Write a review paper about the corporate espionage

Assignment Help Management Information Sys
Reference no: EM131886741

Instructions: Add additional insight to these opinions or challenge the opinions. Use real world experience to support your views, as appropriate.

1) No industry is safe from corporate espionage just ask the Houston Astros of Major League Baseball fame. The Astros were the victims of corporate espionage performed by an employee of the St Louis Cardinals organization. Lasting through parts of 2013 and 2014, the espionage occurred when an employee of the Cardinals accessed Houston's internal "Ground Control" computer database (HNGN, 2016).

In the article I chose to review this week Jason Eaddy, a digital forensics expert at Stroz Friedberg, explains how the espionage was uncovered through the use of digital forensics.

Once it was discovered that unauthorized access of their internal system had occurred, Houston needed to determine exactly how an outsider was able to compromise their system. In comes digital forensics and an organization like Stroz Friedberg to conduct an investigation of the incident.

Stealing intellectual property is no joke and the penalties if caught can be quite severe. Some of the questions the article posed included how was the perpetrator tracked down, how was the hack conducted and what are the consequences of this type of activity (HNGN, 2016). Jason Eaddy broke down exactly how the Cardinals employee was able to hack into Houston's system.

It started when another Cardinals employee had to turn in a laptop owned by the Cardinals as he was leaving the organization for a position with Houston. The password for this laptop was also turned over and the Cardinals employee used this information to guess the password that allowed him to access the outgoing employees new Houston email account (HNGN, 2016). Eaddy goes on to explain that due "Ground Control" being a web based program the Cardinals employee was able to gain information that aided him in hacking the system (HNGN, 2016).

Eventually Houston changed the URL and user account passwords for "Ground Control" due to security concerns but failed to require email password changes. This allowed the Cardinals employee to once again access Houston email account which had emails containing the user's new password and the new URL to the system (HNGN, 2016). The result of this attack was the Cardinals employee gaining access to draft and scouting reports, analytics and many other trade secrets for the Houston Astro's organization.

Thankfully a digital forensic investigation allowed Houston and law enforcement officials to catch the perpetrator. The penalties for corporate espionage can be stiff. In this scenario the results after a plea deal amounted to well over a million dollars that the Cardinals employee would have to pay in damages to Houston.

2) I chose an article about employee internet abuse by Dr. Young, 2011, titled Internet Abuse in the Workplace. I chose this topic because this is a topic that tends to irritate me and I have personal experience dealing with this topic from multiple perspectives, as a customer, an employee, and from a managers point of view as well.

Internet abuse in the workplace is a continually growing issue throughout many organizations. Studies have shown that employees are using the internet in the workplace during working hours for extensive personal and inappropriate use (Young, 2011). Depending on what research you review employers state that employees are spend between one and three hours a day surfing the internet and web on personal business while at work (Heathfield, 2018).

In an effort to combat employee internet abuse implementation of software monitoring and employee acceptable internet use policies have proven to be ineffective measures to stop employee internet misuse and abuse (Young, 2011). Among top abuses of internet use in the workplace were listed as being viewing pornography, online gambling, investing, watching sports, and online shopping (Young, 2011).

There are a multitude of reasons organizations attempt to limit the "surfing" of the internet by employees. One major concern is the financial cost in productivity lost. Individuals misusing, or over using for personal use, the internet at work was previously estimated to cost billions of dollars in lost productivity annually (Young, 2011). Another reason employee internet abuse is such a concern is because it is a way computer and network systems are vulnerable to attacks.

Through inappropriate sites, clicking on unsecure links, and downloading unsafe files and "cookies" an organizations information systems become vulnerable to infiltration. Significant concerns can arise for information integrity, database security, and networking functionality (Young, 2011).

Overall training and education has helped reduce incidents but does not stop completely employee internet abuse. Even though there is software out there to monitor use and to block and prevent access to certain websites, employees have a knack of finding their way around these preventers quite often.

My own personal experience with employee internet abuse has been varied by position and employment location and status, but has had far reaching effects. One of my biggest pet peeves is when I go into an office and a subordinate is supposed to be working on a project and instead they are on a social media website, like facebook, or watching videos on Youtube, delaying the product they are supposed to be completing.

Although I do believe there is a time and place for web surfing and personal actions while at work, work should always come first while at work, and any allowed surfing should be a privilege used wisely, not a right expected by an employee. I am a big fan of user agreement policies, and an even bigger fan of direct harsh consequences for violating such agreements.

Reference no: EM131886741

Questions Cloud

Describe sing pseudocode an algorithm that takes : 1. Describe sing pseudocode an algorithm that takes a list of n integers a1, a2, ..., an, and finds the sum of all positive integers in the list.
What is the marginal revenue product for the fifth unit : Marginal Revenue Product and Demand- If the product price is $2 per unit, What is the marginal revenue product for the fifth unit of the variable input.
Example of a short program in c : Can someone show me an example of a short program in C that uses a for loop to populate an array. The array can store up to 10 integers that can also average.
Discuss about the opportunities and threats : Grit and Growth" The theme this week ("Friends and Enemies") introduced the idea that tangible or intangible resources or obstacles can serve as your friends.
Write a review paper about the corporate espionage : No industry is safe from corporate espionage just ask the Houston Astros of Major League Baseball fame.
Retrieve sids of suppliers rating : 1-Consider the relations: Suppliers(SID, Sname, Rating) Parts(PID, Pname, Color)
Write a legal policy memorandum to the chief of police : CJ 500 Module Two Legal Policy Memorandum Guidelines. write a legal policy memorandum to the chief of police proposing a strategy to minimize negative impact
Bradstreet as puritan woman poet : Read every assignment, and pay attention to the major themes of each literary period and the individual authors in them, then, you should do very well
Determine an architecture for payroll applications : Determine an architecture for payroll applications and state the easiest and the challenging part of each.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Develop an it mission and vision for the organization

Using the case provided, analyze the business environment described to develop of an IT Strategic Plan. Identify the business' strategic objectives, develop an IT mission and vision for the organization

  Explain how using edi facilitates electronic transactions

Describe the relationship between Electronic Health Records, reimbursement, HIPAA, and EDI transactions.

  Explain the purpose of the entity company code

Explain the purpose of the entity ‘Company Code'. How many company codes can an enterprise have and why? Explain the purpose of a chart of accounts. How many Charts of Accounts can a company code have, and why

  Differences between data warehouses and data marts

Write a one- to two-page (250-500 word) paper that discusses the differences between data warehouses and data marts. Also, discuss how organizations can use data warehouses and data marts to acquire data. You must use the CSU Online Library to loca..

  Create a query that can produce results

Construct a trigger that will increase the field that holds the total number of tours sold per salesperson by an increment of one (1).

  Discuss cloud computing and cloud storage

Discuss cloud computing and cloud storage, Describe mass storage devices, including enterprise storage systems, file servers, network attached storage, RAID systems, organizational cloud storage, and storage area network systems.

  Riordan manufacturing mba 530 analysisbased on riordan

riordan manufacturing mba 530 analysisbased on riordan manufacturing scenario answer the following questions.step 1

  Using gis in business discuss the given articles

Write 5 "takeaways" from the files below. This is intended to be a reflective process, so each of your five takeaways should be explained.

  Can one tool be used for managing more than one area

In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and(3) asset management. Compare and contrast, at least, one tool for each of the three network management are..

  Discuss the criteria for successful collaboration

Explain the differences between cooperation and collaboration, and then discuss the criteria for successful collaboration.

  Write a paper explaining business uses of cloud computing

Write a paper explaining the business uses of cloud computing and Web 2.0. Your paper should be 3-5 pages in length and explain the business uses of each

  Write one paragraph identifying the logical flaw

For each of the following claims, write one paragraph identifying the logical flaw: The election couldn't have been fair-I don't know anyone who voted for the winner

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd