Unit 5
Unit 5
Unit-5
Cyber Security: Organizational Implications
Introduction, Cost of Cybercrimes and IPR issues, Web threats for Organizations,
Security and Privacy Implications, Social media marketing: Security Risks and Peril
for Organizations, Social Computing and the associated challenges for Organizations.
5.1 Introduction
Organizational Implications-Introduction
In the global environment with continuous network connectivity, the possibilities for
cyber attacks can emanate from sources that are local, remote, domestic or foreign.
They could be launched by an individual or a group. They could be casual probes from
hackers using personal computers (PCs) in their homes, hand-held devices or intense
scans from criminal groups.
A key message from this discussion is that cybercrimes do not happen on their
own or in isolation. Cybercrimes take place due to weakness of cyber security
practices and “privacy” which may get impacted when cybercrimes happen.
Privacy has following four key dimensions:
1. Informational/data privacy: It is about data protection, and the
users’ rights to determine how, when and to what extent information
about them is communicated to other parties.
2. Personal privacy: It is about content filtering and other
mechanisms to ensure that the end-users are not exposed to
whatever violates their moral senses.
3. Communication privacy: This is as in networks, where
CYBER SECURITY: ORGANIZATIONAL IMPLICATIONS Page 4
Cyber Security Unit-5
The key challenges from emerging new information threats to organizations are as
follows:
1. Industrial espionage: There are several tools available for
web administrators to monitor and track the various pages and
objects that are accessed on their website.
2. IP-based blocking: This process is often used for blocking the
The most often quoted reasons by employees, for use of pirated software, are
as follows:
1. Pirated software is cheaper and more readily available.
2. Many others use pirated software anyways.
3. Latest versions are available faster when pirated software is used.
5.2 Web Threats for Organizations: The Evils and Perils
Internet and the Web is the way of working today in the
interconnected digital economy. More and more business applications are
web based, especially with the growing adoption of cloud computing.
CYBER SECURITY: ORGANIZATIONAL IMPLICATIONS Page 8
Cyber Security Unit-5
Cloud computing is one of the top 10 Cyber Threats to organizations. There are
data privacy risks through cloud computing. Organizations should think about
privacy scenarios in terms of “user spheres”. There are three kinds of spheres
and their characteristics:
1. User sphere: Here data is stored on users’ desktops, PCs, laptops, mobile
phones, Radio Frequency Identification (RFID) chips, etc. Organization’s
responsibility is to provide access to users and monitor that access to
5.4 Social Media Marketing: Security Risks and Perils for Organizations
Social media marketing has become dominant in the industry. According to fall
2009 survey by marketing professionals; usage of social media sites by large
business- to-business (B2B) organizations shows the following:
Although the use of social media marketing site is rampant, there is a problem
related to “social computing” or “social media marketing” – the problem of
privacy threats. Exposures to sensitive PI and Confidential business
information are possible if due care is not taken by organizations while using
the mode of “social media marketing.”
Opportunities:
Enhanced Communication: Social computing platforms facilitate real-time
communication, enabling seamless information exchange within
organizations.
Collaborative Decision-Making: Social platforms allow employees to
collaborate on projects, fostering innovation and collective problem-solving.
Customer Engagement: Companies can engage with customers directly,
gathering feedback and enhancing customer relations through social media.
Data Collection and Analysis: Social computing generates vast amounts of
data, which organizations can analyze for market trends and consumer
preferences.
Global Reach: Social media provides a global platform, allowing organizations
to reach a broader audience and expand their market presence.
Brand Building: Companies can use social computing to build and manage
their brand image, interact with customers, and address concerns publicly.
Challenges:
Data Privacy: Managing sensitive data on social platforms raises concerns
about privacy breaches and data leaks.
Cyber security Threats: Social computing platforms are susceptible to various
cyber threats, including phishing, malware, and social engineering attacks.
Reputation Management: Negative publicity or misinformation can spread
rapidly on social media, impacting an organization's reputation.
Regulatory Compliance: Organizations must navigate complex regulations
concerning data protection and online communication, ensuring compliance
with laws like GDPR.
Employee Productivity: Excessive use of social media by employees can
impact productivity, requiring organizations to implement effective usage
policies.