop or alter the information as it
leaves the network.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
192
Case Study
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
193
SUMM A RY O F K EY T HE MES
Su mma r y
The purpose of this chapter was to highlight the need for organisations to protect
information from misuse. Discussion first centred on the concept of information ethics
and how organisations need to be aware of the moral issues surrounding the development
and use of information and information technology. Information privacy was examined
with an emphasis placed on understanding the legal obligations and general expectations
on organisations in terms of how personal information is collected, shared and stored.
Information security includes the two levels of defence that organisations have to protect
their information resources: people and technology.
You, the business student, must understand that ethics and security of information and
information technology are of paramount importance in organisations today. Organisations that
fail to meet these obligations not only face legal repercussions, but also the wrath of consumers
who have high expectations on how their personal information is handled by companies.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
194
A NZ Ban k
ANZ Bank was the victim of a multi-million dollar scam where a former Vietnamese
refugee, 48-year-old Ho Van Nguyen, was gaoled for attempting fraud using stolen
cheques. The perpetrator had been using stolen blank bank cheques and depositing
large sums into various accounts in Vietnam. He used various methods to transfer the
money including using a stolen cheque to deposit $856 050 into the account of a business
which remits money from Australia to Vietnam. He then visited a Melbourne office of
the business, compelling staff members to transfer the money for him immediately.
Nguyen attempted to defraud the bank of AU $5 million. A Melbourne court found
him guilty of two counts of attempting to obtain financial advantage by deception and
two counts of attempted theft. He was sentenced to three years in gaol.
This highlights how increasingly difficult it is to protect information against fraud
schemes as the market value of personal information grows. In the past, banks were wary
of the cost or customer backlash from adopting network security technologies. Today,
banks are beefing up network security as more customers begin to view security as a key
factor when choosing a bank.
Westpac Ban k
Westpac Bank has strengthened its online protection procedures recently via an added
layer of security known as Extended Validation Certificates. A green address bar will be
revealed to Westpacs customers when using compatible browsers, ensuring them that
theyre on legitimate and safe Westpac websites.
Extended Validation Certificates require organisations to complete a thorough docu-
mentation process verifying their current business licensing and incorporation paperwork.
They also require proof of the entity named on the certificate having authorised the
issuing of the certificate.
Westpac aims to increase customer confidence in their online transactions and to
reduce the threat of hacker attacks.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
195
logging out. They can then only access or unlock the account again by calling a number
and entering their Internet banking password.This method allows control for customers and
peace of mind over the level of protection they wish to have over their banking.
e -Trad e F i na nc i a l Corpora t i on
e-Trade Financial Corporation provides customers with account balances exceeding
US$50 000 with a free Digital Security ID for network authentication. The device displays
a new six-digit code every 60 seconds, which the customer must use to log on. Customers
with accounts under US$50 000 can purchase the Digital Security ID device for US$25.
Barc l ay s Ba nk
Barclays Bank instituted online-transfer delays of between several hours and one day.
The delays, which apply the first time a transfer is attempted between two accounts, are
intended to give the bank time to detect suspicious activity, such as a large number of
transfers from multiple accounts into a single account. The online-transfer delay was
adopted in response to a wave of phishing incidents in which thieves transferred funds
from victims bank accounts into accounts owned by mules. Mules are people who open
bank accounts based on an email solicitation, usually under the guise of a business
proposal. From the mule accounts, the thieves withdraw cash, open credit cards, or
otherwise loot the account.
Barclays also offers accounts of customers actions to compare them with historical
profile data to detect unusual behaviour. For instance, the service would alert the bank to
contact the customer if the customer normally logs on from England and suddenly logs
on from New York and performs 20 transactions.40
?
Questions
1 What reason would a bank have for not wanting to adopt an online-transfer delay policy?
2 What are the two primary lines of security defence and why are they important to
financial institutions?
3 Explain the differences between the types of security offered by the banks in the
examples above. Which bank would you open an account with and why?
4 What additional types of security, not mentioned in the examples above, would you
recommend a bank implement?
5 Identify three policies a bank should implement to help it improve information security.
6 Describe monitoring policies along with the best way for a bank to implement monitoring
technologies.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
196
Sa r b a ne s- Ox l e y
One primary component of the SOX is the definition of which records are to be stored
and for how long. For this reason, the legislation not only affects financial departments
but also IT departments, whose job it is to store electronic records. SOX states that all
business records, including electronic records and electronic messages,must be saved for
not less than five years. The consequences for non-compliance are fines, imprisonment,
or both. Three rules of Sarbanes-Oxley affecting the management of electronic records
address the following areas:
Benefits from Sa r b a n e s - O x l e y
Many businesses are promoting the benefits they received from implementing SOX. General
Electric Co., which spent about $30 million on SOX compliance, has added controls that
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
197
boost investors confidence in the company. United Technologies used SOX to standardise
bookkeeping audits in its disparate businesses around the world. The biggest advantage of
all, though, may be the greater confidence investors have in financial results.
Some officials expected it to take until 2008 for companies, auditors and regulators
to apply the law efficiently. That might appear to be a long time, and it may seem to be
expensive; however, it is a small price to pay to help organisations run smoothly and
renew investor confidence.
Debate continues over the perceived benefits and costs of SOX. Supporters contend that
the legislation was necessary and has played a useful role in restoring public confidence in
the nations capital markets by, among other things, strengthening corporate accounting
controls. Opponents of the Act claim that it has reduced Americas international competitive
edge against foreign financial service providers, claiming that SOX has introduced an overly
complex and regulatory environment into US financial markets.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
198
?
Questions
The vast array of business initiatives from supply chain management, customer relationship
management, business process re-engineering and enterprise resource planning makes
it clear that information technology has evolved beyond the role of mere infrastructure
to the support of business strategy. Today, in more and more industries, IT is a business
strategy and is quickly becoming a survival issue.
Board and executive team agendas are increasingly peppered with, or even hijacked
by, a growing range of IT issues from compliance to ethics and security. In most companies
today, computers are key business tools. They generate, process and store the majority of
critical business information. Executives must understand how IT can affect a business by
successfully addressing a wide range of needsfrom large electronic discovery projects
to the online review of document collections by geographically dispersed teams. A few
examples of executive IT issues follow.
Sexual harassment
A woman employed by a large defence contractor accused her supervisor of sexual
harassment. The woman was fired from her job for poor performance and subsequently
sued her ex-boss and the former employer.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
199
Sto l e n t ra de se c rets
The board of directors of a technical research company demoted the companys founder
and CEO. The executive, disgruntled because of his demotion, was later terminated. It was
subsequently determined that the executive had planned to quit about the same time
he was fired and establish a competitive company. Upon his termination, the executive
took home two computers; he returned them to the company four days later, along
with another company computer that he had previously used at home. Suspicious that
critical information had been taken, the companys attorneys sent the computers to a
computer forensic company for examination.
After making a forensic image backup of the hard drives, the forensic analysis identified
a file directory that had been deleted during the aforementioned four-day period. This
directory had the same name as the competing company the executive had established.
A specific search of the deleted files in this directory identified the executives to do list
file. This file indicated the executive planned to copy the companys database (valued at
US$100 million) for his personal use. Another item specified the executive was to learn
how to destroy evidence on a computer.
The computer forensic companys examination also proved that the executive had
been communicating with other competing companies to establish alliances, in violation
of the executives non-disclosure agreement with the company. It was also shown that
numerous key company files were located on removable computer storage media that
had not been turned over by the executive to the company.42
?
Questions
1 Explain why understanding technology, especially in the areas of security and ethics, is
important for a CEO. How do a CEOs actions affect the organisational culture?
2 Identify why executives in non-technological industries need to worry about technology
and its potential business ramifications.
3 Describe why continuously learning about technology allows an executive to better
analyse threats and opportunities.
4 Identify three things that a CTO CPO or CSO could do to prevent the above issues.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
200
1 . F i r e wa l l d e ci s i o n s
You are the CEO of Inverness Investments, a medium-sized venture capital firm that specialises
in investing in high-tech companies. The company receives over 30 000 email messages per
year. On average, there are two viruses and three successful hackings against the company
each year, which result in losses to the company of about $250 000 per year. Currently, the
company has antivirus software installed but does not have any firewalls.
Your CIO is suggesting implementing 10 firewalls for a total cost of $80 000. The estimated
life of each firewall is about three years.The chances of hackers breaking into the system with the
firewalls installed are about 3 per cent. Annual maintenance costs on the firewalls is estimated
around $15 000. Create an argument for or against supporting your CIOs recommendation to
purchase the firewalls. Are there any considerations in addition to finances?
2 . Pr e v e n t i n g i d e n t i t y t h e ft
The Australian Bureau of Statistics states that identity theft is a major source of personal fraud
throughout Australia. If you are a victim of identity theft, your financial reputation can be
ruined, making it impossible for you to cash a cheque or receive a bank loan. Learning how
to avoid identity theft can be a valuable activity. Research the following websites and draft a
document stating the best ways to prevent identity theft.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
201
hired you to draft a document discussing the different areas of information security, along with
your recommendations for providing a secure e-business environment.
4 . I n f o r m at ion privacy
The Privacy Act gives all Australians the right to view the personal information companies
hold about them on request. Research also shows that 57 per cent of home Internet users
incorrectly believe that when a website has an information privacy policy it will not share
personal information with other websites or companies. In fact, research found that after
showing the users how companies track, extract and share website information to make
money, 85 per cent found the methods unacceptable, even for a highly valued site. Write
a short paper arguing for or against an organisations right to use and distribute personal
information gathered from its website.
5 . Sp yi n g on e mail
Technology advances now allow individuals to monitor computers that they do not even have
physical access to. New types of software can capture an individuals incoming and outgoing
email and then immediately forward that email to another person. For example, if you are at
work and your child is home from school and she receives an email from John at 3.00 pm, at
3.01 pm you will receive a copy of that email sent to your email address. A few minutes later,
if she replies to Johns email, within seconds you will again receive a copy of what she sent to
John. Describe two scenarios (other than the above) for the use of this type of software: (1)
where the use would be ethical, (2) where the use would be unethical.
6. S t e a l i n g soft ware
The software industry fights against pirated software on a daily basis. The major centres of
software piracy are in places like Russia and China, where salaries and disposable income are
comparatively low. People in developing and economically depressed countries will fall behind
the industrialised world technologically if they cannot afford access to new generations of
software. Considering this, is it reasonable to blame someone for using pirated software
when it could potentially cost him or her two months salary to purchase a legal copy? Create
an argument for or against the following statement: Individuals who are economically less
fortunate should be allowed access to software free of charge in order to ensure that they are
provided with an equal technological advantage.
7 . Act i n g e t h ical l y
Assume you are an IT manager and one of your projects is failing. You were against the project
from the start; however, the project had powerful sponsorship from all of the top executives.
You know that you are doomed and that the project is doomed. The reasons for the failure are
numerous, including: the initial budget was drastically understated; the technology is evolving
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
202
and not stable; the architecture was never scaled for growth; and your resources do not have
the necessary development skills for the new technology. One of your team leades has come
to you with a plan to sabotage the project that would put the project out of its misery without
assigning any blame to the individuals working on it. Create a document detailing how you
would handle this situation.
1 . G r a d i n g s e cu r i t y
Making The Grade is a non-profit organisation that helps students learn how to achieve better
marks in school.The organisation has 40 offices in five states and more than 2000 employees.The
company wants to build a website to offer its services online. Making The Grades online services
will provide parents with seven key pieces of advice for communicating with their children to
help them achieve academic success. The website will offer information on how to maintain
open lines of communication, set goals, organise teachers, regularly track progress, identify
trouble spots, get to know their childs teacher and celebrate their childrens successes.
Project Focus
You and your team work for the director of information security. Your teams assignment is to
develop a document discussing the importance of creating information security policies and an
information security plan. Be sure to include the following:
2 . Eye s e v e r yw h e r e
The movie Minority Report chronicled a futuristic world where people are uniquely identifiable
by their eyes. A scan of each persons eyes gives or denies them access to rooms, computers
and anything else with restrictions. The movie portrayed a black market in new eyeballs to help
people hide from the authorities. (Why did they not just change the database entry instead?
That would have been much easier, but a lot less dramatic.)
The idea of using a biological signature is entirely plausible since biometrics is currently
being widely used. In fact, it is expected to gain wider acceptance in the near future because
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
203
forging documents has become much easier with advances in computer graphics programs
and colour printers. The next time you get a new passport, it may incorporate a chip that has
your biometric information encoded on it.
Project Focus
a How do you feel about having your fingerprints, facial features and perhaps more of your
biometric features encoded in documents like your passport? Explain your answer.
b Would you feel the same way about having biometric information on your drivers license
as on your passport? Why or why not?
c Is it reasonable to have different biometric identification requirements for visitors
from different nations? Explain your answer. What would you recommend as criteria for
deciding which countries fall into what categories?
d The checkpoints that US citizens pass through upon returning to their country vary
greatly in the depth of the checks and the time spent. The simplest involves simply
walking past the border guards who may or may not ask them their citizenship. The
other end of the spectrum requires putting up with long waits in airports, lining up with
hundreds of other passengers while each person is questioned and must produce a
passport to be scanned. Do you think that the disadvantages of the reduction in privacy,
caused by biometric information, outweigh the advantages of better security and faster
border processing? Explain your answer.
3 . Se t t i n g boundaries
Even the most ethical people sometimes face difficult choices. Acting ethically means
behaving in a principled fashion and treating other people with respect and dignity. It is
simple to say, but not so simple to do since some situations are complex or ambiguous. The
important role of ethics in our lives has long been recognised. As far back as 44 BC, Cicero
said that ethics are indispensable to anyone who wants to have a good career. Having said
that, Cicero, along with some of the greatest minds over the centuries, struggled with what
the rules of ethics should be.
Our ethics are rooted in our history, culture and religion, and our sense of ethics may shift
over time. The electronic age brings with it a new dimension in the ethics debatethe amount
of personal information that we can collect and store, and the speed with which we can access
and process that information.43
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
204
Project Focus
a A senior marketing manager informs you that one of her subordinates is looking for
another job and she wants you to give her access to look through that employees email.
b A sales manager informs you that he has made a deal to provide customer information to
a strategic partner, and he wants you to burn all of the customer information onto a DVD.
c You are asked to monitor a subordinates email to discover if he is sexually harassing
another employee.
d You are asked to install a video surveillance system in your office to see whether
employees are taking office supplies home with them.
e You are looking on the shared network drive and discover that your bosss entire hard
drive has been copied to the network for everyone to view. What do you do?
f You have been accidentally copied on an email from the CEO, which details who will be
the targets of the next round of redundancies. What would you do?
4. C o n t e m p l a t i n g s h a r ing
Bram Cohen is the creator of BitTorrent one of the most successful peer-to-peer (P2P) programs
ever developed. BitTorrent allows users to quickly upload and download enormous amounts
of data, including files that are hundreds or thousands of times bigger than a single MP3.
BitTorrents program is faster and more efficient than traditional P2P networking.
Cohen showed his code to the world at a hacker conference, as a free, open-source project
aimed at computer users who need a cheap way to swap software online. But the real audience
turns out to be TV and movie fanatics. It takes hours to download a ripped episode of Heroes
or the movie Black Knight from KaZaA, but BitTorrent can do it in minutes. As a result, more
than 20 million people have downloaded the BitTorrent application. If any one of them misses
a favourite TV show, no worries. surely someone has posted it as a torrent. As for movies, if you
can find it at Blockbuster, you can probably find it online somewhereand use BitTorrent to
download it. Give and ye shall receive became Cohens motto, which he printed on T-shirts
and sold to supporters.44
Project Focus
There is much debate surrounding the ethics of peer-to-peer networking. Do you believe
BitTorrent is ethical or unethical? Justify your answer.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
205
Endnotes
1 David Thompson, AXS-One Pty Ltd; www. 17 www.vault.com, accessed January 2006.
axsone.com. 18 http://news.digitaltrends.com/news-
2 Pursuant to Title 17, United States Code, article/19631/personal-internet-use-at-
Section 512(c)(3); www.kazaa.com/us/eula. work-increases-productivity, accessed May
htm. 2009.
3 Michael Schrage, Build the Business Case, 19 www.news.com.au/adelaidenow/
CIO magazine, www.cio.com, accessed 17 story/0,22606,25119220-2682,00.html,
November 2003. accessed May 2009.
4 ASIO Report to Parliament 20072008, p. 20 Australian Bureau of Statistics, Working
32, www.asio.gov.au/Publications/content/ Arrangements, November 2003.
CurrentAnnualReport/Content/Cover.aspx, 21 AMA Research, Workplace monitoring and
accessed 6 May 2009. surveillance, www.amanet.org.
5 The Office of the Federal Privacy Commis- 22 The booklet is available from www.privacy.
sioner, Community Attitudes Towards Privacy org.nz.
2004, 18 June 2004. 23 www.marketresearch.com/product/print/
6 Scott Berianato, Take the Pledge, CIO default.asp?g=1&productid=1939741, ac-
magazine, www.cio.com, accessed 17 No- cessed 6 May 2009.
vember 2003. 24 www.gartner.com/it/page.jsp?id=751215,
7 U v Betting Agency [2008] PrivCmrA 21. accessed 6 May 2009. This research, car-
8 Scott Berianato, Take the Pledge, CIO ried out in March 2008, surveyed 156 IT
magazine. security professionals (50 in Australia, 54 in
9 www.smh.com.au/news/biztech/dogged- China and 52 in India).
aussie-detective-work-reveals-10m- 25 2005 CSI/FBI computer crime and security
ripoff/2008/09/30/1222651059903.html, survey, www.gocsi.com, accessed 20 Febru-
accessed 6 May 2009. ary 2006.
10 AMA Research, Workplace Monitoring and 26 www.ey.com, accessed 25 November 2003.
Surveillance, www.amanet.org, accessed 1 27 Courtesy of Barry Mahoney, Manager IT
March 2004. Services, USC, March 2009.
11 Office of the Privacy Commissioner, Guide- 28 www.zdnet.com.au/news/hardware/soa/
lines on Workplace E-mail, Web Browsing Staff-sacked-after-widespread-privacy-breach-
and Privacy, March, 2000, available at www. es-at-Centrelink/0,130061702,339282381,00.
privacy.gov.au/internet/email/index.html. htm?feed=pt_security, accessed 6 May 2009.
12 AMA Research, Workplace Monitoring and 28 Darren Pauli, Uni fortifies Western Front
Surveillance, www.amanet.org. with IDS, CIO magazine (Australia), 22
13 K. Dearne, SunRice says you can can spam, February 2008.
curb web use, The Australian, 28 August 30 Losses from Identity Theft to Total $221
2007. Billion Worldwide, www.cio.com, accessed
14 Business First, Counting the Cost of Spam, 23 May 2003.
The Australian, 1 March 2005. 31 P. Yacano and K. Lynch, Once is enough:
15 Andy McCue, Bank Boss Quits after Porn single sign on, Australasian Conference
Found on PC, www.businessweek.com, on Information Systems, Toowoomba,
accessed June 2004. Queensland, 57 December 2007.
16 Office of the Federal Privacy Commissioner, 32 Australian Bureau of Statistics, Personal
Community Attitudes Towards Privacy 2004. Fraud, 27 June 2007.
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
206
This material is distributed for marketing purposes. No authorised printing or reproduction permitted. (c)Mc-Graw-hill Australia.
207