Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Instructions: Add additional insight to these opinions or challenge the opinions. Use real world experience to support your views, as appropriate.

1) No industry is safe from corporate espionage just ask the Houston Astros of Major League Baseball fame. The Astros were the victims of corporate espionage performed by an employee of the St Louis Cardinals organization. Lasting through parts of 2013 and 2014, the espionage occurred when an employee of the Cardinals accessed Houston's internal "Ground Control" computer database (HNGN, 2016).

In the article I chose to review this week Jason Eaddy, a digital forensics expert at Stroz Friedberg, explains how the espionage was uncovered through the use of digital forensics.

Once it was discovered that unauthorized access of their internal system had occurred, Houston needed to determine exactly how an outsider was able to compromise their system. In comes digital forensics and an organization like Stroz Friedberg to conduct an investigation of the incident.

Stealing intellectual property is no joke and the penalties if caught can be quite severe. Some of the questions the article posed included how was the perpetrator tracked down, how was the hack conducted and what are the consequences of this type of activity (HNGN, 2016). Jason Eaddy broke down exactly how the Cardinals employee was able to hack into Houston's system.

It started when another Cardinals employee had to turn in a laptop owned by the Cardinals as he was leaving the organization for a position with Houston. The password for this laptop was also turned over and the Cardinals employee used this information to guess the password that allowed him to access the outgoing employees new Houston email account (HNGN, 2016). Eaddy goes on to explain that due "Ground Control" being a web based program the Cardinals employee was able to gain information that aided him in hacking the system (HNGN, 2016).

Eventually Houston changed the URL and user account passwords for "Ground Control" due to security concerns but failed to require email password changes. This allowed the Cardinals employee to once again access Houston email account which had emails containing the user's new password and the new URL to the system (HNGN, 2016). The result of this attack was the Cardinals employee gaining access to draft and scouting reports, analytics and many other trade secrets for the Houston Astro's organization.

Thankfully a digital forensic investigation allowed Houston and law enforcement officials to catch the perpetrator. The penalties for corporate espionage can be stiff. In this scenario the results after a plea deal amounted to well over a million dollars that the Cardinals employee would have to pay in damages to Houston.

2) I chose an article about employee internet abuse by Dr. Young, 2011, titled Internet Abuse in the Workplace. I chose this topic because this is a topic that tends to irritate me and I have personal experience dealing with this topic from multiple perspectives, as a customer, an employee, and from a managers point of view as well.

Internet abuse in the workplace is a continually growing issue throughout many organizations. Studies have shown that employees are using the internet in the workplace during working hours for extensive personal and inappropriate use (Young, 2011). Depending on what research you review employers state that employees are spend between one and three hours a day surfing the internet and web on personal business while at work (Heathfield, 2018).

In an effort to combat employee internet abuse implementation of software monitoring and employee acceptable internet use policies have proven to be ineffective measures to stop employee internet misuse and abuse (Young, 2011). Among top abuses of internet use in the workplace were listed as being viewing pornography, online gambling, investing, watching sports, and online shopping (Young, 2011).

There are a multitude of reasons organizations attempt to limit the "surfing" of the internet by employees. One major concern is the financial cost in productivity lost. Individuals misusing, or over using for personal use, the internet at work was previously estimated to cost billions of dollars in lost productivity annually (Young, 2011). Another reason employee internet abuse is such a concern is because it is a way computer and network systems are vulnerable to attacks.

Through inappropriate sites, clicking on unsecure links, and downloading unsafe files and "cookies" an organizations information systems become vulnerable to infiltration. Significant concerns can arise for information integrity, database security, and networking functionality (Young, 2011).

Overall training and education has helped reduce incidents but does not stop completely employee internet abuse. Even though there is software out there to monitor use and to block and prevent access to certain websites, employees have a knack of finding their way around these preventers quite often.

My own personal experience with employee internet abuse has been varied by position and employment location and status, but has had far reaching effects. One of my biggest pet peeves is when I go into an office and a subordinate is supposed to be working on a project and instead they are on a social media website, like facebook, or watching videos on Youtube, delaying the product they are supposed to be completing.

Although I do believe there is a time and place for web surfing and personal actions while at work, work should always come first while at work, and any allowed surfing should be a privilege used wisely, not a right expected by an employee. I am a big fan of user agreement policies, and an even bigger fan of direct harsh consequences for violating such agreements.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92715088
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Using microsoft project or other similar software create a

Using Microsoft Project or other similar software create a GANTT chart for a hypothetical project that involves at least 7 tasks, and two milestones. In your posting, include enough support material to describe the proje ...

Discussion often laws and regulations have an immediate

Discussion : Often laws and regulations have an immediate impact on IT professionals and the security position of an organization. These laws seek to establish and implement controls; maintain, protect, and assess compli ...

In the week 1 discussion you identified one 1 example of a

In the Week 1 discussion, you identified one (1) example of a business function or operation and the business rules associated with information you would want to store about a student at a university. You will build upon ...

Transformation at bank of america an enterprise systems

Transformation at Bank of America: An Enterprise Systems Analysis: MIT SDM Systems Thinking Webinar Serieswallance By Daniel Wallance, SDM ’11 Please watch the webinar and write a two pages report to include the backgrou ...

Question in roughly 200 words - explain how organizations

Question : In roughly 200 words - Explain how organizations determine what an "acceptable" level of risk is, and how this plays a role in risk management and continuity planning. The response must be typed, single spaced ...

Assignment 1resource read ch 3 to 4 of the spirit catches

Assignment 1 Resource: read Ch. 3 to 4 of The Spirit Catches You and You Fall Down. After reading the article write a 175- to 265-word response to the following: do publicly funded health care programs overrule cultural ...

Assignment 1 question 1 should cultures within the united

Assignment 1 Question 1 Should cultures within the United States be expected to set aside some traditions or beliefs and integrate under a united social contract? And Why? 300-word response Assignment 2 In response to fe ...

Question in roughly 200 words - explain what social

Question : In roughly 200 words - Explain what social engineering is, and discuss how organizations can recognize social engineering and reduce the risks associated with it. The response must be typed, single spaced, mus ...

Characterizing the existing internetwork please respond to

"Characterizing the Existing Internetwork." Please respond to the following: • Explain the process of characterizing a new internetwork using the OSI model as its foundation. What tools would you use to assist in your pl ...

Part 1 - create an 8 slide powerpoint presentation on

Part 1 - Create an 8 slide PowerPoint presentation on foundational concepts specific to physical security. Part 2 - Write 4 pages detailing the framework for the design of an integrated data center. Assessment Instructio ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As