Internal misuse of information and communications technology by public sector employees
ICT may be both the target of criminal activity, as well as a tool used to facilitate criminal acts (Choo, Smith & McCusker 2007). Instances of misuse of ICT within the public sector may fall within the definition of fraud provided in the Commonwealth Fraud Control Guidelines 2011 (the Guidelines), namely ‘dishonestly obtaining a benefit, or causing a loss, by deception or other means’ (AGD 2011: 5). According to KPMG (2013), the most concerning frauds against organisations are those perpetrated by employees, as they tend to be committed for longer periods and may cause more reputational damage than external fraud. Over a three year period between 2008 and 2011, the estimated value of internal fraud against the Commonwealth has steadily increased, from $1.9m in 2008–09 (Lindley & Smith 2011) to $3m in 2010–11 (Jorna & Smith 2013). Internal misuse of ICT is an important area of concern as employees are often placed in a position of trust, which provides them with electronic access to personal information and records. Prior research has shown that in some instances, there are few checks on an employee’s access (Smith & Jorna 2011). The outcomes of internal misuse can be damaging to the organisation and in the case of the public sector, taxpayers’ confidence.
There are significant implications of misuse of ICT in the public sector, particularly owing to the amount of data that are held about individuals by governments. For example, data held by different tiers of government may include:
· health, income, employment and education information;
· details about contact with the criminal justice system;
· information such as address and date of birth; and
· photographs associated with licences and passports.
Data may also be collected that could track individuals’ movements and daily activities, such as public transport usage. Misuse of ICT may also ‘deplete government resources and have a negative impact on the administration of agencies’, affecting the availability of funds for service and program delivery (Lindley, Jorna & Smith 2012: ix). Where misuse of ICT results in data breaches, there can be further negative impacts arising from the loss and subsequent misuse of individuals’ personal information.
Relying on policy and prosecution data to identify the extent of insider misuse of ICT does not provide a complete picture, as many matters go undetected, unreported, or may not have enough evidence or be serious enough to warrant investigation or prosecution (Lindley & Smith 2011). Not all misuse of ICT may be classified as criminal behaviour, but may instead violate the Australian Public Service Code of Conduct, organisational policies or attract civil remedies. Regardless of whether an incident involves the commission of a criminal offence, it may result in disciplinary action being taken, such as a formal warning, demotion or job loss.
Question 2.1
You an employee in the public sector. You are faced with the ethical challenge of accepting a bribe for the personal and confidential information that you have access to. Analyse the five-step process that can assist you in making the right decision when confronted with the above situation.
Step by stepSolved in 4 steps
- Corporate Social Responsibility has been defined as a “firm’s intelligent and objective concern for the welfare of society; such concern should entail a firm contributing to human betterment, by using its profit to address issues of concern to society and/or a firm to restraining from behaviour and activities that are harmful to society, no matter how immediately profitable such behaviour or activities might be”. Required: Describe the relationship between strategy and corporate social responsibility Explain how a firm’s cooperation in matters of taxes, bribery and corruption may constitute corporate social responsibilityarrow_forwardthe major federal legislation in Canada that defines illegal practices, including price fixing, bid rigging, price discrimination, predatory pricing, double ticketing, resale price maintenance, bait and switch selling, and pyramid selling occurs when false or deceptive comparisons or distorted claims are made concerning a competitor's product, services, or property comprise principle and standards that guide behaviour in the world of business may be incurred when an unfair and untrue statement is made about a competitor in writing the statement becomes actionable when it is communicated to a third party and can be interpreted as damaging the company the foundation for partnering-style relationship, product, customer, and presentation strategies an attempt to influence the person receiving the "gift"prohibits joining a competing firm for a year after they leave mutual exchange of benefits, as when a firm buys products from its customer the buyer wants to do business with an institution…arrow_forwardState and describe three (3) potentials grounds for overturning an NLRB election.arrow_forward
- Purell Magazine Construction Fraud The Purell Magazine Construction Fraud case involves James Small, a facilities supervisor at Purell Magazine and Publishing House, who engaged in a sophisticated scheme of occupational fraud. Small was responsible for overseeing the painting operations as part of the company's conversion of its plant in Oakville, Ontario, into an office complex. This massive renovation project involved constructing an auditorium identical to one in the company's European offices. Small's fraudulent activities came to light when the vice president of administrative services, Richard Green, noticed forgeries in a stack of invoices related to the auditorium construction project. An initial investigation revealed that all the forgeries were in the painting division, with a budget of approximately $800,000 a year. Small, who earned about $30,000 a year, had been the only person overseeing the painting operations. Small's fraud scheme involved creating false invoices for…arrow_forward1. Regarding the Endangered Species Act (ESA), the following statement is true: The act limits its scope to protection with no recovery plans for the species it protects. The act does not allow courts or regulators to take economic factors into consideration in applying its provisions. The act was passed in the year 1952 under the guidelines given by the panel on the Council on Environmental Quality. The act has its scope limited to private businesses. The act provides for exemptions that are applicable to private activities for certain important federal projects. 2. Under the Securities and Exchange Commission's (SEC) quasi-judicial power, it has the right to regulate the various stock exchanges. appoint commissioners. conduct investigations. create legislation relating to federal securities laws.…arrow_forwardThe Case of Baylor University Patty Crawford, the Title IX coordinator at Baylor from November 2014 to October 2016, was hired to coordinate the institution’s Title IX compliance when this case took place (Baylor University, n.d.). Like all Title IX coordinators, Crawford’s role was a comprehensive administrative role that bears the responsibility of ensuring that campuses prevent and respond to gender discrimination, including sexual misconduct. This role spans duties related to grievance process management, victim assistance, organization management, and climate management (Lake, 2017). In addition to managing the institution’s compliance, Title IX coordinators also craft comprehensive training and awareness strategies to ensure students, employees, and other campus stakeholders are aware of how to identify and report sexual misconduct and what resources are available to students regardless of whether they choose to proceed with the grievance process. Crawford alleged that she was…arrow_forward
- The Securities and Futures Commission (SFC) has banned Mr Wang Can, a former licensed representative of China Galaxy International Securities (Hong Kong) Co., Limited (CGIS), for 30 months for misconduct (Note 1). The SFC found that Wang asked his friend to open a securities account in September 2014 and conducted personal trading in that account for at least nine months. Wang became privy to information regarding a proposed acquisition of Linmark Group Limited (Linmark) in November 2014 when he assisted CGIS to prepare pre-engagement documentation for a potential client. He went on to purchase shares of Linmark through his friend's account and sold them two days after Linmark announced the proposed acquisition on 3 December 2014 and made a profit of $7,800 (Note 2). Wang breached CGIS' staff dealing policy by failing to disclose to his then employer his personal trading activities and beneficial interests in his friend's account. He also breached CGIS's staff dealing policy in that…arrow_forwardA civilian working on a military base is arrested for stealing money from the military. What jurisdiction should be responsible for his prosecution?arrow_forwardLegal consequences following a successful cyberattack on a well-known organization often include O the loss of cash, inventory, equipment, patents, copyrights, trade secrets, and data the diversion of resources to the operation of back-up procedures O lawsuits initiated by consumers who incurred damages O an erosion of trust previously established with customers, suppliers, and partnersarrow_forward
- PLS HELP ASAParrow_forwardpls help asaparrow_forwardScenario B (Australian Taxation Law): – Taxpayers at retirement age Inder Muller, aged 58, recently retired from his employment as chief accountant of Moon Light Pty Ltd, after 17 years and 4 months of service. Inder’s wife Belinda, aged 59, is currently running a small newsagency. Inder and Belinda visited you to seek advice on various retirement planning options specified below. Inder and Belinda both are covered by private health insurance. 3) Regarding Belinda’s Business Belinda has started the newsagency business 3 months ago. She would like to get advice on the tax benefits available for her new business. The expected business turnover for the financial year ending 30th of June 2022 is $500,000 including GST. She has purchased the following assets for the business. > Photocopy machine for $5,500 including GST on the 15th of Feb 2022 and was ready to use on the 1st of March 2022 > Motor vehicle purchased on the 1st May 2022 for $68,800 including GST, to be used solely for…arrow_forward
- Understanding BusinessManagementISBN:9781259929434Author:William NickelsPublisher:McGraw-Hill EducationManagement (14th Edition)ManagementISBN:9780134527604Author:Stephen P. Robbins, Mary A. CoulterPublisher:PEARSONSpreadsheet Modeling & Decision Analysis: A Pract...ManagementISBN:9781305947412Author:Cliff RagsdalePublisher:Cengage Learning
- Management Information Systems: Managing The Digi...ManagementISBN:9780135191798Author:Kenneth C. Laudon, Jane P. LaudonPublisher:PEARSONBusiness Essentials (12th Edition) (What's New in...ManagementISBN:9780134728391Author:Ronald J. Ebert, Ricky W. GriffinPublisher:PEARSONFundamentals of Management (10th Edition)ManagementISBN:9780134237473Author:Stephen P. Robbins, Mary A. Coulter, David A. De CenzoPublisher:PEARSON