In the age of the Internet, many companies, banks, and government organizations migrate their financial and economic assets into the web in order to improve the speed, efficiency, and ease of operations. At the same time, the accessibility of the systems by users and customers also suggests increased security risks for the entire superstructure. With devastating hacking attacks happening since 2015, affecting both the financial and political landscape of the world, the standardization and security of systems and processes became the primary focus of IT specialists and organizations around the globe. Some of the approaches to improving the situation include blockchain as well as traditional computer and software protection against unauthorized access and theft.
Blockchain technology was initially developed with the simplification and improvements in packet sharing, modulation, and security in mind (Lin & Liao, 2017). The code is heavily encrypted and uses a combination of private and public protocols in order to operate. Its decentralized nature makes blockchains very hard to undermine and next to impossible for any individual government to control. Blockchain-related technologies are, therefore, innately safer for businesses. At the same time, small businesses do not benefit from technology as much as large-scale ones.
Traditional approaches to security include the standardization of security protocols for different software operators, better encryption, and continuous updating in accordance with the lists of known threats and viruses. As it stands, the discrepancy in security systems lies from user ignorance, a lack of unified standards for online security, and the inability to frequently upgrade and update the systems to respond to the newest challenges in the security system (Bugliesi, Calzavara, & Focardi, 2017). Both large and small businesses could benefit from keeping their hardware and software up to date and training their employees in the basics of managing and responding to online security challenges. In my opinion, both approaches to security have their innate strengths and weaknesses, and it will take decades before one would become preferable over the other.
References
Bugliesi, M., Calzavara, S., & Focardi, R. (2017). Formal methods for web security. Journal of Logical and Algebraic Methods in Programming, 87, 110-126.
Lin, I. C., & Liao, T. C. (2017). A Survey of blockchain security issues and challenges. IJ Network Security, 19(5), 653-659.
In recent times, most organizations are adopting emerging technologies to match the high competition in the market. Information systems (IS) are a set of components, which are integrated and aimed at the collection, processing, and storing of data in providing information, digital products, and knowledge (Yaacoub & Salman, 2020). Cybersecurity is a technique that aims at maintaining and safeguarding data from malicious attacks. Drone technology uses pilotless aerial vehicles, which operate under combined technologies including artificially intelligent computers, object avoidance technology, and others. This paper will discuss drones technology cybersecurity and information systems.
IS and Cybersecurity Considerations for Use of Drones in an Organizational Supply/Value Chain
Drones use information systems components in their automation, understand supply chain management, and highly rely on the internet and network. First, drones raise security concerns about whether they can be used to perform criminal activities since they are small in size, affordable, and are easy to move. The second consideration is privacy, which can be physical, locational, and behavioral in supply chain management. Maintaining confidentiality is important; thus, drones open new threats to secrecy as they can be used to spy and collect videos and images that may be used against an organization.
The safety concern is an important factor to consider and arises due to malfunctioning. Drone technology has been an emerging technology that has not been well-developed, and sometimes, it may lose control and cause some damages and losses (Yaacoub & Salman, 2020). There are several factors as to why there is no guarantee of safety. One of them is the design of drones which lacks a safety feature; thus, full control is not guaranteed. Drones do not have standards on technology and operations that are related to crash avoidance mechanisms. Signal distortion is another factor; drones are prone to attacks like hacking. Finally, countries lack enough regulations in governing the commercial uses of drones.
Drone Usage in Public and Private Organizations
The application of drones ranges from private to public use. Some of the applications include the emergence of medicine in both legal and practical aspects of mining industries, agricultural sectors, and the military. According to Konert et al., 2019, drones are applied in medicine through rescue operations as they can function at low altitudes and save lives. For example, the application of thermal emerging cameras by a Canadian police officer identified a man in a car wreck, and the rescue team could reach him (Konert et al., 2019). Moreover, in Switzerland, two hospitals used drones in delivering blood samples and analysis materials (Konert et al., 2019). This operation marked the first application of drones in medical settings.
The Polish Air Force Institute of Technology has created a drone called AtraxM. This drone is said to send information to the rescue team to identify the place of the accident, the number of victims in the accident, and the scale of the accident even before the main rescue team arrives (Konert et al., 2019). More advancements are being made in drone technology and increasing automation in the field of medicine.
Moreover, the use of drones has gone as far as in the mining industry. Findings by Shahmoradi et al. (2020) show that the two main advantages of using drones in this field include the use of specialized ones fitted with sensors, which can inspect an area during an emergency or identify hazards. The second advantage is that they can be used in the inspection and unblocking of locked box-holes, and also in the ore passes process. In surface mining, drones can be applied in monitoring, mapping, and surveying. This method is preferred over the traditional one because it cost saving.
Also, in-ground mining challenges occur due to reasons such as reduced visibility and dust concentration. Still, drones can access the unreachable area in underground mines. Other drone applications in this sector include detection of gas in underground coal mines, rescue missions through a combination of technology, and unmanned ground vehicles. Lastly, drones are more applicable in abandoned mines in mapping and monitoring, making them more cost-effective than other methods.
In the military, drones have widely been used as they are unmanned, meaning there are pilotless. This feature makes them more advantageous over manned aerial vehicles. The military pioneered the use of drones where they operated them in spying on the enemy and were able to plan an attack (Kozera, 2018). Drones were also utilized in attacks and proved to be more efficient as they posed no risk to the lives of soldiers. Today, technology drones are more advanced and are being used to conduct sophisticated missions.
In earlier years drones were associated with the military, making it difficult for organizations to invest in the product. Today the application of drones is on the increase as the world gets autonomous; thus, the drone market is expanding each day. Business organizations like Amazon, Google, and others need to keep up with the changing technology (Atwater, 2015). The company is working on drone technology to deliver products to consumers. In countries such as Austria, drone technology has successfully been utilized in delivery in the past two years.
In the entertainment industry, drones have been greatly used to replace the old methods. Every day, the origination is analyzing the new options emerging to arrive at the best choice. Drone technology has become the better option in automation cost and accuracy (Atwater, 2015). In this industry, drone technology has substituted boom cameras on traveling vehicles, small planes used for small shots, and helicopters.
In organizations such as those dealing with firefighting, there have been great dangers to individuals who collect information on the area of the accident in the past. Today, organizations are investing in drone technology as it is more efficient and provides a secure way of gathering crisis and site information for analysis and sending the data to command centers and rescue teams. The use of drones in this area has not replaced humans but has improved the health safety of workers with fewer resources used.
How Organization Can Leverage its Investment in Drone Technology
Every day, organizations are investing in drone technology, which has competitive advantages, cost efficiencies, and is easy to use. The oil industry has experienced a positive impact from using this equipment. The industry has automatized its operations on oil inspection through drone technology (Thibault & Aoude, 2016). Previously, the result shows that the industry used weeks in inspection work. Now it is said the company is taking days to complete the job (Thibault & Aoude, 2016). The out level is increased making it more productive and efficient.
In transportation, capital has been invested in drone technology for improved infrastructure. An example is an American railroad, which is partnering with the Federal Aviation Federation Administration, to test drones to be applied for remote inspection of tracts and bridges and air quality monitoring. In the United Kingdom, drone technology is already in use and is part of the ORBIS project (Thibault & Aoude, 2016). The UK is automating its monitoring ways in the railway network in 3D to help them for a better way of planning on track maintenance and renewal.
Laws or Regulations Which Need to Be Considered
The increased use of drones globally makes countries try to incorporate them into regulations that guide the aviation framework. Although rules differ across the globe, the regulation elements remain the same in all countries. The standard examples of drone regulations include the pilots license, restricted zones, insurance, and aircraft registration. These requirements are not fixed but vary in terms of the mass of the drone, altitude, use, and pilot license. For small drones that are meant for recreational, license, insurance, and registration are not required. But for commercial drones sporting pilot license is standards in countries that lack defined rules.
Countries have six approaches to regulations governing the use of drones though they are not common to all countries. The first regulation approach is an outright ban, which completely bans the use of all commercial drones. Examples of these countries include Morocco, Slovenia, Cuba, and India. The second regulation approach is an effective ban. Countries using this kind of approach have a formal process for the commercial use of drone licensing, but they make the requirement impossible to meet, or the license seems to have no approval. An example of the countries includes Kenya, Chile, and Colombia; the third is the Visual Line of Sight (VLOS) constant requirement. The rules state that a drone operator must be within the pilots VLOS; thus, the potential range is limited. Examples of countries under the rule include Belgium and Mexico.
Moreover, the fourth approach involves the practice of beyond visual line of sight (BVLOS), which has some exemptions to the VLOS. Some of the countries under this rule include Austria and Japan (Jones, 2017). Fifth is the Permissive rule which has set guidelines and regulations on drones. Example of the countries includes Italy and Sweden. Last is the wait-and-see approach where they rely on the results seen from others countries since they have few or no rules governing the use of drones.
Cybersecurity Risks to Be Considered
Technology is susceptible to attacks, thus challenging cybersecurity in drone applications. Most drones that are in use are controlled through Wi-Fi under the IEEE 802.11 standards. Communication between the drones and the operator, situated on the ground, always applies Wi-Fi in the control of these aerial vehicles. Today, WIFIs are prone to many attacks as well as the use of chips that have no encryption. It is possible to perform a man-in-the-middle attack at a radius of 2 kilometers by using software like Skyjack.
However, in consideration of cybersecurity risks in drones, several attacks can be performed in the system. These attacks include a de-authentication attack, an attack that is performed by using technologies like air crack-ng. When a successful attack is done, the controllers no longer have control of the drone. This results in insecurity in the field of the supply chain. Another type of attack is GPS spoofing. This is possible because drone communication is based on signal sending and receiving. The use of GPS in drones helps navigation, and due to non-encryption to drone technology, the spoofing attack is possible. Lastly, in the discussion on attacks, the sniffing of signals is covered. Technology is making everything great and at the same time making vulnerability on data and risking individual and organization information. Sniffing is not possible when the drone is at a greater height, but the use of advanced technologies makes it more possible, such as the use of Wi-Fi pineapple.
Another consideration to be made involves the interdiction of unauthorized drones. In the system of drones, it is possible to launch them at any place, which requires laws that ban unlicensed equipment to safeguard people and property and avoid misuse (Vattapparamban et al., 2016). In supply chain management, if authorized personnel with a bad intention launch a drone in your organization, unauthorized surveillance and monitoring can happen. These acts threaten cybersecurity, and it is possible to perform an attack either in cyber or physical which can harm both property and civilians. This is made possible as the cost of the drone is lowering and anybody can be able to afford one.
Finally, concerns about the privacy of people and property are crucial. Drones have many advantages in supply chain management, but there is a greater concern connected to their use on privacy. In drones, it is possible to mount a camera or a capturing information device that gathers information inform of video records or pictures that may violate the privacy of people in organizations and cause defamation.
Conclusion
Drone technology has been applied in almost all industries, meaning its application is taking root. The application of drones is beneficial in different sectors including business, military, and agriculture. The main concern with drone technology is cybersecurity issues. Every organization aims to maintain data integrity, availability, and confidentiality, but drones are more prone to attack. Moreover, most countries have not defined clear rules on the use and licensing of commercial drones, which is vital for investors.
References
Atwater, D. M. (2015). The commercial global drone market: Emerging opportunities for social and environmental uses of UAVs. Graziadio Business Review, 18(2). Web.
Vattapparamban, E., Güvenç, 0., Yurekli, A. 0., Akkaya, K., & Uluaaç, S. (2016). Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In 2016 International wireless communications and mobile computing conference (IWCMC) (pp. 216-221). Institute of Electrical and Electronics Engineers.
Yaacoub, J. P., & Salman, O. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11, 100218. Web.
The data around companies is increasing rapidly, and so are cyber-attacks. All activities that employees do online produces new data and create a digital footprint that cyberattacks can exploit. Whereas organizations utilize machine learning and data science to maintain their systems and data gathering security, hackers use more advanced techniques such as artificial intelligence to conduct cyberattacks. Thus, modern cybersecurity uses machine learning and data science to search for multiple vulnerabilities in organizations. Data science entails studying, extracting, and processing valuable insights from information (Sikos & Choo, 2020). It is critical to explore how data science helps in cybersecurity defense strategies and understand its importance.
Analysis
Cybersecurity data science is an emergent career that utilizes machine learning to mitigate, prevent, and detect cyberattacks. It is regarded as the process of utilizing data science to keep digital software, systems, services, and devices secure from cyber threats. Data science application in cybersecurity is widespread because it assists organizations in protecting their networks against attacks and enhances techniques for combating threats (Sikos & Choo, 2020). Exploring how data science impacts cybersecurity explains why its incorporation into a companys cybersecurity infrastructure is essential.
Data science helps enhance predicting abilities and improve intrusion detection. Hackers have numerous methods of intruding into systems, and their styles, methods, and tools constantly evolve. As a result, companies must detect intrusions early, which can be achieved with the adoption of data science. The implementation of data science gives organizations the chance to provide machine learning algorithms with historical and current information about intrusions or cyberthreats. Therefore, an organization will detect intrusions, manage systems securely, and predict future attacks (Sarker et al., 2020). Data science and machine learning help identify loopholes in information security environments that assist in improved data security.
Data science facilitates data protection and behavioral analytics, which ultimately improves an organizations cybersecurity. Although companies can identify and detect malware, understanding the attackers behavior can be difficult. Data science assists in analyzing numerous information through machine learning. Consequently, future behavior can be predicted by evaluating the relationships in network and system logs, which makes information processing more accessible and timelier. On the other hand, data science reinforces the protection of an organizations data. Tradition security strategies help organizations mitigate information probing from attackers (Tewari, 2021). Nevertheless, data science helps to reinforce the traditional measures, offering organizations the opportunity to create impenetrable protocols through machine learning algorithms.
Data science provides an opportunity for organizations to change from laboratory simulation to real-world practice. Thus, organizations will understand the landscape of their information security better. Through constant analysis, organizations have the opportunity to reduce errors in machine learning algorithms. Data science collects data quickly from multiple samples to facilitate deep training and learning to detect spam and malware (Yener & Gal, 2019). As a result, false positives are reduced after identifying malware and spam, helping to set up preventive measures against intrusions.
Data science in cybersecurity matters as it helps reduce the increased costs of cyber breaches. Additionally, the expansion of the Internet of Things (IoT) necessitates an effective cybersecurity solution. Cyber breaches can cost an organization its reputation and vast amounts of money. Cybersecurity losses and costs are expected to rise since more devices are connected to the internet (Sarker et al., 2020). The increased internet connectivity highlights the need for data science in cybersecurity.
Conclusion
Understanding the importance of data science in cybersecurity helps companies and employees embrace technological changes. Most organizations store data in digital means, which increases the risk of breaches. Cyberattacks have increased in recent years as hackers reinvent new ways to intrude into systems and steal information. Therefore, adopting data science into cybersecurity infrastructure can help to reinforce and reduce cyber threats. Data science helps to improve intrusion detection, enhance predicting ability and data protection, and understand attackers behavior. The rising costs of cyber threats and the increased device connectivity highlight the significance of cybersecurity data science. Data science will help information technology professionals create more active, defensive, and operative strategies to avert cyber-attacks.
References
Sarker, I. H., Kayes, A. S. M., Badsha, S., Alqahtani, H., Watters, P., & Ng, A. (2020). Cybersecurity data science: An overview from machine learning perspective. Journal of Big Data, 7(1), 1-29. Web.
Sikos, L. F., & Choo, K. K. R. (Eds.). (2020). Data science in cybersecurity and cyberthreat intelligence. Springer.
Ensuring the safety of the collected data is a considerable priority for numerous corporations. Large companies aiming to preserve the integrity of their knowledge often incorporate additional protection methods against potential hacking, cautiously guarding the personal data received from the customers. As is shown in the case of the Equifax breach, these measures are necessary precautions that should be implemented by any enterprises focused on clientele services and possessing sensitive knowledge. This case study discusses the events of the Equifax breach, identifying security and control weaknesses, factors that contributed to the development issues, and the overall impact of the incident, suggesting preventative measures for the future.
The Necessity to Strengthen Security and Control Processes: The Example of Equifax
Identify and describe the security and control weaknesses discussed in this case
The attack on the Equifax credit bureau, one of the most well-recognized repositories of personal information, has caused tremendous loss of data for millions of individuals. The leak was exposed in September 2017, when the enterprise reported unauthorized access to their storage systems that contained sensitive knowledge regarding the organizations clients (Wang & Johnson, 2018). According to the official estimations, around 143 million US citizens were affected by the breach, as their names, Social Security numbers, birth dates, and addresses were revealed to the hackers (Wang & Johnson, 2018). This incident became significant proof of the weaknesses of the Equifax cybersecurity systems.
Technical errors and malfunctions in the protection processes established by Equifax were major issues that were not resolved in time, resulting in the breach event. Previously, hackers were able to acquire access to the companys systems in 2013, 2014, and 2015. Another problem occurred in 2016 and 2017 prior to the discussed incident, when the storage units were attacked again. The presence of numerous technical deficiencies and recurring complications within the software signifies that Equifax databases were substantially weakened before the September 2017 attack, demonstrating the abundance of security malfunctions.
A control issue can be observed in the condition of interactive online systems, namely websites, applications, and other web services accessed by the users. Any resources created and maintained via the Internet require constant updates and problem management in order to uphold the appropriate level of security for customer data transmitted (DiGrazia, 2018). Nevertheless, several reports highlighted the improper state of these online services, which became vulnerable due to the outdated technical approach used. For instance, certificates on Equifax websites were proven to be expired and error-infested. Such negligence towards the condition of systems handling personal information was a considerable control risk that might have prompted the success of the September 2017 breach. Another complication is evident in the absence of response towards the cybersecurity issues highlighted by professionals. Although numerous attacks occurred in the previous years, multiple reports on the web-protection weaknesses were available, and a hazardous malfunction was observed prior to the incident, the companys management heavily disregarded this information (Luszcz, 2018). The absence of cybersecurity standards and a failure to maintain necessary control over the online sources was a significant disadvantage for Equifax.
What management, organization, and technology factors contributed to these problems?
Even though the gaps in the areas of security and control have drastically increased the probability of a successful intrusion, particular elements of managerial, organizational, and technological strategies also promoted the possibility of unauthorized access. The management approach utilized by Equifax lacked sufficient planning and controlling, the factors that can improve the companys performance in the area of cybersecurity (Luszcz, 2018). Although the enterprises executives stated that extensive resources were transferred to online protection, in reality, as is shown by numerous breaches, Equifaxs methods were considerably outdated. It is possible that the endeavors related to guarding personal data and managing the web services were not included in the organizations management plans, contributing to the weak condition of the online systems.
Another remarkable complication refers to the topic of Equifaxs organizational structure, which might have lacked appropriate regulations regarding personal data handling. Any company is required to regulate its rules and responsibilities, including the principles of storing sensitive data and the duties related to customer information (Gao et al., 2021). Considering the firms lack of attention towards previous breaches, numerous cybersecurity reports, and the state of online protection, it could be proposed that the corporate regulations concerning the clientele data were exceptionally lenient. Furthermore, credit bureaus are not obligated to conduct system audits, technology checks, and security evaluations, which might influence the internal rules of data storage.
With the lack of external responsibility for the potential loss of information, Equifax faces minimal negative consequences and may thus neglect protection requirements and focus on other areas of development. This suggestion can be further corroborated by the companys fierce methods of accumulating growth, directed towards purchasing useful data and expanding (Wang & Johnson, 2018). Therefore, such organizational factors as disregarded responsibility for information leaks, lack of external control, and the focus on rapid development may have procured the emergence of security issues.
Enhancing the enterprises technological capabilities is a vital task for its executives in the current age. To avoid the adverse ramifications of systems vulnerability, it is essential to maintain an up-to-date condition of the web services and online databases that transfer sensitive data. Nevertheless, Equifax demonstrated remarkable negligence towards implementing these preventative procedures, contributing to the rise of technological complications that weakened the companys cyberspace. Such factors as focus on organizational expansion rather than technological improvements, absence of action regarding existent malfunctions, and ignorance of frequent information breaches established an environment suitable for unauthorized access to the enterprises database (Wang & Johnson, 2018). Furthermore, as the company used open-source materials to establish its cybersecurity measures, the risk of intrusion surged significantly (Luszcz, 2018). Although software derived from open source can yield exceptional benefits when applied and managed correctly, Equifax failed to adapt the software protection tools to avoid breach incidents.
The Effect Of Equifax Hack On Contemporary Cybersecurity
Discuss the impact of the Equifax hack
Given the scale of the Equifax corporation and the type of data leaked, the impact of the incident on the involved individuals lives and the sphere of information security is tremendous in size. First of all, it is necessary to consider the sensitive knowledge regarding the companys clients impacted by the event. The majority of the customers were explicitly outraged by the breach of information, which revealed their names, Social Security numbers, addresses, and birth dates to the hackers (Gao et al., 2021). Given that this knowledge allows an individual to apply for a credit card, a bank loan, or a mortgage, personal accounts are now at risk of unauthorized use. Possessing such information constitutes identity theft and may result in significant debt and financial loss for the people affected (DiGrazia, 2018). Therefore, it is possible that the hackers now obtain a possibility to receive monetary funds on behalf of 143 million US citizens without their knowledge, which is a substantial risk.
After that, another consequence of the leak concerns the reputation of Equifax and the necessity to reimburse the clientele whose data was stolen. As millions of victims suffered the adverse ramifications of identity theft, settlement claims and lawsuits were filed against the credit bureau (Wang & Johnson, 2018). According to the statistics, personal information breaches can result in an average financial loss of approximately $1343, in addition to personal distress and elevated anxiety (DiGrazia, 2018). Furthermore, the firms stock value has plummeted after the announcement of the breach, decreasing 14% in only one day (BBC News, 2017). Nevertheless, these results have majorly affected the clientele and their perception of Equifax rather than the enterprise itself, which according to the legislation, faces minimal negative outcomes from the legal perspective.
Finally, a prominent result of the cybersecurity attack on Equifax is the awareness of information technologies (IT), web services protection, and the organizations vulnerability. Multiple studies conducted after the incident reported that numerous corporations are inadequately ensured against potential hacking attempts, prompting the executives to implement additional strategies (Luszcz, 2018). Another prominent outcome is the introduction of the General Data Protection Regulation (GDPR) in Europe, aimed at improving the regulations regarding the firms responsibilities for their clienteles information (Hedley & Jacobs, 2017). This act considers the weaknesses of the Equifax security approach and might increase the safety of sensitive knowledge in the future.
Considerations for Future Hack Protection
How can future data breaches like this one be prevented? Explain your answer
To avoid information leaks and unauthorized access to sensitive knowledge, it is essential to maintain an appropriate cybersecurity policy. First of all, such methods as IT innovations and consistent system updates have been proven to be highly prominent for both small and large-scale corporations (DiGrazia, 2018). After that, it is recommended to transfer additional resources into creating strong attack prevention systems, preferably with the help of cybersecurity professionals. However, as this strategy might be considerably costly, it is possible to enhance open-access sources, strengthening the applications used to achieve a lower possibility of a successful hack (Luszcz, 2018). Finally, incorporating numerous methods of protection is another crucial endeavor, especially beneficial for highly-developed corporations. Instead of implementing only one or two preventative strategies, it is necessary to include supplementary measures, such as double encryption or detecting suspicious internet traffic (Hedley & Jacobs, 2017). Although there still might be small weaknesses to be exploited, these techniques further decrease the probability of unauthorized access, gaining extra protection against hackers.
Conclusion
To conclude, the case of the Equifax breach in consideration of security and control deficits, factors contributing to the attack, and the events impact were discussed in detail in this paper. It is evident that the lack of an appropriate level of cybersecurity can become a remarkable issue for corporations handling their clients personal information. As the technology evolves, such security issues as breaches of information and cyberattacks become especially pertinent. Identifying possible weaknesses, such as inconsistent updates or invalid certificates, and eliminating them in a timely manner is a prominent strategy for maintaining a stable business. The Equifax leak of information demonstrates how crucial it is to identify managerial, organizational, and technological factors that might prompt future attacks, as the negative impact of a successful breach can be detrimental. Enterprises should uphold their cybersecurity measures and incorporate customer data safety into their corporate values, ensuring that numerous layers of protection are present.
References
Wang, P., & Johnson, C. (2018). Cybersecurity incident handling: A case study of the Equifax data breach. Issues In Information Systems, 19(3), 150-159. Web.
DiGrazia, K. (2018). Cyber insurance, data security, and blockchain in the wake of the Equifax breach. Journal of Business, 13(2), 255-277.
BBC News. (2017, September 8). Equifax slammed after major data breach. Web.
Gao, Y. (Lisa), Zhang, L., & Wei, W. (2021). The effect of perceived error stability, brand perception, and relationship norms on consumer reaction to data breaches. International Journal of Hospitality Management, 94. Web.
Hedley, D., & Jacobs, M. (2017). The shape of things to come: The Equifax breach, the GDPR and open-source security. Computer Fraud & Security, 2017(11), 57. Web.
Luszcz, J. (2018). Apache Struts 2: How technical and development gaps caused the Equifax Breach. Network Security, 2018(1), 58. Web.
Cybersecurity risks are some of the most prominent risks to emerge in the 21st century. With the ongoing digitalization of all medical records, hospitals become one of the primary targets for phishing, information theft, and cyber terrorism (Kim, 2018). Since all modern hospitals operate technology that has specialized software and program interfaces, the matters of cybersecurity are more important than ever. At the same time, the national healthcare system remains woefully lagging in ensuring the privacy and security of their patients medical records.
The Coalfire Penetration Risk report states that the healthcare industry has the worst protection ever, below tech, retail, and financial services (Donovan, 2018). The report included most of the major hospitals, which indicates deep-seated security issues in the field. Mayo clinic is one of the most prominent healthcare providers in the USA, serving hundreds of thousands of patients on a yearly basis. The purpose of this paper is to analyze internal and external threats to Mayo Clinics Personal Healthcare Information (PHI), analyze their risk assessment processes, and make conclusions about the adequacy of their cyber defenses.
External Risks to Hospital Security
While there is a multitude of security risks to hospitals such as Mayo Clinic, the primary external risk to its cybernetic systems are phishing attacks, malware, and encryption blind spots (Wager, Lee, & Glaser, 2017). Phishing attacks are the most common in that they require the least amount of preparation to send out, and can be very effective in luring employees into forfeiting personal data. With doctors and nurses having access to shared healthcare records, this type of external threat became more effective at getting results. Mayo Clinic is a frequent target to such attacks.
The second threat to hospital cybersecurity is malware and ransomware. They can be downloaded through various means, such as through phishing letters or through encryption traffic blindspots (Wager et al., 2017). These programs can shut down access and potentially paralyze the workstation, or even the entire network. Hospitals such as the Mayo clinic are optimal targets for malware and ransomware, due to their need for quick access to patient information. In addition to locking out data, malware can steal or corrupt data, to be later used in blackmailing.
The last issue is associated with the increased usage of cloud servers. These are outside data storage services, which are vulnerable to outside hacking attempts (Wager et al., 2017). The hospital has little to no control over these servers, or their providers.
Nevertheless, many hospitals have the outdated on-premise equipment, which does not allow for storing great amounts of data. Small hospitals that do not receive additional funding, cloud services are a forced measure, which comes with its own set of external security risks. Although Mayo clinic utilizes encrypted cloud services sparingly and in accordance with HIPAA provisions, the risk of outside intervention still exists.
Internal Risks to Hospital Security
Internal threats to Mayo Clinics hospital security are largely associated with employees and equipment. Security leaks may be the result of employees negligent use of data or, in rare cases, malicious intent. Successes of phishing attempts, for the most part, depend on the inability of employees to recognize legitimate security risks. Employee training and awareness campaigns help mitigate negligence, whereas agency and accountability procedures help prevent malicious intent (Wager et al., 2017).
The second internal threat is associated with outdated equipment and software. Many hospitals utilize old computers and unsupported applications, which do not have the level of security and encryption to withstand hacking attempts (Wager et al., 2017).
In addition, these applications are more prone to malfunction, which could result in misinterpretation or corruption of data. Although Mayo hospital is one of the most financially sustainable, it still has some problems in regards to equipment and software security. Lastly, there are issues with the physical security of server equipment. In the event of a flood or a fire, if the servers are damaged, all physical data may be gone forever. Mayo clinic adheres to strict regulations for flood and fire security and has backup systems in the event of such an occurrence.
Security Risk Assessments at Mayo Clinic
Cybersecurity risks assessments in Mayo Clinic are conducted on a yearly basis. They are handled individually by responsible IT officers of the company, which are over 100 in number (Mayo Clinic, 2018). These individuals are tasked with ensuring that all IT-related equipment has antiviruses, firewalls and that the information utilized in daily operations is properly encrypted (Mayo Clinic, 2018). They are also tasked to educate and debrief all personnel on the latest news on cybersecurity and cybernetic threats. Overall, these assessments are made to ensure the status quo and making sure no breaches were detected.
Outside security companies are involved in making large-scale reforms and upgrades to the existing security system. This approach is useful at neutralizing any major security discrepancies but does not address the speed at which cyber threats are evolving. They can mitigate phishing threats and internal cybersecurity issues but are not enough to make up for aging equipment and evolving malware and decryption software.
Conclusions and Recommendations
Although the state of cybersecurity in Mayo Clinic is better than in other healthcare facilities in the region, its overall quality remains subpar. Aging equipment, as well as the reactive approach to external threats, make it vulnerable to deliberate attacks. Mayo Clinic should adopt a proactive approach, which involves bi-yearly monitoring by specialized cybersecurity firms, as well as significant updates on the existing software and hardware. All personnel should undergo yearly training and reminder sessions in order to recognize the newest phishing and malware practices. HIPAA standards for personal data protection are to be enforced with increased frequency.
Wager, K. A., Lee, F. W., & Glaser, J. P. (2017). Health care information systems: A practical approach for health care management (4th ed.). New York, NY: Jossey-Bass.
Mandiant Cyber Security Company, renowned for forensic expertise and computer security programs, was founded in America by Kevin Mandia in early 2004. Its formation was based on the computer insecurity that was predicted to take place in the future (Harms, 2006). Currently, Mandiant Cyber Security Companys headquarter is located in Virginia. It has over 300 staff members. Mandiant came up with machines that aid greatly in curbing systems threats that many organizations face (Fleddermann, 2013). Some of its customers include private companies and high-ranked individuals. Government organizations also rely greatly on its services. Its involvement in curbing cyber insecurity that took place in China early this year contributed immensely to its popularization.
However, the success of Mandiant is based on its leadership and ethics styles. This paper outlines and details on leadership and ethics styles implemented by Mandiant in driving its innovation.
To drive its innovation, Mandiant puts into practice innovation theories like institutional theory and diffusion theory. Additionally, Mandiant uses evolutionary theory in developing their products and services. For instance, Mandiant Company employs institutional theory in safeguarding their profits for future innovation.
Leadership styles
Aydogan (2008) examine that leadership has a great effect on innovation and further reveals that when organization lacks potential leaders, their innovation capabilities considerably decreases. As per the views of Aydogan, it is evident that leadership styles have great effects on innovativeness. Scholars such as O Regan have also associated leadership styles with high achievements in innovation. According to Aydogan and scholars, leadership styles influence innovation via impinging on people and institutions affinities to innovation. The success of organizations such as Mandiant Cyber Security Company is based on the leadership styles portrayed in the firm.
Mandiant employ effective leadership styles in not only securing clients from hackers, but also running the company roles effectively. As evidenced by some of top executive members of Mandiant, Mandiant Company prefer transformational leadership style to transactional leadership style (Kippenberger, 2012). The executives inoculation of dynamic leadership also plays a significant role in enabling Mandiant adopt changes experienced in cyber world.
Mandiant use transformational leadership in attracting diverse organizations as consumers of its services. In addition to encouraging creativity among its clients, Mandiant Company also offers support to individual followers. Additionally, Mandiant Company transformational leaders not only portray their vicious acts, but also serve as role models for its clients (Burns, 1978). For instance, it has been evidenced that many consumers appreciate the services offered by it. With transformational leadership quality, diverse individuals find it easy to share their views concerning computer security thus boosting Mandiant innovation programs.
Mandiant also employs transactional leadership styles. In most occasions, Mandiant leaders use rewards as motivational tools. Use of rewards plays a great role in the advancement of its innovation because it proves effective to employees who work under fixed programs. For instance, Mandiant Company has been found to delegate distressing roles such as monitoring to customers network for long durations, an act that proves effective in driving innovation. In general, use of motivational elements and integration of modern technology plays a significant role in driving Mandiant innovation.
Most firms also portray situational leadership. This type of leadership assists the firm in identifying both the potentials and enthusiasms of its employees. Usually, situational leadership also assists many organizations in dealing with technological changes. Through this type of leadership, Mandiant Cyber Security Company has managed to supervise technological changes that assist in driving its innovation.
Ethic styles
Although leadership styles influences the success of many organizations, many leaders experience hard times in gaining trust and obligations of its members and clients. Occasionally, leaders who are observed as truthful are perceived as moral stewards (Bass and Riggio, 2008). Ethics styles enable individuals not only to understand visions and values of a given firm, but also challenges facing it in meeting the set objectives. It is also crucial for organizations to observe moral integrity (Ferrell et al, 2011).
Firms such as Mandiant Cyber Security Company have proved effective in implementing ethic styles. In 2012, Mandiant Company positively contributed to the success of over 500 companies in America, an act that contributes significantly to driving its innovation. Although Mandiant Company is the leading company in terms of advancement in cyber risks management, it rarely involves itself in exposing its clients information. In general, the observance of ethical values by Mandiant Company contributes immensely to its success in driving its innovation (Rao and Upadhyaya, 2013).
Recommendations
I do believe in Mandiant Company advancing greatly if it adapts single leadership style. To my opinion, single leadership style is more efficient compared to other types of leadership styles because it is suitable for many changes that are encountered in firms such as Mandiant Company. In order for Mandiant Company to employ single leadership style efficiently, it is crucial for it to take into consideration the wills of its employees. Involvement of employees will not only lead to quick adoption of the new leadership style, but also boost the morale of its employees. It is also crucial for organizations to protect the information of their clients. Organizations such as Mandiant Company do come into contact with diverse customers information, which needs to be kept safe from any form of intrusion.
Though Mandiant firm is very successful in running its daily activities, Mandiant firm also need to put into practice democratic leadership. With democratic leadership, Mandiant firm will not only manage to come up with innovations, but also meet the objective of many of its clients. It is also true that innovation requires good atmosphere for its advancement. Thus, leaders for organizations such as Mandiant firm need to inoculate other persons views pertaining innovation.
References
Aydogan, N. (2008). Innovation Policies, Business Creation and Economic Development: A Comparative Approach. New York: Springer.
Bass, B. M. & Riggio, R. E. (2008). Transformational Leadership. Mahwah, New Jersey: Lawrence Erlbaum Associates, Inc.
Burns, J. M. (1978). Leadership. N.Y: Harper and Raw.
Ferrell, L et al. (2011). Business Ethics, (9th ed). New York: Cengage Learning.
Fleddermann, E. (2013). Cybersecurity in the Media Industry: The Growing Threat of Cybercrime and the Strategic Options to Defend Against it. New York: Nerd Press.
Harms, K. (2006). Forensic analysis of system restore points in microsoft windows XP. Digital investigation, 3(3), 151-158.
Kippenberger, T. (2012). Leadership styles. Oxford, U.K.: Capstone Pub.
Rao, H. R., & Upadhyaya, S. (2013). Information assurance, security and privacy services. Bingley, UK: Emerald.
Advance in technology and easy access to the internet has resulted in increased cyber crime and terrorism. Hackers are on a daily basis getting access to information that belongs to organizations and government agencies without prior consent. This jeopardizes the security of information and data since the data is either made available to everyone or it is used for malicious purposes.
The attackers of websites and other sites on the internet use the internet as a tool to spread propaganda (Denning 2001; Bednarz, 2004). The major aim of cyber attacks other than the spread of propaganda is to sabotage organizations, political reasons, alterations of data and information, economic espionage, monetary gains, revenge, and black mail (Henry, 2010; Denning 2001)
The report is based on the 1999 hacking of the Kosovo military that affected NATO’s websites and computer servers, as well as the websites of both the US and the UK governments. The paper addresses the motivation behind the attacks, the methods of attack, and the responses of the defenders to these attacks.
The motivation of the attacker(s)
The 1999 Kosovo military hacking by the Serbian Groups (Geers, 2008) was aimed at deleting information and data stored in the NATO database. Although this was not the major motivation of the attack, it is believed that the hackers’ “goal was to disrupt the NATO’s military operations” (Geers, 2008).
The kind of motivation where information is destructed through unauthorized entry into organizational systems has been supported by Henry (2010). With the information on logistics of the NATO’s operation under siege, the organization could not undertake its military operations conclusively as they were compromised. Database information was lost upon the attack and pictures and anti NATO messages posted on NATO’s website (Nuttall, 1999).
Basically, the attack was a form of propaganda that was being used to dent the public relations of NATO and the Yugoslavia military. Sabotage was another motivator to the attacks. This has been acknowledged by Nuttall (1999) who reports that the Serbia based Black Hand group attack of the NATO’s website was to sabotage the organizations military operations.
The attack methods used
The attackers infiltrated NATO’s database and website by the use of a virus. According to the case study report, the UK, the US, and NATO computers were invaded through “email-of-service and virus-infected email (Geers, 2008). The attacks were reported to have defaced the White House website.
It was also reported that NATO’s websites at its headquarters in Belgium were inoperable. The virus that was used on the email had twenty five virus strains. From a single email infected with the virus, it had multiplied within a very short period of time. The email server of NATO’s become chocked as a result of multiple emails streaming in (Nuttall, 1999; Geers, 2008).
Following these attacks, NATO was forced to upgrading its system in a bid to ensure that its computer servers and network remain secure. Unfortunately, the network attacks started to spread to other parts of the globe thus affecting international network systems. Based on the Nuttall (1999) as presented on the BBC News, the `ping’ bombardment strategy was applied by the hackers.
Ping storm has been defined as a process that entails the use of a program to “send a flood of packets to server to test its ability to handle a high amount of traffic” (Nuttall 1999). It is also used with the intention of making a server inoperable. Based on these two definitions and the case study, applications were made. Database information and data were invaded by the viruses and deleted (Nuttall, 1999).
The response of the defenders
The US responded by stating that its websites were affected but nothing had been lost. However, the UK reported having lost multiple databases that had vital information to the organization. The spokesman of NATO reported of having experienced line saturations which were blamed on the Belgrade based hackers.
The Yugoslavian Foreign Secretary was reported saying that they would step up efforts to win the propaganda war started b the hackers (Nutall 1999). The NATO spokesman later apologized on a briefing on the eventful attack on its websites and the information it provided to people.
Conclusions
Based on the case study analysis, the hackers used virus and ping storm to attack the computer servers belonging to NATO. They also used the same methods to attack the UK and U.S Whitehouse websites.
The intentions of the attacks were malicious and intentional, with the aim of spreading propaganda and deleting important files that contained military operations. In essence, the main aim was to cripple down NATO’s military operations as its websites and servers were rendered inoperable. By sending affected email that multiplied and streamed itself to the NATO’s email server, the systems and network become inoperable.
The attacks were spread over to other destinations within a short period of time. The defenders of the attacks claimed that it was used to spread propaganda and the NATO was ready to fight it back. Although the US claimed the attacks had done little harm, NATO claimed to have lost data and so was the UK. Lastly, the attackers were used to sabotage the military operations and dement the public relations of the parties involved.
Reference List
Bednarz, A. (2004). Profiling cybercriminals: A promising but immature science. Network World. Web.
Denning, D.E. (2001). Is cyber terror next? Web.
Geers, K. (2008). Cyberspace and the changing nature of warfare. Web.
Henry, J. (2010). Reducing the Threat of State-to-State Cyber attack against critical infrastructure through international norms and agreements. Center for International and Security Studies at Maryland, School of Public Policy. University of Maryland.
Nuttall, C. (1999). Sci/Tech Kosovo info warfare spreads. BBC News. Web.
E-commerce and e-governance have been identified as viable business platforms in the Middle Eastern region. However, the continued usage of ICT in the Middle East is affected by the high rate of cybercrime. Apparently, most e-commerce and e-government entities in the region are yet to enhance their security systems to conform to the international standards. This research was geared toward evaluating the factors affecting the implementation of effective security systems erected in the Middle East with those in the developed nations like the United States and the UK. The comparison would reveal the risk level that the Middle Eastern society has been subjected to by the lack of effective e-governance.
The research was also set to reveal the methods that cyber-criminals use to target victims and steal their money and information in the e-commerce and e-government platforms. Most international organizations in the region have actively engaged in e-marketing, and they have recently adopted e-commerce. The report illustrated cybercrime as one of the major factors leading to reluctance in adopting e-commerce in the Middle East. The findings in the research revealed that five main issues led to the reluctance in the adoption of e-commerce and e-governance by the Emirates. Trust was one of the biggest issues. Most potential consumers were not convinced about the viability of e-commerce.
Literature Review and Research Questions
Background information
Growth in Information Communication Technology [ICT], owing to the increased investment in research and development, has created enormous opportunities within the private and public sectors. Governments and private entities are incorporating ICT in their operations, thus leading to the emergence of a digital economy. Beaudry and Pinsonneault (2005) contend that most governments are integrating ICT technologies in their quest to attain operational effectiveness and efficiency in service delivery. This trend has led to the development of diverse e-government technologies, which have been fostered by the innovation of diverse web-based technologies. According to Abbad, Abbad, and Saleh (2011), e-government entails continued usage of different ICT technologies by federal, local, and stage agents in offering government services. One of the core motivations of integrating e-government technologies entails the elimination of the bureaucracies associated with service delivery within diverse government departments.
Similarly, private entities such as business organizations have adopted web-based technologies such as e-commerce in an effort to improve their competitive advantage. Alzahrani, Stahl, and Prior (2012) define e-commerce as “the process of buying and selling of consumer products over the Internet” (p. 19). Both large and small entities are increasingly incorporating e-commerce technologies in their operations. The emergence of diverse models of e-commerce, such as the business-to-business and business-to-consumer models, accentuate the importance of e-commerce in enhancing the quest to attain a competitive advantage. E-commerce has enhanced businesses’ ability to attain a global market reach, hence maximizing their profitability.
KPMG (2011) cites the United Arab Emirates (UAE) as one of the Middle East countries with a higher rate of Internet usage at 71% as compared to 60% in Saudi Arabia, 61% in Qatar, and 62% in Kuwait. One of the core drivers in Internet usage in the Middle East entails the penetration of mobile devices. Furthermore, the large population of a young generation in the region is likely to drive the rate of Internet usage.
Problem statement
Most governments around the world are considering the best strategies to adopt in order to influence their citizens to engage in e-commerce as a potential way of conducting business. One of the strategies being adopted by the Middle East countries entails investment in ICT infrastructure. Fernandes (2013) asserts that e-readiness is one of the core determinants in exploiting the benefits associated with e-commerce and e-government. The Middle East countries are focused on designing economic zones in an effort to foster progress in the development of telecommunication and ICT infrastructure (Basamh, Qudaih & Ibrahim, 2014). Countries in the Middle East have experienced considerable growth in the Network Readiness Index (NRI) with regard to e-government and e-commerce. For example, the UAE has been characterized by a remarkable increment in the rate at which government services are available online, coupled with the participation of the public in online activities (Gupta & Gupta, 2012).
Cybercrimes result in significant social, economic, and political impacts. A study conducted by PricewaterhouseCoopers in 2007 estimates the size of global cybercrime to be US$ 100 billion (Kshetri, 2011). Moreover, Kshetri (2011) argues that cybercrime “is mainly skewed towards the rich economies in the region” (p. 120). Thus, the Gulf Cooperation Council [GCC] nations are ranked amongst the most prone countries due to the economic wealth derived from oil and the high rate of digitalization.
The rate of cybercrime in the Middle East has increased tremendously over the past few years. According to the 2011 Norton Cybercrime Report, over 76% of all Internet users in the UAE had experienced cybercrime within one year. In 2013, over 1,400 cybercrime incidents were reported in the UAE as compared to 588 and 792 cases in 2011 and 2012, respectively (Moukhallati, 2014). The growth in cybercrime incidents has arisen from the high rate at which citizens are using web-based platforms such as social networks.
Despite the fact that most cybercrimes are not reported, the impacts should not be underestimated. Furthermore, the prevalence of cybercrime might affect the development of continued usage intention of e-government and e-commerce platforms amongst the general population. Jewkes (2013) asserts that Saudi Arabia experienced a 3,000% growth in the rate of Internet usage between 2000 and 2009. One of the factors that might limit the development of continued usage entails the lack of trust amongst users. A significant population of the Middle East population is reluctant to use e-commerce and e-government platforms due to security reasons such as comprising their personal financial information. Trust is an essential element in determining the continued usage of Internet technologies. Moreover, Loader and Thomas (2013) contend that the level of trust amongst users influences the post-usage attitude developed. One of the areas that the governments should focus on entails eliminating cybercrime activities. In a bid to attain this goal, an enabling regulatory environment should be developed. Furthermore, the importance of the Middle East countries, developing an integrated Internet security system, should not be ignored in reducing the vulnerability of e-government and e-commerce transactions.
Research objectives
This research intends to achieve the following objectives.
To evaluate the continued usage intentions of e-government and e-commerce platforms amongst the UAE population.
To assess the growth of e-government and e-commerce in the UAE.
To understand the methods used by cybercriminals in committing cybercrime activities.
To evaluate the impact of cybercrime on the development of continued usage intentions amongst the Emiratis.
To examine the effectiveness of the measures implemented by the UAE government in fighting cybercrime.
Research questions
In line with the above research objectives, this study will be guided by the following research questions.
What is the level of continued usage intentions with regard to the implemented e-government and e-commerce platforms amongst the UAE population?
To what extent have the concepts of e-government and e-commerce been integrated into the UAE?
What are the common methods used by cybercriminals in committing cybercrime?
What impact does cybercrime have on the development of continued usage intentions amongst the Emiratis?
Significance of the study
The study’s findings will be of great significance to the UAE government. First, the government will develop insight into the factors that influence the rate of Internet penetration within the country. By gaining this knowledge, the UAE government will be in a position to determine the effectiveness of its infrastructural development with regard to e-commerce and e-commerce platforms. Moreover, the UAE government will map the behavior of the general population with reference to e-government and e-commerce. The government will understand the relationship between trust and development of continued usage intention of e-government and e-commerce platforms amongst the general population. Consequently, the UAE government will be in a position to formulate effective e-government and e-commerce policies. Therefore, the UAE government will appreciate the importance of integrating optimal security measures in order to curb cybercrime activities.
Literature review
The global ICT sector has undergone tremendous growth over the past decade. Despite the growing significance of e-government and e-commerce technologies, its growth varies across countries. The developed countries such as the European countries [UK, France, and Germany] have better-established ICT infrastructure compared to the Middle East countries. Furthermore, the usage of ICT technologies in the European Zone is relatively higher as compared to the Middle East countries. A study conducted by the European Travel Commission (2014) shows that there are approximately 102 million Internet users in the Middle East, which represents 37 percent of the total population. Therefore, the rate of Internet penetration in the region is relatively low despite it being higher than the 35% global average rate. However, some Middle East countries, such as the UAE, have a relatively high penetration rate of 83%. However, growth has not been matched with the development of effective risk management practices.
Subsequently, the sector has experienced a remarkable increment in incidents of e-crimes. Most Middle East countries have recognized the reality associated with e-crimes and are beginning to take action. The UAE leads with reference to the number of e-crimes in the GCC region. However, the UAE government enacted a number of laws aimed at fighting cybercrime in order to safeguard the country’s reputation with regard to e-commerce (Oxford Business Group, 2007). The country’s commitment to fighting cybercrime through different government agencies such as the Dubai Financial Services Authority and the Telecommunications Regulatory Authority has enabled the enhancement of its effectiveness in curbing cybercrime.
A study conducted by the Oxford Business Group (2007) shows that cybercriminals are increasingly targeting e-government sites. Moreover, a report issued by KPMG (2011) emphasizes that the global cybercrime environment is progressively becoming sophisticated. Cybercriminals are employing more sophisticated computer technology as compared to the available cybersecurity measures. Traditionally, cyber-attacks were considered as a way of ‘showing off’ amongst computer geniuses. However, in contemporary society, cyber attacks have evolved into malicious efforts aimed at executing sabotage and espionage.
Types of cybercrime
Different types of cyber attacks have been conducted over the past decade. Some of the common types of attacks are illustrated herein.
Fiscal fraud – this type of e-crime involves targeting online financial platforms such as tax-revenue collection databases or online payment channels. Such attacks can lead to significant economic benefits.
State cyber attack – this type of attack is mainly conducted under the watch of a particular government against another. For example, the Stuxnet computer virus was used in 2010 in an effort to infiltrate and disable Iran’s secret nuclear program.
Malware – this entails software that is created in an effort to control other individual’s computer systems or social networking profiles. The malware provides the attacker with an opportunity to control another person’s computer remotely.
Phishing – this type of attack entails stealing individuals’ network details such as passwords with the objective of assuming control of their personal networks.
Trojan – this involves a program that is designed to damage computer programs or data saved in the hard disk.
Scareware – under this type of e-crime, cyber criminals force computer users to download disguised computer software such as antivirus software. Once downloaded and installed the software attacks the users’ system. The objective is to compel the user to pay the specific software developer [criminals] in order to remove such viruses.
According to KPMG (2011), it is expected that approximately 150,000 malicious codes and computer viruses circulate through the cyberspace every day and affect over 148,000 computers within government agencies and corporate entities. The increase in incidences of cybercrime has also been occasioned by growth in the popularity of computer games and mobile phone applications. Cybercriminals are increasingly embedding malware into computer games and mobile applications (KPMG, 2011). Furthermore, the complex nature of cybercrime requires a collaborative effort between international stakeholders in order to formulate coordinated control measures successfully.
The high rate at which cybercriminals are targeting government offices and corporations has led to an increment in the cost of maintaining, protecting, and reinstating the implemented cyberinfrastructure. For example, the UK estimates the annual cost of cybercrime in the country to be US$ 43 billion. On the other hand, the cost of phishing activities in Germany was estimated to cost US$ 22 million (KPMG, 2011).
Governments and corporations have identified cyberspace as the contemporary battlefield (Marchany & Tront, 2002). Thus, more focus has shifted to protecting digital infrastructure. KPMG (2011) argues that digital infrastructure should be considered as a ‘strategic national asset.’ Countries such as North Korea, Iran, Israel, and Russia are training ‘cyber armies.’ In its quest to fight cybercrime, the US re-introduced the Cyber-security and the Internet Freedom Act in 2011. The Act gives the President power to shut down the country’s Internet network in the event of a cyber attack. Moreover, the US government has established a special division under the Federal Bureau of Investigation [FBI] whose responsibility is to deal with cybercrime in a coordinated way. In 2010, the FBI detained over 90 people who were suspected of engaging in international cybercrime syndicate in which over US$ 70 million were stolen from small businesses and individuals through their computer networks.
Similarly, the UK has categorized cybercrime amongst the tier-1 threats, which means that it is equated to terrorism (McGraw, 2013). The UK government established the National Cyber Crime Unit, which is comprised of experts from the Police Central e-Crime Unit. The unit’s responsibility is to thwart possible cybercrime incidents by being adequately responsive to serious cybercrime incidents and being proactive in disabling cybercriminals activities. China has integrated legislation aimed at curbing cybercrime (Saini, Rao & Panda, 2012). Moreover, the country is increasingly seeking international support, for example, from the Association of Southeast Asian Nations [ASEAN] in its fight against cybercrime (KPMG, 2011).
Despite governments’ efforts, fighting cybercrime is quite complex due to the evolving techniques of cybercriminals (Ray, 2011). The degree of complexity is further increased by the borderless nature of cybercrime. The prevalence of the underground economy is another hurdle experienced in fighting cybercrime. Organized criminals are increasingly using cybercrime as an avenue to enhance illegal activities such as trading on financial information (KPMG, 2011). The shortage of skilled workforce [for example, experienced e-forensic experts] is another factor that limits governments’ effort in fighting cybercrime. Moreover, the prevalent usage of pirated software has increased governments and individuals’ attacks by malware, Trojan, and viruses (Sinrod & Reilly, 2000).
Methodology
In line with the research questions outlined in chapter 2, the process of conducting this study focuses on testing two main research hypotheses, viz. the null (H0)and the alternate (H1) hypothesis as outline below.
H1: The existence of cybercrime negatively affects the development of continued usage intention amongst the Emiratis.
H0: Cybercrime does not have any impact on the development of continued usage intention of e-government and e-commerce platforms amongst the general population in the UAE.
Research design
The purpose of this study is to evaluate the challenges encountered in enhancing the usage of e-government and e-commerce platforms in the Middle East. The researcher is focused on ensuring that the study’s findings are valid in order to enhance the reliability of the findings to the target stakeholders, viz. the UAE government. The validity and reliability of a particular study depend on the research design used, which highlights the importance of selecting an effective research strategy. In the process of conducting this study, the researcher has utilized the concepts highlighted by the following research onion.
The study is based on mixed research approach, which has been attained by incorporating qualitative and quantitative research approaches. Qualitative research design has been used in an effort to assist the researcher to gather substantial data from the field, hence fostering the effectiveness of the study’s findings. Adopting qualitative research design has increased the researcher’s capacity to understand the challenges encountered in enhancing implementation and usage of e-government and e-commerce platforms. The decision to adopt qualitative research design is further informed by its interpretive nature and ability to gather data from the natural setting.
The researcher recognizes that using qualitative research data leads to the acquisition of voluminous data. Thus, quantitative research design has been utilized in order to condense the data collected. Quantitative research design has been used by deploying numerical data analysis techniques such as statistical data analysis techniques.
Population and sampling
In the course of conducting the study, the researcher was concerned on understanding the impact of cybercrime on utilization of e-government and e-commerce techniques amongst the Emiratis. Subsequently, the researcher identified the general population in the UAE as the target study population. However, the researcher understands the difficulties associated with collecting data on all individuals within the population. Subsequently, the concept of sampling was utilized in selecting respondents from the target population. Simple random sampling techniques increase manageability of research studies. Moreover, the researcher’s design to adopt simple random sampling is informed by the need to eliminate bias in selecting study respondents. A sample of 300 respondents was selected from the general population in the Emirates. The researcher assumed that the responses collected from the target population represented the prevailing situation with reference to cybercrime in the UAE.
Data collection
The study is focused on attaining a high degree of reliability and relevance. Subsequently, the study is based on primary and secondary sources of data. The primary sources of data entail collecting information from the selected research respondents, while secondary sourced involve collecting data from published reports on cybercrime activities in the Middle East region.
In a bid to collect data from primary sources, the researcher adopted questionnaires as the core data-collection instruments. A set of questionnaires on issues related to cybercrime and application of e-commerce and e-government technologies amongst the general Emirati population were designed. The questionnaires designed were semi-structured in nature, which means that both open-ended and close-ended questionnaires were incorporated. The choice of semi-structured questionnaires was informed by the need to increase the rate of response. For example, the use of open-end questionnaires provided the respondents with an opportunity to answer the questionnaires according to their opinion. Conversely, using close-ended questionnaires increased the likelihood of obtaining definite responses on some aspects. The questionnaires were distributed to the selected respondents through emails in order to minimize the cost of the study. Furthermore, the researcher obtained responses by conducting an online survey by posting the questionnaires on university websites and government websites. The choice of electronic mediums in distributing the questionnaires was informed by the need to reach a large reach a large number of respondents more cost efficiently. The questionnaires were reviewed extensively prior to their issuance to the respondents in order to eliminate any ambiguities that might limit the rate of response.
Data analysis and presentation
In order to interpret the research findings successfully, the researcher integrated Microsoft Excel software as the core tool for data analysis. Microsoft Excel enabled the researcher to condense the voluminous data obtained from primary sources of data. This goal was attained by using different tools such as tables, graphs, charts, and percentages. Therefore, the researcher was in a position to develop a better understanding on the relationship between cybercrime and usage of e-government and e-commerce amongst UAE citizens.
Report
Analysis and Findings
The survey showed that citizens in the UAE and Middle East have adopted the application of e-government and e-commerce platforms. When asked about the application of electronic platforms, 55.17% of the respondents argued that they had at least applied e-commerce and e-government platforms in their personal transactions. Additionally, 80% of the respondents cited different ways in which they utilize the electronic platforms implemented by governments and corporations. Some of the areas of application include immigration, healthcare, transport, and consumption utilities such as paying electricity bills. When asked about their experience on e-government and e-commerce platforms, the respondents’ opinion varied as illustrated in the table below.
Opinion
Rate of response
Very unsatisfied
3.45%
Unsatisfied
5.17%
somewhat unsatisfied
13.79%
Somewhat satisfied
18.97%
Satisfied
44.83%
very satisfied
13.79%
The study also intended to evaluate the respondents’ opinion on the relevance of e-government and e-commerce in enhancing operational efficiency within the government and business entities. Over 96.6% of the respondents argued that the electronic platforms within the business and government agencies had enhanced operational efficiency and service delivery.
Opinion
Response rate
Positive impact
96.60%
No impact
3.40%
The survey also showed that 79.3% of the respondents were conversant on utilizing e-government and e-commerce platforms, while only 20.7% asserted that they were not conversant with electronic platforms.
The survey also showed the existence of varied opinion on the level of acceptance of e-commerce and e-government platforms amongst the UAE citizens as illustrated below.
The respondents’ opinion regarding perceived usefulness of e-commerce and e-government platforms in the Middle East varied as illustrated by the graph below.
Despite the high rate of perceived usefulness of e-government and e-commerce platforms, the respondents identified a number of factors hindering the implementation of e-government and e-commerce platforms as depicted by the chart below.
The study showed that cybercrime is one major factors hindering the adoption of e-commerce and e-government platforms. Over 70.69% of the respondents cited cybercrime as one of the major factors hindering the increased utilization of e-government and e-commerce platforms in the Middle East. Only 29.31% of the respondents were of the view that cybercrime does not affect the utilization of e-commerce and e-government platforms. Over 82% of the respondents were of the opinion that the UAE government has implemented diverse cyber laws in an effort to deal with cybercrime, while only 17.24% of the respondents said that they were not aware of the cyber laws. This realization shows that most citizens in the UAE and the Middle East consider trust as one of the critical aspects in developing continued usage intentions amongst the general public. Moreover, the study showed that most citizens are not aware of the security measures implemented by the government in order to curb the occurence of cybercrime within the country. This aspect might be one of the major factors hindering adoption of e-commerce platforms amongst the general population.
Conclusion and recommendations
Most countries in the Middle East such as the UAE have appreciated the importance of ICT in enhancing economic growth. Subsequently, the Middle East governments are progressively enhancing their e-readiness by improving their ICT infrastructure. Despite the benefits associated with e-government and e-commerce in enhancing operational efficiency within the private and public sectors, the adoption and development of continued usage of the e-government and e-commerce platforms is greatly threatened by the high rate of cybercrime, which affect development of trust amongst the general population on the implemented e-commerce and e-government platforms.
Cybercriminals are increasingly using the cyberspace in stealing confidential information from governments and the public by using complex e-crime technologies, which enable them to infiltrate their target computer systems. The literature review shows that cybercrime is prevalent across the world. Moreover, cybercrime has led to remarkable financial losses amongst individuals and governments.
The UAE is one of the Middle East countries that is characterized by a high rate of Internet penetration. The study confirms the hypothesis that continued usage of the e-commerce and e-commerce platforms implemented by the government might be affected by the high rate of cybercrime within the country. Therefore, the importance of government in the UAE implementing effective measures in order to enhance the adoption of e-commerce amongst the governents and business entities should not be underestimated. Subsequently, most citizens in the UAE and the Middle East region are reluctant to use online platforms in consuming services from the governemnt and corporate entitieis. Therefore, the UAE government should deal with cybercrime as one of strategic aspects in enhancing the country’s global competitiveness as an investment destination. In order to achieve this goal, it is imperative for the UAE government to formulate effective measures to track, identify, and thwart cybercrime activities. Some of the measures that the UAE government should consider are outlined below.
The government should formulate and enact strict cybercrime laws that will be aimed at punishing cybercrime perpetrators.
The UAE government should establish a team of e-forensic experts, which should be charged with the responsibility of identifying and eliminating cybercrime activities.
Considering the borderless nature of cybercrime, it is imperative for the UAE government to collaborate with other GCC and ASEAN countries in curbing cybercrime. This move will aid in dealing with cybercrime at an international level.
The government should also compel businesses and other agencies to implement effective Internet security measures within the country’s ICT infrastructure. The government should also encourage individuals, government agencies, and private entities to update their internet security continuously in order to minimize occurrence of cybercrime.
In addition to the above aspects, it is imperative for the government to curb the prevalence of software piracy in order to minimise the spread of cyber security threats through spread of viruses, Trojans, and malware amongst other types of cyber attacks.
References
Abbad, M., Abbad, R., & Saleh, M. (2011). Limitations of e-commerce in developing countries: Jordan case. Education, Business and Society: Contemporary Middle Eastern Issues, 4(4), 280-291.
Alzahrani, A., Stahl, C., & Prior, M. (2012). Developing an Instrument for e-public services’ acceptance using confirmatory factor analysis: Middle East context. Journal of Organizational and End User Computing (JOEUC), 24(3), 18-44.
Basamh, S., Qudaih, A., & Ibrahim, J. (2014). An overview on cyber security awareness in Muslim countries. International Journal of Information, 4(1), 21-24.
Beaudry, A., & Pinsonneault, A. (2005). Understanding user responses to Information technology: A coping model of user adaptation. MIS Quarterly, 29(3), 493-524.
European Travel Commission: Internet Usage. (2014). Web.
Fernandes, L. (2013). Security and trust in electronic business transactions-A study in the Middle East. ZENITH International Journal of Multidisciplinary Research, 3(2), 142-148.
Gupta, K., & Gupta, M. (2012). E-Governance Initiative in Cyber Law Making. International Archive of Applied Sciences & Technology, 3(2), 97-101.
Jewkes, Y. (2013). Crime online. London, UK: Routledge. KPMG: Issues monitor; cybercrime- a growing challenge for governments. (2011). Web.
Kshetri, N. (2011). Cybercrime and cyber security in the global south. Basingstoke, UK: Palgrave Macmillan.
Loader, D., & Thomas, D. (2013). Cybercrime: Security and surveillance in the information age. London, UK: Routledge.
Marchany, C., & Tront, J. (2002). E-commerce security issues’. In System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on, 3(3), 2500-2508.
McGraw, G. (2013). Cyber war is inevitable (unless we build security. Journal of Strategic Studies, 36(1), 109-119.
Oriesek, D. (2004). Maximising corporate reputation through effective governance; a study of structures and behaviors. Boca Raton, FL: Upublish.Com.
Oxford Business Group. (2007). The report; Dubai 2007. London, UK: OBG.
Ray, S. (2011). Emerging trend of e-commerce in India: some crucial issues, prospects, and challenges. Computer Engineering and Intelligent Systems, 2(5), 17-35.
Saini, H., Rao, S., & Panda, T. (2012). Cyber-crimes and their impacts: A review. International Journal of Engineering Research & Applications (IJERA), 2(2), 202-209.
Sinrod, J., & Reilly, W. (2000). Cyber-crimes: A practical approach to the application of federal computer crime laws. Santa Clara High Technology Law Journal, 16(2), 177-232.
How to prepare a windows-based computer for a forensic investigation
Forensic investigators use specific hardware and software to examine computer systems. The increased adoption of Windows operating systems has made computer forensic investigators use Windows-based platforms as sources of digital evidence. The first step involves taking the image of the computer suspected to have crucial digital data.
If crucial evidence is suspected to be held in volatile storage, then a live analysis is conducted, but a dead analysis is performed when the evidence is thought to be contained in permanent storage disk locations. A Windows-based computer would require retrieval of information before shutting down the computer. However, if the information is thought to be contained in the permanent storage, then a computer has to be shut down before transporting it to a laboratory for forensic analysis.
A computer forensics expert should be careful not to change data held in non-volatile storage when powering down the computer. When using a Microsoft Windows system, the information stored in non-volatile storage could be prevented from interference by removing the power cord from the socket (Nelson, Phillips & Steuart, 2010; Easttom, 2014).
The first step in the laboratory examination would involve analysis of the status and setup of the computer. The computer should be booted and BIOS setup selected. Caution should be taken so that the Windows-based computer does not use internal digital devices to boot.
Alternatively, internal drives should be disconnected so that they would not interfere with the intended booting procedure (Nelson et al., 2010; Taylor, Haggerty, Gresty & Lamb, 2011; Easttom, 2014). At this point, information could be retrieved from the computer for forensic analysis.
How to handle digital evidence
Digital data could be changed easily, and this could interfere with the integrity of digital information. Also, alteration of digital data could make it difficult to differentiate original data from copied data. There are four principles that are followed when handling digital evidence (Easttom, 2014). First, digital evidence should be collected in a manner that does not cause changes in the form of data. If the data are changed, then the integrity of the data could be compromised.
Secondly, only trained persons should be allowed to handle digital evidence. Persons who are trained could handle digital evidence professionally and be responsible for breaching ethical, legal and professional standards (Nelson et al., 2010). Also, digital evidence that is professionally handled by trained personnel could have higher chances of being admissible in court than digital evidence handled by untrained persons.
Third, all processes used to analyze digital evidence should be well documented and stored for reviews in the future. There should be clear reasons for any changes that are done on the digital evidence. This helps to hold professionals responsible for their actions. Fourth, computer forensic experts should examine copies of original files suspected to contain evidence (Easttom, 2014). In other words, original files should not be examined or manipulated.
Gathering data
The quality of evidence gathered in computer forensics greatly depends on the law enforcement and procedures used when gathering the evidence (Nelson et al., 2010). The law is clear about specific legal guidelines that should be followed when handling forensic evidence. For example, the Health Insurance Portability and Accountability Act prohibits professionals from disclosing clients’ information without their permission (Easttom, 2014).
Therefore, it would be illegal for a computer forensics professional to disclose private information about a person who is being investigated without his or her permission. Gathering data in computer forensics is also expected to follow standard procedures that aim to promote quality of the evidence. Standard evidence gathering procedure requires forensic experts to use tested and accepted tools for data collection.
Some of the tools may include boot software, computer forensic software, analysis software and intelligence analysis software, among others. General practices and procedures also require that all personnel involved in gathering evidence should be aware of the best procedures and practices. This helps to maintain the integrity and authenticity of forensic evidence (Nelson et al., 2010; Easttom, 2014).
Privacy issues
Privacy issues are common in the field of computer forensics. Legal and ethical standards require that computer forensic experts should uphold the privacy of client organizations. In some cases, leakage of a client’s information may result in media attention that could negatively impact a business organization.
Code of ethics prohibits persons from disclosing assets of an individual when conducting forensic investigations. It is also against the code of conduct to disclose an individual’s information on the internet during forensic investigations (Nelson et al., 2010; Taylor et al., 2011).
How to use data as evidence in a criminal proceeding
The data collected from the computer system would act as evidence in a criminal proceeding only if it meets the standard requirements (Taylor et al., 2011; Easttom, 2014). First, there must be proper documentation to show that the data was collected using standard legal and ethical procedures.
Second, it should be shown in a court that the data being presented as evidence have not been altered to affect their integrity. Third, it must be shown that the persons handling the data at various stages are trained for that purpose. Once the three conditions are met, the data would be used as standard evidence in a criminal proceeding.
References
Easttom, C. (2014). System forensics, investigations, and response (2nd ed.). Burlington, MA; Jones and Bartlett Learning.
Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to computer forensics and investigations. Stamford, CT: CengageBrain. com.
Taylor, M., Haggerty, J., Gresty, D., & Lamb, D. (2011). Forensic investigation of cloud computing systems. Network Security, 2011(3), 4-10.
Principles of computer forensics are standard rules that govern how digital evidence is handled to make it admissible in court (Nelson, Phillips & Steuart, 2010; Taylor, Haggerty, Gresty & Lamb, 2011; Easttom, 2014). Many countries and states had their principles of computer forensics.
However, efforts have been made to align several principles in order to have internationally accepted principles that can be applied across the world (Taylor et al., 2011). The standardization efforts have resulted in the adoption of four key principles. First, digital evidence should be collected in a manner that does not allow alteration of crucial data. This principle attempts to uphold the integrity of evidence (Taylor et al., 2011).
Second, the processes of collecting, storing and analyzing digital data should be fully documented, and reasons should be given for any manipulation done. This principle aims to make professionals handling digital evidence responsible for their actions. Third, digital evidence should only be accessed by forensically competent persons. This principle ensures that non-competent persons do not interfere with digital evidence (Nelson et al., 2010; Taylor et al., 2011).
Fourth, it should be ensured that the right procedures are followed during computer forensic investigations. If the law and principles of computer forensics are followed, then digital evidence would be admissible in court. Admissible evidence is crucial in promoting justice and fairness in criminal proceedings (Nelson et al., 2010; Taylor et al., 2011; Easttom, 2014).
The role of computer forensics as it relates to other IT disciplines
Computer forensics is the integration of computer science and law. It is crucial in the investigation of crimes that are related to the manipulation of computer systems (Easttom, 2014). All IT applications rely on the use of data that are analyzed, stored and retrieved for particular uses (Nelson et al., 2010).
Computer forensics could be used in legal matters to solve criminal issues in all other IT applications. Therefore, forensic science with regard to computer systems plays crucial legal roles in relation to other IT application (Taylor et al., 2011; Easttom, 2014).
History of computer forensics
Crimes related to the use of computers came to the limelight in 1978 in Florida after legislation was adopted to prohibit unauthorized changes of data preserved in computers. Federal laws recognized crimes related to the use of computers in the 1980s. History of computer forensics can be categorized into three distinct phases (Easttom, 2014). First, the ad-hoc stage was marked by lack of clear frameworks for dealing with computer crimes.
The phase was also characterized by many legal issues that revolved around the applications of computer systems to handle digital evidence used in court. Second, the structured phase involved the adoption of specific tools and procedures in digital crime investigations and prosecutions. Third, the enterprise phase (the current phase) involves fast collection of digital evidence, creation of sophisticated tools and many companies offering forensic services (Nelson et al., 2010; Easttom, 2014).
How to use computer forensics in criminal investigations
For digital evidence to be admissible in court, investigations should be conducted in a manner that adopts the principles of computer forensics (Easttom, 2014). The following steps are involved in computer forensics investigations:
A computer system containing crucial evidence is secured to ensure that data are safe.
All files in a computer system that are not encrypted are copied.
Deleted information is retrieved.
Contents of hidden files are revealed using specific software to identify hidden data.
Protected files are decrypted and accessed.
Inaccessible parts of computer disks are analyzed to locate files that could contain crucial data.
All steps of the procedure are documented.
Constitutional protections and laws covering investigations
Computer forensic investigations are protected by the US constitution and various federal and state laws. Therefore, computer forensic investigators need to conduct investigations within confines of the law. Federal computer crime laws protect various aspects of investigations.
Some of the federal computer crime laws include Health Insurance Portability and Accountability Act, USA Patriot Act, Child Pornography Protection Act, and Communications Decency Act 1986, among others. Case laws are based on verdict given by judges in computer crimes, and they are adopted as legislation that protects computer forensic investigations (Nelson et al., 2010).
Ethics
The code of ethics requires computer forensic investigations to be conducted using accepted ethics (Taylor et al., 2011). Some computer forensic issues include privacy, impact on society and intellectual property rights (Nelson et al., 2010; Easttom, 2014). Computer forensic professionals should protect the secrecy and privacy of clients’ information (Easttom, 2014). A high degree of secrecy and privacy could be achieved when personnel adhere to ethical standards.
Computer forensic professionals should follow standard ethical procedures when conducting investigations. If the standards are followed, then the evidence would have a high degree of accuracy and authenticity. Adherence to standard ethical procedures also goes a long way in preventing alteration of crucial forensic evidence that would be admissible in court.
References
Easttom, C. (2014). System forensics, investigations, and response (2nd ed.). Burlington, MA; Jones and Bartlett Learning.
Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to computer forensics and investigations. Stamford, CT: CengageBrain. com.
Taylor, M., Haggerty, J., Gresty, D., & Lamb, D. (2011). Forensic investigation of cloud computing systems. Network Security, 2011(3), 4-10.