Cyber in security: A post-mortem attempt to assess cyber problems from it and business management perspectives

Angela Hollman, Sonja Bickford, Travis Hollman

Research output: Contribution to journalArticlepeer-review

Abstract

Jane, a veteran Accounting employee at Sachem Manufacturing, Inc., recently fell victim to a phishing attack that infected her computer with ransomware. Jane then furthered the attack by logging into key company systems perpetuating the problem. A series of frantic phone calls followed as staff from Information Technology (IT) scrambled to understand the problem and put the broken pieces back together. Unfortunately, the damage was too deep and the problem reached out to hinder a meeting that the CEO was having with an important client. Finger pointing, name calling, and head shaking took over the "War Room" as the top executives soon discovered that their managerial, technical, and political shortcomings were more ubiquitous than they cared to admit. The CEO blamed IT for not preventing the situation and for not communicating effectively with management in understandable terms. IT blamed the CEO for limiting necessary technical resources.

Original languageEnglish (US)
Pages (from-to)42-70
Number of pages29
JournalJournal of Cases on Information Technology
Volume19
Issue number3
DOIs
StatePublished - Jul 1 2017

Keywords

  • Business Management
  • Business and IT Relationships
  • Cybersecurity
  • Hacking
  • IT
  • Information Technology
  • Leadership
  • Ransomware

ASJC Scopus subject areas

  • Information Systems
  • Computer Science Applications
  • Strategy and Management
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Cyber in security: A post-mortem attempt to assess cyber problems from it and business management perspectives'. Together they form a unique fingerprint.

Cite this