What steps might have been taken to prevent his perpetrating

Assignment Help Management Information Sys
Reference no: EM132254143

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation.

In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business.

Six months after David's departure, it is discovered that a good deal of the ABC Company's research has suddenly been duplicated by a competitor.

Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David's alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Reference no: EM132254143

Questions Cloud

Expensive disaster for an organization to plan : What do you think is the most difficult and expensive disaster for an organization to plan for? Do you think companies plan adequately?
What you have learned about solving a particular problem : Literature review is a very important tool that helps you to organize the research that has been done on a subject or problem that you may be experiencing.
Draw the number for eachtreenode : Draw the binary search tree that results from adding the following values (in the following order) into an empty binary search tree:
The dentist as lion killer : Walter Palmer is not your ordinary dentist. Instead of playing golf to relax, Palmer kills large game animals using only a bow and arrow.
What steps might have been taken to prevent his perpetrating : Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data.
What is the overall average access time : If the average access time for RAM is 32 nsec and the average access time for cache memory is 6 nsec, what is the overall average access time
What steps can we take to restore the balance : In responding to your classmates, discuss if the division of power between the states and national government is now out of balance.
Temporary visas-permanent job loss : Finding employees with specialized technical skills can be difficult for American high-tech firms like Microsoft, Intel, Google, and Apple.
Design the logic for a program that has two parts : Practice: array minimum, maximum and average Design the logic for a program that has two parts.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What is project portfolio management

Discuss why many IT professionals may overlook project cost management and how this might affect the ability to complete projects within budget.

  Discuss about the criminal justice system

There is a flow chart depicting how a case passes through the criminal justice system, as well as some case law that affects digital evidence.

  Discuss a good way to make strategic information or any

discuss a good way to make strategic information or any market information available to the internal stakeholder groups

  What kinds of considerations should an hr person have

What kinds of controls would you have in an accounting environment to avoid potential embezzlement? Name at least 5 controls and discuss how they would prevent someone from being able to embezzle money.

  Developing and growing a global supply chain

What if a company never had a global supply chain and wanted to grow that supply chain? How would you go about developing the supply chain if it did not exist?

  Risk management and business continuity issues

Data within an enterprise is complex at best. To better deal with a wide range of data, each type of which has unique access and security requirements, enterprise information architects often create data domains. Risk management and business conti..

  Create an acceptable use policy for the organization

Create an Acceptable Use Policy for the organization the student has chosen. In a separate discussion (meaning outside of the policy) talk about the tools and processes that can be used for investigate violations.

  What is a process improvement

What is a process improvement? Why and when is it necessary? What are some specific tools (IS or management) organizations can use to improve their business processes

  Explain current european and united states industry standard

Critically analyze current European and United States industry standards or recommendations for any Information Technology (IT) area or subarea.

  Explain the process within public key systems

Role of Technology, etc. and Explain the process within public key systems if you want to support non-repudiation and securing the message.

  Research the internet to obtain information on windows

Review the critical considerations to prepare a Group Policy that ensures secuirty, accountability, and availability.

  Discuss the security monitoring

Considering your place of employment or your home computing environment, discuss in detail the way in which in-depth (or layered) defense is employed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd