Pod Slurping: A New Dilemma for Organizations|IT and Systems|Case Study|Case Studies

Managing Information Resources: Ensuring Data Security

            
 
Case Studies | Case Study in Business, Management, Operations, Strategies Case Studies

ICMR HOME | Case Studies Collection

Case Details:

Case Code : ITSY057
Case Length : 13 Pages
Period : 2002-2007
Pub Date : 2007
Teaching Note :Not Available
Organization : -
Industry : Miscellaneous
Countries : Global

To download Managing Information Resources: Ensuring Data Security case study (Case Code: ITSY057) click on the button below, and select the case from the list of available cases:

IT and Systems Case Studies | Case Study in Management, Operations, Strategies, Business Ethics, Case Studies

Price:
For delivery in electronic format: Rs. 300;
For delivery through courier (within India): Rs. 300 + Shipping & Handling Charges extra

» IT & Systems Case Studies Collection
» IT and Systems Short Case Studies
» View Detailed Pricing Info
» How To Order This Case
» Business Case Studies
» Case Studies by Area
» Case Studies by Industry
» Case Studies by Company

Custom Search


Please note:

This case study was compiled from published sources, and is intended to be used as a basis for class discussion. It is not intended to illustrate either effective or ineffective handling of a management situation. Nor is it a primary information source.



Chat with us

Strategic Management Formulation, Implementation, & Control, 12e

Please leave your feedback

Leave Your Feedback

ICMR India ICMR India ICMR India ICMR India RSS Feed

<< Previous

Is Your Employee Slurping Data? Contd...

Pod slurping was one of the new ways by which data could be stolen and used for various illegal means. From industrial espionage to corporate thefts and from identity thefts to hacking the data online, information security posed immense challenges even to the law enforcing agencies. For instance, identity theft was considered one of the fastest-growing crimes in the US, with over nine million victims in 2003 and 2004. In addition to malicious intent, employees engaged in pod slurping due to curiosity, or in their effort to be more productive by taking work home. Even under such circumstances, there was the added threat of some viruses or malware getting uploaded in the company’s network without their knowledge.

IT and Systems Case Studies | Case Study in Management, Operations, Strategies, IT and Systems, Case Studies

The companies, which mainly used perimeter solutions like anti-virus software and firewalls to protect their networks, found it increasingly difficult to deal with this new menace. Organizations were waking up to this new and dangerous threat to their data security. But addressing this threat posed significant challenges to them.

Data theft also posed a HR dilemma to the HR managers as it became difficult to prevent employees from bringing these portable devices in to the place of work. For instance, banning popular gadgets such as iPods could alienate the employees, while it was practically impossible to put a blanket ban on portable storage devices as they were useful. Experts felt that the issue had to be handled with kid gloves as too much monitoring or high-handedness on the organization’s part might hurt the morale of the employees, breed disloyalty, and lower productivity.

Though some experts dismissed the threat posed by pod slurping as mere hype, it did not stop many organizations from initiating steps to mitigate the potential risks. While some companies took drastic steps like banning electronic devices in the workplace, others opted for strong policies regarding the use of such devices in the organization. Still others tried out the various new IT solutions arriving in the market to address the threat posed by portable IT devices to data security. However, experts felt that problems such as these would only become compounded in the future with the further advancements in the portable devices and with these devices getting wireless capabilities. They expected a huge increase in the money spent by organizations in the future to ensure data security, particularly as safeguarding sensitive data had become a legal and ethical responsibility.

Advancement in technology brings with it convenience as well as new challenges. The challenges posed by the technologically advanced portable IT devices led organizations to the realization that they had to do a rethink on their data security system. They began to realize that physical security, too, was important for the safety of the data. Ignoring such threats was clearly not part of the solution, experts said.

 Excerpts >>






Marketing Financial Products
ICMR Textbooks Collection

Case Studies in Finance Volume-IV

Case Volumes Collection

Case Studies in Finance Vol III

Case Studies in Finance Vol III
e-Book on Case Studies in Finance

Case Study Volumes Collection

 

Case Studies Links:- Case Studies, Short Case Studies, Simplified Case Studies.

Other Case Studies:- Multimedia Case Studies, Cases in Other Languages.

Business Reports Link:- Business Reports.

Books:- Textbooks, Work Books, Case Study Volumes.