SlideShare a Scribd company logo
1- An information security manager routinely monitored Web Surfing among her company's
employees. She discovered that many employees were visiting the "sinful six" web sites (Note:
The "sinful six" are web sites with material related to pornography, gambling, hate, illegal
activities, tastelessness and violence.) She then prepared a list of the employees and their surfing
histories and gave the list to management. Some managers punished their employees. Some
employees, in turn, objected to the monitoring claiming that they should have a right to
privacy.With this in mind, please answer the following two questions:
a- Is monitoring of web surfing by managers ethical, (it is legal to do this)? -- Support your
answer.
b- Is employee web surfing on the "sinful six" ethical? Support your answers.
2-Discuss the idea that an information system by itself can rarely provide a sustainable
competitive advantage. Justify your position.
3- Discuss why the Sarbanes-Oxley Act is having an impact on information security. Support
your answer.
4- How are the network applications of communication and collaboration related? Do
communication tools also support collaboration? Give Examples. (NOTE: there are two
questions that need to be answered in your response. I will be looking to see if both questions are
answered accordingly)
5- Explain why master data management is so important in companies that have multiple data
sources.
Solution
Ans 1.
a)
Yes, monitoring of web surfing is ethical and an important duty of both network administrator
and Information Security managers too. Any unethical use of the system can be detected only by
scrutinizing the system. Though in the given scenario, some employees think it to be intrusion of
their privacy but using organizational resources for their own private uses, and that too surfing
pornographic sites, in office hours is completely unethical both professionally and morally. As
the company must have female employees too and surfing pornography in front of them has high
probability of causing embarrassment to them. Company has provided the computer and internet
connection for official works only but using them for own personal use is at all not acceptable.
Hence it is the employees’ duty to use office provided computer and internet connection for
office works only and not to stray into one of the “sinful six” websites.
b)
No, it is not ethical on part of the employee to surf sites like “sinful six”. Firstly, the organization
must definitely have female employees and surfing pornographic sites will definitely cause
embarrassment to them. Secondly, the computer and internet resources provided by the company
are for official purpose only. Wasting company resources and time on visiting sites related to
pornography, gambling is not ethical for employees. Thirdly, several companies have clearly
stated policies on refraining use of official IT resources on visiting sites especially related to
pornography or gambling. Hence visiting “sinful six” site is also breaching the company policy.
Fourthly, most of the pornographic or gambling sites contain viruses, and visiting those sites may
in all probability resulted into company IT resources being infected. Fifthly, hackers to steal
information from other computer resources mostly use the pornographic or gambling sites. So
visiting such sites also make your organization resources highly prone to hacking attacks and
may result into stealing of confidential information.
Ans.2
The importance of information systems (IS) as a strategic resource capable of gaining sustainable
competitive advantage is gradually weakening. In actuality, organizations are using IS as more of
a technological tool for faster processing rather than using it for strategical purposes. A company
can gain competitive advantage only if it does the things that its competitors can't do or have. In
fact, scarcity of a resource makes it as a source of sustainable competitive advantage and not its
easy availability. And now a days IS is so commonplace that each and every organization (both a
organization and its competitors) is using it for more and more technological purposes that its
potential as a source of sustainable competitive advantage has lessened.
Ans. 3
Sarbanes-Oxley Act (SOX) is an important legislation created by the U.S. Congress at the time
when the industry was witnessing high profile accounting scandals at firms such as Enron and
WorldCom. When drafted the core objective of the SOX is not on Information Security but to
restore investor confidence and to improve corporate governance and, most importantly, to
establish financial transparency. However, with due passage of time and with compliance efforts
have been introduced, organizations started realizing that without a certain level of assurance
regarding IT security controls, compliance is not possible.
Each organization that is affected by SOX has a certain level of dependence on IT to process and
store the data that is the basis of financial reports. The Act requires these organizations to
implement the IT security controls to maintain the confidentiality, integrity, and accuracy of the
data. Specific attention should be given to secure the corporate network, prevent unauthorized
access to systems and data, and ensure data integrity and availability in the event of a disaster or
other failures. In addition, any application that deals with critical financial reporting data should
have validation controls such as edit and limit checks built-in to minimize the chances of data
inaccuracy. A properly designed IT security control structure that is operating effectively is
important to SOX compliance.

More Related Content

DOCX
Read Ethics in IT. Information technology is the engine that make.docx
PDF
Information security
PPTX
Ch15 power point
DOCX
Risk Analysis PaperMilestone1.docx
DOCX
Group assignment 2
PPT
Information Technology Policy for Corporates - Need of the Hour
PPT
IT Policy - Need of the Hour
PPT
Read Ethics in IT. Information technology is the engine that make.docx
Information security
Ch15 power point
Risk Analysis PaperMilestone1.docx
Group assignment 2
Information Technology Policy for Corporates - Need of the Hour
IT Policy - Need of the Hour

Similar to 1- An information security manager routinely monitored Web Surfing a.pdf (20)

PDF
255229705-Electronic-Monitoring-Privacy-and-Trust
PDF
Information Security Governance at Board and Executive Level
PPTX
Ethics and it professional practises (assignment 2)
PPTX
Chapter 13
PPT
Security And Ethical Challenges Of Infornation Technology
DOCX
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
PDF
Surveillance of Your Electronic Systems
PDF
Information Security It's All About Compliance
PDF
beyond_the_firewall_0103
PPT
Information ethics & intro to information security
DOCX
Running Head SECURITY AWARENESSSecurity Awareness .docx
PPTX
chapter 5.pptxggggggggggggggggggggggggggg
DOCX
There are regulatory rules that must be met as well as organizatio.docx
PPTX
20100224 Presentation at RGIT Mumbai - Information Security Awareness
PDF
Cissp notes
PPTX
Santoshdahal assessment2 s242842.ppt
PDF
Data Safety And Security
PPT
Infosec Law (Feb 2006)
DOCX
BBA 3551, Information Systems Management 1 Course Lea.docx
DOCX
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
255229705-Electronic-Monitoring-Privacy-and-Trust
Information Security Governance at Board and Executive Level
Ethics and it professional practises (assignment 2)
Chapter 13
Security And Ethical Challenges Of Infornation Technology
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Surveillance of Your Electronic Systems
Information Security It's All About Compliance
beyond_the_firewall_0103
Information ethics & intro to information security
Running Head SECURITY AWARENESSSecurity Awareness .docx
chapter 5.pptxggggggggggggggggggggggggggg
There are regulatory rules that must be met as well as organizatio.docx
20100224 Presentation at RGIT Mumbai - Information Security Awareness
Cissp notes
Santoshdahal assessment2 s242842.ppt
Data Safety And Security
Infosec Law (Feb 2006)
BBA 3551, Information Systems Management 1 Course Lea.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
Ad

More from meejuhaszjasmynspe52 (20)

PDF
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
PDF
Hand geometry 1. Definition2. Importance3. Advantages and d.pdf
PDF
Find the general solution of the given differential equation. Sol.pdf
PDF
Disorders characterized by abnormal replication of cells that leads .pdf
PDF
Differentiate between functions and formulas. Provide two examples o.pdf
PDF
Could someone please solve this assignment using matlabSolution.pdf
PDF
Consider the many protein functions. Identify the protein function by.pdf
PDF
a) Briefly describe three key differences between the genomes of pro.pdf
PDF
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
PDF
1. inside source IP address and port number 172.16.1.2020translat.pdf
PDF
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
PDF
6. Which of the following epithelia andor cell surface modifications.pdf
PDF
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
PDF
1.    Europeans view Americans as people similar in ideas and cultur.pdf
PDF
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdf
PDF
Can a single magnetic pole (either a north pole or a south pole) be i.pdf
PDF
Write a recursive function in java named fib that will accept one in.pdf
PDF
Why are culture media sterilized before they are used Do you think .pdf
PDF
What recent and past actions have Canada and the US taken to counter.pdf
PDF
What are the protocols in data transfer between CAD systems Which o.pdf
Homework hmwk 5 Score 0 of 1 pt Bookmatch 4-17 (bookstatic) Oli 3 .pdf
Hand geometry 1. Definition2. Importance3. Advantages and d.pdf
Find the general solution of the given differential equation. Sol.pdf
Disorders characterized by abnormal replication of cells that leads .pdf
Differentiate between functions and formulas. Provide two examples o.pdf
Could someone please solve this assignment using matlabSolution.pdf
Consider the many protein functions. Identify the protein function by.pdf
a) Briefly describe three key differences between the genomes of pro.pdf
A.horizontal shift 2 units to the left and vertical shift 5 units up.pdf
1. inside source IP address and port number 172.16.1.2020translat.pdf
25. How many integers between 1 and 1400 are divisible by either 2 o.pdf
6. Which of the following epithelia andor cell surface modifications.pdf
6,7,8,9,10,11,12 6. movement of a solvent (usually water) to regions.pdf
1.    Europeans view Americans as people similar in ideas and cultur.pdf
(TRUE FALSE) The use of swap rates rather than treasury rates as a.pdf
Can a single magnetic pole (either a north pole or a south pole) be i.pdf
Write a recursive function in java named fib that will accept one in.pdf
Why are culture media sterilized before they are used Do you think .pdf
What recent and past actions have Canada and the US taken to counter.pdf
What are the protocols in data transfer between CAD systems Which o.pdf
Ad

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Lesson notes of climatology university.
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
RMMM.pdf make it easy to upload and study
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Trump Administration's workforce development strategy
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Complications of Minimal Access Surgery at WLH
Lesson notes of climatology university.
Chinmaya Tiranga quiz Grand Finale.pdf
Microbial disease of the cardiovascular and lymphatic systems
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Orientation - ARALprogram of Deped to the Parents.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Paper A Mock Exam 9_ Attempt review.pdf.
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Final Presentation General Medicine 03-08-2024.pptx
What if we spent less time fighting change, and more time building what’s rig...
RMMM.pdf make it easy to upload and study
01-Introduction-to-Information-Management.pdf
Cell Structure & Organelles in detailed.
History, Philosophy and sociology of education (1).pptx
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Classroom Observation Tools for Teachers
Trump Administration's workforce development strategy

1- An information security manager routinely monitored Web Surfing a.pdf

  • 1. 1- An information security manager routinely monitored Web Surfing among her company's employees. She discovered that many employees were visiting the "sinful six" web sites (Note: The "sinful six" are web sites with material related to pornography, gambling, hate, illegal activities, tastelessness and violence.) She then prepared a list of the employees and their surfing histories and gave the list to management. Some managers punished their employees. Some employees, in turn, objected to the monitoring claiming that they should have a right to privacy.With this in mind, please answer the following two questions: a- Is monitoring of web surfing by managers ethical, (it is legal to do this)? -- Support your answer. b- Is employee web surfing on the "sinful six" ethical? Support your answers. 2-Discuss the idea that an information system by itself can rarely provide a sustainable competitive advantage. Justify your position. 3- Discuss why the Sarbanes-Oxley Act is having an impact on information security. Support your answer. 4- How are the network applications of communication and collaboration related? Do communication tools also support collaboration? Give Examples. (NOTE: there are two questions that need to be answered in your response. I will be looking to see if both questions are answered accordingly) 5- Explain why master data management is so important in companies that have multiple data sources. Solution Ans 1. a) Yes, monitoring of web surfing is ethical and an important duty of both network administrator and Information Security managers too. Any unethical use of the system can be detected only by scrutinizing the system. Though in the given scenario, some employees think it to be intrusion of their privacy but using organizational resources for their own private uses, and that too surfing pornographic sites, in office hours is completely unethical both professionally and morally. As the company must have female employees too and surfing pornography in front of them has high probability of causing embarrassment to them. Company has provided the computer and internet connection for official works only but using them for own personal use is at all not acceptable. Hence it is the employees’ duty to use office provided computer and internet connection for office works only and not to stray into one of the “sinful six” websites.
  • 2. b) No, it is not ethical on part of the employee to surf sites like “sinful six”. Firstly, the organization must definitely have female employees and surfing pornographic sites will definitely cause embarrassment to them. Secondly, the computer and internet resources provided by the company are for official purpose only. Wasting company resources and time on visiting sites related to pornography, gambling is not ethical for employees. Thirdly, several companies have clearly stated policies on refraining use of official IT resources on visiting sites especially related to pornography or gambling. Hence visiting “sinful six” site is also breaching the company policy. Fourthly, most of the pornographic or gambling sites contain viruses, and visiting those sites may in all probability resulted into company IT resources being infected. Fifthly, hackers to steal information from other computer resources mostly use the pornographic or gambling sites. So visiting such sites also make your organization resources highly prone to hacking attacks and may result into stealing of confidential information. Ans.2 The importance of information systems (IS) as a strategic resource capable of gaining sustainable competitive advantage is gradually weakening. In actuality, organizations are using IS as more of a technological tool for faster processing rather than using it for strategical purposes. A company can gain competitive advantage only if it does the things that its competitors can't do or have. In fact, scarcity of a resource makes it as a source of sustainable competitive advantage and not its easy availability. And now a days IS is so commonplace that each and every organization (both a organization and its competitors) is using it for more and more technological purposes that its potential as a source of sustainable competitive advantage has lessened. Ans. 3 Sarbanes-Oxley Act (SOX) is an important legislation created by the U.S. Congress at the time when the industry was witnessing high profile accounting scandals at firms such as Enron and WorldCom. When drafted the core objective of the SOX is not on Information Security but to restore investor confidence and to improve corporate governance and, most importantly, to establish financial transparency. However, with due passage of time and with compliance efforts have been introduced, organizations started realizing that without a certain level of assurance regarding IT security controls, compliance is not possible. Each organization that is affected by SOX has a certain level of dependence on IT to process and store the data that is the basis of financial reports. The Act requires these organizations to implement the IT security controls to maintain the confidentiality, integrity, and accuracy of the data. Specific attention should be given to secure the corporate network, prevent unauthorized access to systems and data, and ensure data integrity and availability in the event of a disaster or other failures. In addition, any application that deals with critical financial reporting data should
  • 3. have validation controls such as edit and limit checks built-in to minimize the chances of data inaccuracy. A properly designed IT security control structure that is operating effectively is important to SOX compliance.