{"title":"From disruption to ransomware: Lessons From hackers","authors":"P. Datta, T. Acton","doi":"10.1177/20438869221110246","DOIUrl":null,"url":null,"abstract":"Since 2020, SARS-COV-2 (COVID-19) has forced organizations to pivot towards digital transformation. Yet, the same period has seen a dramatic rise in hacking and ransomware attacks, especially from internationally malicious actors attempting to simultaneously disrupt and profit. Although a knee-jerk reaction has been the adoption of new-fangled technologies as the only way to prevent, detect, and mitigate attacks, this case study highlights how imperative it is for organizations to proactively review and re-engineer their process inefficiencies and human errors as a systematic counter-strategy. Using fictitious characters reflecting real-world hacking processes and outfits, this case projects the need for a new cybersecurity order, where cybersecure process reengineering and human training deserve greater attention than simply investing in newer cybersecurity technologies.","PeriodicalId":37921,"journal":{"name":"Journal of Information Technology Teaching Cases","volume":"36 1","pages":"182 - 192"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Technology Teaching Cases","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/20438869221110246","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 6
Abstract
Since 2020, SARS-COV-2 (COVID-19) has forced organizations to pivot towards digital transformation. Yet, the same period has seen a dramatic rise in hacking and ransomware attacks, especially from internationally malicious actors attempting to simultaneously disrupt and profit. Although a knee-jerk reaction has been the adoption of new-fangled technologies as the only way to prevent, detect, and mitigate attacks, this case study highlights how imperative it is for organizations to proactively review and re-engineer their process inefficiencies and human errors as a systematic counter-strategy. Using fictitious characters reflecting real-world hacking processes and outfits, this case projects the need for a new cybersecurity order, where cybersecure process reengineering and human training deserve greater attention than simply investing in newer cybersecurity technologies.
期刊介绍:
The Journal of Information Technology Teaching Cases (JITTC) provides contemporary practical case materials for teaching topics in business and government about uses and effectiveness of technology, the organisation and management of information systems and the impacts and consequences of information technology. JITTC is designed to assist academics, scholars, and teachers in universities and other institutions of executive education, as well as instructors of organizational training courses. Case topics include but are not restricted to: alignment with the organization, innovative uses of technology, emerging technologies, the management of IT, including strategy, business models, change, infrastructure, organization, human resources, sourcing, system development and implementation, communications, technology developments, technology impacts and outcomes, technology futures, national policies and standards.