Principles of Information System Security: Text and Cases Gurpreet Dhillon PowerPoint Prepared by Youlong Zhuang University of Missouri-Columbia.

Slides:



Advertisements
Similar presentations
Organizational Behavior, 8e Schermerhorn, Hunt, and Osborn
Advertisements

ACCOUNTING INFORMATION SYSTEMS
Information Technology Project Management
Information Technology Project Management
By Edgar K. Browning & Mark A. Zupan John Wiley & Sons, Inc.
Organizational Behavior, 9/E Schermerhorn, Hunt, and Osborn Prepared by Michael K. McCuddy Valparaiso University John Wiley & Sons, Inc.
Principles of Information System Security: Text and Cases
Chapter 81 Creating a Production Process Chapter 8 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John.
© Copyright 2011 John Wiley & Sons, Inc.
Chapter 1: Financial Accounting and Accounting Standards
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
POKOK BAHASAN Pertemuan 25 Matakuliah: Sistem Informasi Manajemen Tahun: 2008.
Organizational Behavior, 9/E Schermerhorn, Hunt, and Osborn Prepared by Michael K. McCuddy Valparaiso University John Wiley & Sons, Inc.
Chapter 18: Controlling – Processes and Systems
By Edgar K. Browning & Mark A. Zupan John Wiley & Sons, Inc.
Chapter 101 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Chapter 141 Establishing a Culture of Quality Chapter 14 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published.
Chapter 12 Managing Team Performance Management 1e Management 1e Management 1e - 2 Management 1e Learning Objectives  Describe why.
Chapter 8 Setting Goals Management 1e 8- 2 Management 1e 8- 2 Management 1e 8- 2 Management 1e Learning Objectives  Describe the primary goals.
Chapter 3: Data Modeling
Chapter 201 Statistical Techniques for Achieving Quality Chapter 20 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter.
Evaluating and Terminating the Project
Managerial Accounting by James Jiambalvo Chapter 1: Introduction to Managerial Accounting Slides Prepared by: Scott Peterson Northern State University.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
Information Technology Project Management
2-1 Information Technologies Concepts and Management.
Organizational Behavior, 9/E Schermerhorn, Hunt, and Osborn
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Defining Project Management Today Text by Stanley E. Portny, Samuel J Mantel, Jack R. Meredith, Scott M. Shaffer, Margaret M. Sutton with Brian Kramer.
Accounting Principles, Ninth Edition
15-1 Chapter 15 Building Communities Applying Innovation By David O’Sullivan and Lawrence Dooley © Sage Publications 2008.
PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 3rd Edition Copyright 2006 © John Wiley & Sons, Inc. All rights reserved.
PowerPoint Presentation for Dennis, Wixom & Tegarden Systems Analysis and Design Copyright 2001 © John Wiley & Sons, Inc. All rights reserved. Slide 1.
Chapter 13: Control processes and systems
© Copyright 2011 John Wiley & Sons, Inc.
Chapter 101 The Design Process Chapter 10 Achieving Quality Through Continual Improvement Claude W. Burrill / Johannes Ledolter Published by John Wiley.
Slide 1 Systems Analysis and Design with UML Version 2.0, Second Edition Alan Dennis, Barbara Wixom, and David Tegarden Chapter 8: Behavioral Modeling.
Chapter 1 Management in the 21 st Century. Management 1e Learning Objectives  Define management  Describe a manager’s four major tasks  Describe sustaining.
Chapter 111 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Chapter 16 Information and Operations Management 1e Management 1e - 2 Management 1e Learning Objectives  Explain how managers use controls.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 8-1 Introduction to Information Technology Chapter.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Chapter 10 Structuring Organizations Management 1e Management 1e Management 1e - 2 Management 1e Learning Objectives  Explain how.
© 2007 John Wiley & Sons Chapter 15 - Organizational Issues PPT 15-1 Organizational Issues Chapter Fifteen Copyright © 2007 John Wiley & Sons, Inc. All.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
Chapter 14 Venture Capital Copyright¸ 2003 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Copyright 2006 John Wiley & Sons, Inc. Beni Asllani University of Tennessee at Chattanooga Operations Management - 5 th Edition Chapter 10 Supplement Roberta.
Principles of Information System Security: Text and Cases
Chapter 171 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
I- 1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
International Economics Tenth Edition
I-1. I-2 I ACCOUNTING FOR SOLE PROPRIETORSHIPS Accounting, Fifth Edition.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Principles of Information System Security: Text and Cases
MICROECONOMICS: Theory & Applications
Valparaiso University
The Quality System Chapter 13
Roberta Roth, Alan Dennis, and Barbara Haley Wixom
Chapter 1 a strategic approach to organizational behavior
Establishing a Culture of Quality
Information Technology Project Management
Organizational Behavior, 9/E Schermerhorn, Hunt, and Osborn
Presentation transcript:

Principles of Information System Security: Text and Cases Gurpreet Dhillon PowerPoint Prepared by Youlong Zhuang University of Missouri-Columbia

Principles of Information System Security: Text and Cases Chapter Ten Security of Informal Systems in Organizations: An Introduction

Copyright 2006 John Wiley & Sons, Inc.10-3 Learning Objectives Understand the concept of pragmatics Interpret of silent messages Explain the results of technology interventions Understand the informal behavior

Copyright 2006 John Wiley & Sons, Inc.10-4 Why Is Informal System Important? Informal system is the natural means to sustain the formal system The formal systems cannot work on their own unless people adopt and accept them It is often the softer issues that have had an adverse impact on the security

Copyright 2006 John Wiley & Sons, Inc.10-5 What Is Pragmatics? Pragmatics is the term used to describe the context of an activity, the characteristics of the people, and the prevalent acts of communication Context is a set of signs that relate in a certain way A sign is a result of a mental connection between a sign-vehicle and the content

Copyright 2006 John Wiley & Sons, Inc.10-6 What Is Pragmatics? (Cont’d) The sign-vehicle could take the form of an expression such as a sound or a word The content relates to the image of what is signified The link between sign-vehicle and the content is arbitrary

Copyright 2006 John Wiley & Sons, Inc.10-7 Constituents of Pragmatics, Fig 10.1

Copyright 2006 John Wiley & Sons, Inc.10-8 What Is Pragmatics? (Cont’d) There are three particular relations that constitute pragmatics The relation between the sign and a concept It is a causal relationship It means nothing without the context and the culture It is significant impacted by social and psychological factors

Copyright 2006 John Wiley & Sons, Inc.10-9 What Is Pragmatics? (Cont’d) The relation between a concept and a referent It is based on the notion that all concepts are grounded in reality The name and image for a particular ‘thing’ is determined by past experience, knowledge, and current context of use

Copyright 2006 John Wiley & Sons, Inc What Is Pragmatics? (Cont’d) The relation between the sign and the referent It is an indirect relation It is used by someone to stand for a referent An act of communication has been performed

Copyright 2006 John Wiley & Sons, Inc Nature of IS Security at the Pragmatic Level Communication is one of the main ingredients of pragmatics Culture is shared and can be understood through a range of subtle silent messages Proper attention to the silent messages ensures development of a security culture

Copyright 2006 John Wiley & Sons, Inc Nature of IS Security at the Pragmatic Level (cont’d) There are four attitudes (silent messages) identified by Stamper 1. The speaker influence listener’s attitude towards the subject being spoken about 2. The speaker tends to cause listener to adjust personal attitude towards the speaker 3. Less consciously the attitude of the listener towards oneself also gets influenced 4. The attitude of the listener towards the message itself

Copyright 2006 John Wiley & Sons, Inc Four Attitudes Influenced by a Communication, Figure 10.2

Copyright 2006 John Wiley & Sons, Inc An Example A psychiatric hospital implemented a computer based system to control time allocated and used by nurses for therapy sessions Originally designed to automate duty schedule It was now possible to see a graphical display of the ‘free’ and ‘busy’ times of each staff It did not represent the meanings attributed to various tasks and actions

Copyright 2006 John Wiley & Sons, Inc An Example (cont’d) The “speaker” is the nursing supervisor The “listener” is the nurse “What is being said” is the task of allocating individual therapy sessions “What is spoken about” is the patient

Copyright 2006 John Wiley & Sons, Inc An Example (cont’d) 1: The allocation of the therapy session by “Speaker” to the “Listener”, the attitude of “Listener” towards the patient gets influenced. The implications could be rather serious since the “Listener” knows that all activities are being monitored. The content of the therapy session gets influenced as well. This has an impact on the quality of services delivered. Given the criticality of the task at hand, lack of quality is a precursor to possible security breaches.

Copyright 2006 John Wiley & Sons, Inc An Example (cont’d) 2: The attitude of the “Listener” towards the “Speaker” also gets influenced. The onus of adjusting personal attitude for successful delivery of services resides with the “Listener”. Inability to handle this relationship often results in superior-subordinate conflicts. This also leads to possible creation of disgruntled employees, which is a serious security threat.

Copyright 2006 John Wiley & Sons, Inc An Example (cont’d) 3: The situation thus created also influences the attitude of the “Listener” towards oneself. This also has serious consequences. Lack of self confidence and morale are particular outcomes. This could potentially have a serious impact on maintaining integrity of the organization.

Copyright 2006 John Wiley & Sons, Inc An Example (cont’d) 4: The attitude of “Listener” towards the message itself is very interesting in the context of organizational change. The “Speaker”, perhaps unintentionally, but often deliberately may convey some measure of confidence that should be placed in what is said. However, when the “Listener” interprets the message as emerging from the technical system, there are conflicting messages that the “Listener” may draw.

Copyright 2006 John Wiley & Sons, Inc Another Example An received by a researcher at a university It clearly illustrates the level of seriousness attached to issues of confidentiality It is a silent message emanated by the organization

Copyright 2006 John Wiley & Sons, Inc Illustration of Respect for Confidentiality, Fig 10.3

Copyright 2006 John Wiley & Sons, Inc Technology Enabled Intervention Changes in an organization are usually the starting point for disruptions in an existing security culture Whenever there is a technology enabled intervention, there are silent messages that are emanated that might have implications for the security and integrity of the enterprise

Copyright 2006 John Wiley & Sons, Inc Typical technology interventions resulting in potential security compromises Table 10.1

Copyright 2006 John Wiley & Sons, Inc Typical technology interventions resulting in potential security compromises Table 10.1 (Cont’d)

Copyright 2006 John Wiley & Sons, Inc Informal Behavior Informal behavior is fundamental to describe those characteristics of people, organizations and acts of communication that affect information Management of information systems is the same as the management of communication

Copyright 2006 John Wiley & Sons, Inc Informal Behavior (cont’d) The management of information system security connotes the management of integrity of communications There is a cause effect relationship between an antagonistic behavior, breakdown in communication and a possible security breach Complete management of security can only be ensured if the informal behavioral aspects of individuals and groups are understood

Copyright 2006 John Wiley & Sons, Inc Copyright 2006 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permission Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information herein.