preview

Case Study: When Hackers Turn to Blackmail Essay

Good Essays

Case Study: When Hackers Turn to Blackmail
1. The introduction of Sunnylake hospital case
The use of information technology in business presents major security challenges, poses serious ethical question, and affects society in significant ways. Especially, the computer crime is a growing threat to society and is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It presents a major challenge to the integrity, safety, and survival of most business systems.

Once Sunnylake Hospital was a backwater community care centre, while Paul, the CEO of Sunnylake had come to the hospital five years earlier, the situation of …show more content…

Once negotiations are in play, everything turns into a chess game. The negotiator and the emergency team can work out terms and logistics. When an agreement has been reached, the money is dropped and the whole episode is over.

2.2 Providing full disclosure to his various constituents
The CEO and the board are responsible for “good business judgment” in guarding against the threat. So Paul’s first mistake was to dismiss the original e-mail message. All IT threats should be taken seriously, and he would have let Jacob Dale know about no IT system is “bulletproof.” Sunnylake should have had a workable, fully tested backup system to ensure uninterrupted patient service and protect everyone affected. Doctors and nurses are trained to diagnose, problem solve, and dynamically treat their patients. IT systems facilitate, but are not substitutes for, patient treatment. The fact that the hospital did not have up-to-date security software installed, or a reliable security outsourcer and an emergency plan in place, is inexcusable.

So what should Paul, the CEO, do? First, he had better get off that sofa and give up the vain hope that IT can restore the system and get the hospital running again. Paul should also be in high communication mode with all of his constituents. He should understand that in today’s networked environment there are absolutely no secrets. Any IT breach forces an organization to ask, How much should we disclose about this threat? In

Get Access