BINS 7350-01 Information Systems Management Ethics Case Analysis – Spring 2015 Due: March 30, 2015 at 6:00 p.m. (Total Points: 50) Read the following case description of an IT crisis and answer the questions posed at the end of the description. A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow. IVK Corporation experienced a sudden shutdown of the customer relationship management (CRM) enterprise information system. The information system shutdown was caused by extensive traffic entering IVK’s network of CRM servers from many locations—an …show more content…
What would be the reaction of the analysts to this news? In order to protect stockholder investments in IVK, management made the following decisions in response to the crisis: Build a mirror CRM production system over the next two weeks so that a rebuilding of the main CRM system could occur to plug security holes and assure that another DoS attack would not be successful. Keep secret from the public that this possible security breach occurred. Make no mention of the occurrence in the analyst conference. “Hold our breath” and hope for the best—that customer data were not compromised. Analyze the case from an ethics perspective: a. Identify the ethical dilemma faced by the CIO in this situation using the three normative theories of business ethics. Identify all stakeholders involved. How will each stakeholder group be affected by the decision taken by the management? b. Apply Mason’s PAPA framework to this situation. c. If you were the CIO, what would you have done differently to protect all stakeholders? Write a 2-3 page (single spaced, Times New Roman, 12-point font size) report answering each of the questions above. Use APA format for references. Each reference should have a matching in-text citation and vice versa. Analyses which integrate the material from the text book, class discussions, and external reference sources will receive higher points than those which don’t. Today's senior executives are confronted with situations
event of a catastrophic disruption (fire) or disaster (hurricane) and a major IT or data center outage occurs
The trusted computing base (TCB) internal network in the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems without which the company’s operations and financial situation would suffer. The Oracle database and email systems are among the most intensively used application servers in the company. As we know, GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence.
5. Discuss the professional ethics and responsibilities of intermediaries, managerial responsibility and loyalty, and employee responsibilities to the
In this case scenario I would do my job and give them out to the families that have a limited income and cannot afford them. If one sees that they are coming to the expiration date soon then I would believe that it is okay to take them home then, but these samples are for those less fortunate. It is ethically correct to not take the samples home unless they are about to expire and be wasted, but only then. Legally it is not yours to take home it is for the patients.
GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence. GFI’s failure to incorporate proper firewall devices at Internet access points can be linked to DOS network attacks and Oracle database and email servers being down.
4. Identify and describe any potential ethical issues that could arise in connection with the new architecture.
In round two of the simulation, an attack on DTL Power left services down for hours last Wednesday. The cyber-attack left residential, business, and government customers in the dark for hours. During the forensic investigation, evidence revealed that the cause of the attack was a worm intrusion that caused a reduction in DTL system functions. This reduction in system functions resulted in an excessive amount of downtime. The confidentiality, integrity, and availability of DTL?s system was compromised. Cyberterrorism tools such as port scanners were found in our system. These tools were not detected prior to the investigation.
After review the table l decided not to disclose any information because the harm was more than benefit. Based on the information provided the percentage of infection is very small. The side effective of action is more harmful because the company might close down and coworker will lose job, so many lawsuits in court from previous patients, I will not be able to support my family because l won’t have a job.
* Things we want out of life and things we expect others want out of life too
behavior can succeed the actions and efforts of the student in completing his or her degree.
When taking a look deep into an organization’s different departmental operation, it becomes clear how to plan to protect the most data and also which areas is more operation critical. While preventing interruption is the most important aspect of this plan, no one can predict the weather or any other attack. As part of the steps to implement the business continuity plan, Sunshine Machine Works will need to document a risk management plan, business impact analysis, incident response plan, plan activation, incident response team, communications, contact list and recovery plan section. Once all has been documented, the organization will need to test, evaluate and update schedule.
Moral issues are those that arouse conscience, are concerned with important values and norms. The use of a tool such as the Ethical Decision-Making Algorithm in appendix A, can help the nurse resolve an ethical dilemma more efficiently and competently. Furthermore, the use of a nursing codes of ethics, which are formal statements standard for professional actions can help guild a nurses decisions. Nurses have multiple obligations to balance in moral situation. The Ethical Decision-Making Algorithm will be used to find the best action and outcome for a case study.
b. What are some of the reasons for the ARC's ethical dilemmas, and how can the organization guarantee that these problems will not recur in the future?
iPremier’s procedures were absolutely deficient. They had an outdated emergency manual that employees couldn’t find, and almost couldn’t access the data center. Additional measures they could have implemented long before the attack include revising the emergency procedure and making sure all employees know how to follow it. 3. Now the attack has ended, what can the iPremier Company do to prepare for another such attack?
Computer and network security incidents have become a fact of life for most organizations that provide networked information technology resources including connectivity with the global Internet. Current methods of dealing with such incidents are at best piecemeal relying on luck, varying working practices, good will and unofficial support from a few individuals normally engaged in central network or systems support. This approach undoubtedly leads to inefficiencies and associated problems with respect to: