The document discusses a memo from a CIO to a CEO providing an update on information security and ethics at a gaming organization called Vampire Legends. It analyzes the organization's information security components and budget allocation strategies, discusses a phishing scam security breach, and examines the role of ethics in addressing the breach and impact on revenue. The CIO recommends strategy B for budget allocation, transparency about the security breach, and long-term measures to improve security and prevent future breaches.
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
1. CMGTCB/582 - Security and Ethics - Compt-1 Assessment 2
Information Security Memo
To: CEO Vampire Legends Organization
From: The acting CIO
Date: 21st April 2022
Subject: Information Security and Ethics
Role of the Memo
The memo provides a specific update of the critical analysis of
information security and its
components in the Vampire Legends case. The same
memorandum also updates on the ethical role
of Vampire Legends under the simulation aspect and how
ethics stimulate the organization's
success.
Part 1
Components of Information Security
The breakdown of the Budget is as follows:
In Million Dollars ($)
2. Category of
Expenses
Strategy A Strategy B Strategy C
Marketing 6 3 4
IT 1 3 2
DRM 2 2 2
Salary 1 2 2
Bill Glassen
good job on the budget
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 3
Total 10 10 10
The components of security are essential factors in
ensuring the safety of data. The
categories are specific to each unique function. The
expense category has different parts. The
marketing campaign also interrelates with the Ancient Age of
the Vampires. The category of IT
expenses has a meaningful allocation to finance operations. The
Digital Rights Management and
3. Salary increases are the categories that focus on the
wellness of client and staff welfare,
respectively.
There are three allocation strategies. Strategy, A, B, and C. The
three strategies have a total
of 10 million dollars. Maximization of marketing is strategy A
($ 6 Million). The maximization is
at the expense of a low budget for IT expenses and
Salary Increases. The second strategy is
strategy B which maximizes the IT allocation ($ 3 million) with
the same distribution to marketing.
Digital Rights Management and Salary Increase also maintain a
constant $2 million each. The third
strategy is strategy C which maximizes the marketing allocation
and lies between strategies A and
B.
Choice of Suitable Strategy
The strategy of choice is strategy B. The strategy maximizes IT
at $3 million, which is part
of increasing security measures. The strategy allows the
use and purchase of sophisticated IT
equipment and addresses key security threats. It also distributes
the standard amount of the budget
4. to marketing ($3 million), which is essential to financing the
organization's marketing operations.
The other essential factor for choosing the strategy is the
need to reduce turnover rates in the
organization and simultaneously raise the salaries in the
organization. The other essence of
Bill Glassen
Nice job on the details of the reasoning
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 4
choosing strategy B is the dynamic and the technological world
and, therefore, the need to address
the upcoming issues (Federal Trade Commission - Annual
Highligts 2020, 2021). It also addresses
the ethical issues due to the ability to avoid salary cuts
down and altering the welfare of the
organization's employees.
Choice of the Best Advertising Campaign
The available campaign strategies are as follows:
1. Testimonial from Robert Pattinson (Vampire from the
Twilight Saga)
2. Leaking information to bloggers about which celebrities are
playing.
5. 3. Thirty-Day free trial.
The best option for the organization is the 3rd choice which is a
Thirty-Day free trial. The
option is the best as an incentive. It entails providing services
for thirty days and then afterward
billing and payment. It is part of increasing the sales in the
organization. The Thirty-Day free trial
also enables the customers to have the appropriate information
and terms of use and operations.
There is also a sense of security and assurance. The customers
can access the security protocols
and the other safety details. The hallmark of the best course of
action is to allow the customers to
make informed decisions regarding their choice of the products
without compromising on their
decisions.
The course of Action in Handling Information Security Threats.
The course of action addresses security issues like breeches,
hacking, mishaps, and others
that need to be addressed to safeguard the future.
Information security is essential for the
organization and the customer (Federal Trade Commission -
Annual Highligts 2020, 2021). The
6. following are the course of action in ensuring security for the
organization and the customer:
Bill Glassen
Good reasoning
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 5
negative impacts that would
harm the organization's business operations.
and reporting protocols. The
employees need to report any suspicious activity.
-crime is in place. The
training is key to increasing the
organizational confidentiality of the operations.
res and details like biometrics and personal
identifications and specific
passwords among the employees.
Part 2
Role of Ethics in Vampire Legends Simulation Conflict
The Phishing Scam is the conflict in the scenario. A phishing
7. scam is an email that looks
real and legit from a company, specifically a bank. The email
prompts the person to log in to the
personal account to prevent access restrictions. It requested
the login details of the individual
intending to obtain the data. The scam aims to hack the
information of the clients. It also affects the
company a great deal. The scam also targeted celebrities,
intending to blackmail them and leak
personal information to the public.
Consequences of the Conflict
The conflict affects the organization a great deal and
affects operations. Phishing also
exposes the clients to the vulnerability of theft. Jama is the
specific phishing that obtained the
security information. It is also possible for phishing to
blackmail celebrities in the gaming arena
and expose personal details to the public, thus breaching
privacy. The conflict also affects the
customer's trust in the level of the security of the organization.
Bill Glassen
The conflict was the discussion on how to handle the breach
from within the company and whether to be transparent
8. regarding the disclosure of customer information or to keep it
secret.
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 6
Solution
of the Conflict
t step was to notify the managerial members of the
breach in the security.
to the law requirements and
avoid unnecessary legal actions against the organization.
change credentials and login
details due to breach in the security
features and need to increase data security protection.
9. rather than hiding information. It
also promotes client and public satisfaction at large.
features and safety, specifically
encrypting information.
the phishing scam received
an extended free protection identity of 1 year.
The long-term measures include the following:
Improvement of the antivirus, use of
passwords in all the logins, spam and web filters installations to
prevent phishing data, update of
the systems to the latest versions of the security features,
encryption of sensitive information, and
education of the employees on data security specifically
phishing.
10. Impact of Ethics on Revenue
Ethics in the organization have a positive and negative impact
on revenue. Good ethics
maintains the commitment of the stakeholders and other
financial partners and also promotes the
customers' loyalty, therefore, ensuring a positive revenue path
(https://smallbusiness.chron.com,
2021). It is also part of the motivation to work for the
organization and achieve financial goals
promptly. Good identity from the ethical perspective also
ensures the satisfaction of all the
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 7
financial parties, therefore improving the revenue trend. Poor
ethical aspects in an organization
11. drive to the negative side and undesired consequences. The
organization is likely to collapse due to
the inability to combine and interrelate well personal and
professional ethics. Lack of morals in the
organization is the cause of revenue loss. It is the role of the
organizational management to identify
the factor affecting the organization's performance and address
them promptly.
References
(2021). Federal Trade Commission - Annual Highligts 2020.
https://www.ftc.gov/reports/annual-highlights-
2020/enforcement.
https://smallbusiness.chron.com. (2021, Feb 16). Retrieved from
www.chron.com:
https://smallbusiness.chron.com/institutionalize-ethics-
corporation-49898.html
12. Bill Glassen
You did a good job on the majority of the assignment. You
need to think through the ethics of the disclosure of the breach
or the possible decision to hide it from the customers.
2
Intervention Model
Alexis Heard
Columbus State University
Program in Design Kinesiology
March 21, 2022
Dr. G. Palevo
13. Health Intervention Model
Mental health is one of the imperative modifiers of
concentration and performance among college students. Hence,
the use of a health intervention model will be essential in my
study as it will provide a blueprint to understand and address
the issue of mental health among students. It will also guide the
formulation and implementation of selected interventions
(Hagger et al., 2020). Therefore, this study will utilize the
Health Belief Model. The model will be customized and tailored
to be in congruence with the study population and the health
behavior in context.
The Health Belief Model will be used in my study as it provides
a modality to promote health and mitigate disease-causing
behaviors among populations. In addition, this theoretical model
will be most appropriate in defining the key factors influential
to behaviors affecting mental health in this study population
(Hagger et al., 2020). The model will assist in delineating the
key factors that affect mental health; such the individual
perceived susceptibility to suffering from a mental health issue,
perceived severity, perceived barriers to initiating action,
exposure to support systems that promote health, and self-
14. confidence in the ability to deal with a mental health issue and
not relapse.
In conclusion, the health belief model will be used to design
short-term and long-term interventions to promote mental
health. This will entail assessing the students at risk,
understanding the different risky behaviors associated with
mental health, and providing channels to communicate with the
students on the mechanisms to promote mental health (Zaidlin
et al., 2020). This model can also be used in combination with
other models. In so doing, the researcher will ensure the depth
and breadth of the study gets achieved.
References
Hagger, M., Cameron, L., Hamilton, K., Hankonen, N., &
Lintunen, T. (2020). The handbook of behavior change (1st ed.).
Cambridge University Press.
https://books.google.co.ke/books?id=IfEFEAAAQBAJ&printsec
=frontcover&dq=health+belief+model&hl=en&sa=X&ved=2ahU
KEwiEvvT88eb2AhUzi_0HHVc0CSIQ6AF6BAgDEAI
Zaidlin, G., Lisnyj, K., Dougherty, B., Cook, N., &
Papadopoulos, A. (2020). Utilizing the Health Belief Model to
move post-secondary students toward flourishing mental
health. The Journal of Positive Psychology, 1-10.
https://www.tandfonline.com/doi/abs/10.1080/17439760.2020.1
858331?casa_token=UNVy2ByL5XcAAAAA:_G8sXjtFe2dV9P6
15. NzetgP_t-rde-
pNooKUEg45FCJS2ZeNKxeNf5UsH6vfr1buYB9ejB7Gcd7ojZE
StDrQ
Theoretical Framework
Alexis Heard
Columbus State University
Program in Design Kinesiology
March 01, 2022
Dr. G. Palevo
Theoretical Framework
The mental health program for college students focuses on
promoting social-emotional learning and endurance, and also
preventing collective, psychological, and behavioral challenges,
such as risk behaviors. As a result, the theoretical framework
depicts college mental health as a single major topic, depending
16. on available information on psychological health promotion and
management. Social, emotional, and behavioral difficulties are
avoided.
The framework is further described in the following sections of
the study by addressing the primary domains in connection to
psychological health consequences and the various
developmental mechanisms. I also include a set of critical goal
abilities and behaviors for both students and teachers, as well as
a summary of the primary theoretical components addressed.
Interpersonal, emotional, and behavioral challenges refer to a
wide range of behaviors that college students can acquire to
varying levels, which can be internalizing or externalizing.
Depression, criminality, social disengagement, self-harm,
anxiety, drug usage, rule-breaking, and violent behavior are
commonly targeted in school programs to reduce emotional,
behavioral, and social difficulties.
The Theory of Planned Behavior can be used to forecast a
person's willingness to participate in a given behavior at a
particular moment and location. The hypothesis was designed to
describe all behaviors over which humans can exercise self
restraints (Ajzen & Schmidt, 2020). Behavioral intention is a
significant element of this paradigm; motives are impacted by
one's view about the probability that the conduct will produce
the anticipated result, as well as one's subjective assessment of
the dangers and advantages of that result.
17. The Theory of Planned Behavior has been effectively utilized to
forecast and describe a variety of mental health-related
behaviors and motives amongst students, such as smoking,
alcoholism, health-care utilization (Lipson et al., 2019), and
substance abuse, among many other things. According to the
Theory of Planned Behavior, behavioral success is determined
by both motive and potential. The ability to undertake the
behavior successfully is contingent not just on a positive
purpose, but also on a suitable level of behavioral control.
The Theory of Planned Behavior proposes that measuring one's
mindset regarding the conduct, subjective standards connected
with the behavior, and apparent influence over completing it
might anticipate one's motives to execute it (McKenzie et al.,
2009)The TPB emphasizes the need of using a multifaceted
strategy to understand what influences a person's purpose to
undertake a behavior. If a participant's desire to pursue
psychological assistance is swayed primarily by subjective
values that are hostile to PHS, a study's effort to persuade this
individual's motive to obtain psychological assistance might be
disappointed if behavior modification is the only target of
treatment.
Interventions can be used on a broad level, involving every
student, or at a more focused rate, with students who are at risk
of establishing or have already manifested, modest mental
health issues. Preventive measures that are available to
18. everyone are thought to be less alienating. Moreover, both
general and focused preventative programs exhibit equal impact
values, demonstrating that both general and specialized
preventive interventions are needed. Systematic studies of
general interventions in college students, specifically, found
that internalizing psychological health disorders like anxiety,
stress, and depression indicators were significantly reduced
(Lattie et al., 2019). Research on the efficacy of preventative
strategies for externalizing disorders has a lot in common.
Considerable reductions in specified behavioral difficulties
were found, with impacts extending for one year.
The students who took participated in a short cognitive
education session experienced significant reductions in anxiety
and tension. In a group of students who performed yoga, levels
of stress levels are less, and general mental well -being is
higher, as contrasted to a regulated group.
The goals of this study were to look at the psychological health
of college students to contribute to a better comprehension of
the term and to give a thorough theoretical framework for
psychological health management at colleges that consider
students' needs into account.
References
Ajzen, I., & Schmidt, P. (2020). Changing behavior using the
theory of planned behavior. The handbook of behavior change,
19. 17-31.
Lattie, E. G., Adkins, E. C., Winquist, N., Stiles-Shields, C.,
Wafford, Q. E., & Graham, A. K. (2019). Digital mental health
interventions for depression, anxiety, and enhancement of
psychological well-being among college students: systematic
review. Journal of medical Internet research, 21(7), e12869.
Lipson, S. K., Lattie, E. G., & Eisenberg, D. (2019). Increased
rates of mental health service utilization by US college
students: 10-year population-level trends (2007–2017).
Psychiatric services, 70(1), 60-63.
McKenzie, J. F., Neiger, B. L., & Thackeray, R. (2009).
Planning, implementing, and evaluating health promotion
programs: A primer (p. 496). San Francisco, CA:
Pearson/Benjamin Cummings.
6
Mental Health in college students
20. Alexis Heard
Columbus State University
SP 22’ Program Design in Kinesiology
Dr. G. Palevo
February 17, 2022
Mental Health in College Students
Health status
Mental health issues encompass factors that affect cognitive,
emotional, and behavioral well-being. Any deviation of mental
health status from normal may lead to any of the following
mental disorders, schizophrenia, anxiety, depression, and
physical symptoms like fatigue, insomnia, back pain, and
headaches. Mental health problems have statistically proven to
be highly prevalent among college students. For example, in a
survey involving Australian students, higher levels of
psychological distress were noted. In another state-wise survey
by the American Psychological Association (APA), 95% of
college counseling centers directors reported alarming and
growing concerns over growing numbers of mental health issues
among college students (Auerbach et al., 2016). Anxiety is the
topping concern with a prevalence rate of 41.6%, followed by
depression at 36. 5%, other mental distresses concerns
relationships and accounts for 35.8%. These prevalence’s can be
attributed to a busy college schedule, financial issues, and lack
21. of balance between having fun and studying.
College lends itself a host to many new things: independence,
freedom, opportunity, and autonomy. The transition from high
school to college also takes a hefty toll on contributing to
deleterious health consequences to college students (Bruffaerts
et al., 2018). For instance, lack of engagement can be a sign of
depression, excessive worrying, increased dependence on a
substance such as excessive drinking to numb emotions, or a
changing relationship with food. In such cases, one no longer
pays attention to eating patterns and tends to avoid socializing
when there is food or exercise excessively. According to Lee et
al. (2022). mental health problems can affect students'
concentration, energy, mental ability, dependability, optimism
and hinder performance. Depression, for example, is associated
with low-grade point averages, truancy, and dropouts. In the
end, roommates, peers, staff, family members may end up
suffering consequences of poor relationships, poor work
productivity, and profound grief from suicides.
Community description
The program's scope is on college students across the state and
beyond. Global estimates of mental health problems suggest that
one in four people globally have experienced or will experience
mental health issues in their lifetime (Pedrelli et al., 2015). It is
22. the third leading cause of mortalities among young people.
Therefore, the program aims to assess the health needs of all
reachable college students locally, state-wise, and even
nationally.
Needs Assessment
Based on qualitative needs assessments done through focus
groups, projects, scenarios, case study reports, introspection,
visual texts, role-play simulation, and direct observations,
major health needs of the students were identified. The majorly
identified health needs include helping erase suicidal feelings
and thoughts, eating disorders, overactivity and poor
concentration, obsessive-compulsive disorder, low mood, and
depression.
Naturally, a human's body and mind are not separate; it is
therefore not surprising that mental health problems impact the
body. For example, depression can cause fatigue, headaches,
and digestive problems. The overall effects on the quality of life
range from a feeling of distress, lack of control, choice, and
autonomy, low confidence, diminished activity, and feeling of
hopelessness and demoralization (Sazakli et al.,2021).
Major identified causes of mental health problems among
college students include pressure to succeed in academics,
uncertainty, financial distress, and increased social media use.
Non-specific combat strategies needed in the schools includes
a) Promotion of healthy eating habits
23. b) Encouraging physical activity
c) Promotion of healthy sleeping habits
d) Social Media use sensitization campaigns to minimize
excessive social media use, inactivity, and visiting unauthorized
sites.
Quantitative assessments focus on numbers or quantities and
gather the information that yields results that can be quantified.
A report by Karyotak et al. (2020) showed that one-third of
students screened positive for at least a single in six mental
health illnesses. With a prevalence of 27% exhibited over 12
months, the study demonstrated a possible lifetime prevalence
of 28.7%. This calls for an array of measures, including the
following.
a) Once a month mental health seminar in college institutions in
California.
b) Employment of an adequate number of psychiatric mental
health practitioners across institutions to balance student:
psychiatrist ratio.
c) Install at least two support group meetings for students to
guide each other towards shared goal recovery.
d) Complementary and Alternative Medicine (CAM) - CAM
includes treatment practices typically not associated with
standard care.
e) Self-help plans- self-help plans are severely lacking among
24. college studies in the United States. They may, however, have a
hand in helping students implement strategies to promote
wellness recovery and identify warning signs.
Community link
The United States government currently offers various programs
and services to support people with mental health needs,
including students. They include income support, disability
services, community support, workforce participation programs,
and housing.
In hospitals, the current most common way of treating mental
health illnesses and challenges includes psychotherapy, also
called talk therapy and counseling (Auerbach et al., 2016).
The proposed program will come in a batch of complementary
programs to support existing programs in boosting mental health
issues among college students. Salient things the program will
include:
1) Enhancing counseling and psychotherapy through maximum
stakeholder engagement and online campaigns
2) Technology use in mental health programming-technology is
likely to address problems of minimal healthcare-seeking
behavior among college students. Through technology-based
diagnosis, and well-coordinated psychotherapeutic and
pharmacotherapeutics approaches, confidentiality will be
25. enhanced, fewer financial expenses will be incurred, and
accessibility will be enhanced since services will happen
through simple web-search.
3) Community support and awareness campaigns will also help
promote awareness, reduce discrimination and stigma,
supporting social inclusion and recovery while preventing
mental disorders.
References
Auerbach, R. P., Alonso, J., Axinn, W. G., Cuijpers, P., Ebert,
D. D., Green, J. G., ... & Bruffaerts, R. (2016). Mental disorders
among college students in the World Health Organization world
mental health surveys. Psychological medicine, 46(14), 2955-
2970.
Bruffaerts, R., Mortier, P., Kiekens, G., Auerbach, R. P.,
Cuijpers, P., Demyttenaere, K., &
Kessler, R. C. (2018). Mental health problems in first-year
college students: Prevalence and academic functioning. Journal
of affective disorders, 225, 97-103
Lee, S., Lim, J., Lee, S., Heo, Y., & Jung, D. (2022). Group-
tailored feedback on online mental health screening for
university students: using cluster analysis. BMC Primary
Care, 23(1), 1-14.
Pedrelli, P., Nyer, M., Yeung, A., Zulauf, C., & Wilens, T.
(2015). College students: mental health problems and treatment
47. Start of
Implementation
Process
Impact
Outcome
Formative
Summative
Planning
End of
Implementation
Purpose of Evaluation
To determine achievement of objectives related to improved
health status
To improve program implementation
To provide accountability to funders, the community, and other
stakeholders
To increase community support for initiatives
To contribute to the scientific base for community public health
interventions
56. The icons of E-Mail, Voicemail, and Documents are
highlighted, indicating there are new mails, messages, and
documents.
Email:
Once the learner clicks on the email icon a screen containing
the following information appears: From, Subject, Received. To
the left, is the Mail Folders which has Inbox, Draft, Sent, and
Trash listed one below the other. The inbox option is
highlighted.
There are three new mails.
The first mail is from Shelby, CEO Digital Artists, with the
subject ‘Strategy Session’. The mail is addressed to Dale, Jama
and the Learner. He updates on the replacement of the learner
instead of Jama whose down with flu. He instructs the members
to take the poll which, can be found in the Docs folder to see
which kind of campaign they will prefer. Information on the
budget and the success of their previous game is also given.
He mentions that the team will be invited to the web meeting
through IM once the poll is completed.
The second mail is from Stella, VP Finance, with the subject
‘Cost Estimates’, addressing the Learner and Jama. She briefs
on the budget and the expense estimates.
The third mail is from Dale, VP Marketing, with the subject
‘Marketing’ briefing on the budget for the marketing campaign
and emphasizing the importance of the campaign.
57. When clicked on the close button the learner is taken to the
Home screen.
Voicemail:
The voice mail is from Jama, plays when clicked on the play
button. A picture of Jama is at the left corner of the screen. He
advises the learner about the implementation of information
security- the need of a better firewall. Also, information on
login credentials for the D&L bank which can be found in the
Documents folder, is given.
Documents:
There are four new documents in the Documents folder.
The first document titled ‘Digital Artists Organizational Chart’
contains a chart with the hierarchy of the members in the
organization.
The second document titled ‘Risk Matrix (from Jama)’ contains
a table showing a draft of the various risks and their impact.
The third document titled ‘Budget and Advertising Campaign
Poll’ contains two polls, one for identifying the best allocation
strategy and the other to identify the best campaign approach.
There are three options in each of the question. Only when, both
the options are chosen, the submit button appears. When the
learner clicks on the submit button it goes back to the
documents folder.
The fourth document titled ‘Confidential Login Information
(from Jama) contains the login ID: and password for the user.
58. There is a print button and close button when the document is
open, in all the documents.
Instant Message:
Shelby invites the team members to the meeting as most of them
are not in agreement with options in the poll.
Web Meeting:
The web meeting window shows the video of Shelby,
participating in the meeting to the left of the screen. The names
of the members present in the meeting is listed below the video.
The main screen shows the result of the poll for the questions.
The team discuss based on the results, to come to a conclusion.
A celebrity testimonial is chosen for the marketing campaign.
2 months later:
The following words appear on screen ‘2 Months Later’ in big
block letters.Interaction 2
Email:
There are four new mails.
The first mail is from Shelby, with the subject
‘Congratulations!’ he congratulates the team on the high-
demand of the new game Ancient ages and how the IT has
handled the traffic wonderfully. He commends Dale’s efforts in
the marketing campaign. He further congratulates the learner on
being promoted as the CIO. He also brings into notice Jama’s
concerns on Information privacy which will be investigated in a
few months’ time.
59. The second mail is from the D&L bank with the subject ‘Your
D&L Bank Account’. The mail is to confirm the identity of the
user and remove their account limitation. It contains a link that
reads ‘Click Here’, when clicked on goes to the login page of
D&L Bank. There are two text boxes: one for the login and the
other for the password.
The learner has to go back to the documents folder, to get the
login credentials that Jama had sent earlier. When the login
credentials are typed in, the submit button appears. On clicking
the submit button, the message ‘Thank you for confirming your
login information. We appreciate your business.’ appears at the
bottom of the screen. The learner closes the screen by clicking
on the close button at the top right corner of the screen which
goes back to the mail.
The third mail is from Stella with the subject ‘Message from
Customer’. It contains a mail from Devon Turnbull, governor’s
son that has a snippet of what was posted on Gamer’s blog
about him. Mr. Devon sounds enraged by how his information is
leaked on the internet. He questions the ethics of the company.
He also mentions that he’ll be contacting his attorneys.
The fourth mail is a reply from Shelby to Stella’s mail
questioning, how the security breach happened.
Voicemail:
There is one new voice message from Lonnie demanding the
learner to come to the meeting, because of the serious mail from
60. Stella.
Instant message:
Shelby questions the learner and Lonnie asking what’s
happening. Lonnie responds saying, someone has broken into
the system to steal the information of about a million of the
customers. He also mentions that the details will be put up in
the documents folder. The team discuss further, to discover that
the details of the customers haven’t been encrypted. Stella
volunteers to layout the issues in the Docs folder. Shelby
suggests everyone to review the issues and then meet.
Documents:
There are two new documents added to the documents folder.
One titled ‘Summary of the attack (from the learner and
Lonnie), contains the details of the security attack and the effort
in finding the offender. As of now, the person with the twitter
handle ’DragonFly’ is presumed to be the main suspect.
The other document titled ‘To Crisis Management Team: Break-
In Issues (from Stella)’ contains ten statements with ‘Agree’
and ‘Disagree’ option to each of the statement. The learner has
to choose either if he/she agrees or disagrees to the given ten
statements. Once the options for all the ten statements are
chosen, a ‘Submit’ button appears. Clicking on it takes the
learner back to the documents folder.
There is a print button and close button when the document is
open, in both documents.
61. Interaction 3:
Instant Message:
Once the poll in the documents folder is completed, Shelby
invites everyone for a web meeting through Instant message.
Web Meeting:
The results of the poll is displayed in the middle of the screen.
While the video of Shelby speaking appears on the left and the
names of the members participating in the web meeting is listed
below.
During the meeting, going-forward the action that has to be
taken, and its consequences is discussed.
Shelby decides to come clean with the customers and the board
members, by revealing what has happened to their personal
information, although Dale and Vontae think otherwise. Shelby
decides to take the games down until the encryption project is
completed. They also decide to have a press release on what has
happened to inform the public. Thus, the meeting comes to an
end.
1 months later:
The following words appear on screen ‘1 Month Later’ in big
block letters.
Interaction 4:
The following tools are displayed on a laptop screen: E-mail,
Voicemail, Documents, Web Meeting, and Video Phone.
The E-mail icon is highlighted indicating, there are new mails.
62. There are two new mails. One from Shelby with the subject
‘Good News’ and the other from Stella-her reply to Shelby’s
mail.
In Shelby’s mail, he breaks the news about the person who’s
behind the security breach. Turns out that Dale is the one who
broke in and downloaded the records. He is also the one who
made the post on the Governor’s son on the Gamer’s blog.
Currently he’s been put on administrative leave, until the whole
situation is sorted out and Vontae has taken over as the Acting
VP.
The mail from Shelby has more good news. She informs the
team that since the games were back up with better security
within a week, not many customers have been lost. The strategy
to take full responsibility of the situation and make amends to
the players has earned a lot of praise. The customers are
pouring in, this in turn has increased the revenue.
When clicked on the close button the learner is taken to the
Home Screen.
End of simulation exercise
(
Feedback
on
64. in the Multiplayer Online Game Business
)
Name:
1. Budget Allocation Poll
Points: 5 out of 5
Select the allocation strategy you prefer and click submit.
Allocations, in millions
Expense Category
Strategy A
Strategy B
Strategy C
1. Marketing Campaign, Ancient Age of Vampires
$6
$3
$4
65. 2. IT Expenses
$1
$3
$2
3. Digital Rights Management (DRM)
$2
$2
$2
4. Salary Increases
$1
$2
$2
Total
$10
$10
$10
ABC
Choose an allocation strategy:
66. You chose Strategy B.
Strategy A maximizes funds spent on marketing at the expense
of IT and salaries. Strategy B maximizes funds spent or IT and
salaries, making it possible to implement improved security
measures, and also raise salaries to reduce turnover. Strategy C
is a compromise between those two approaches. Strategy B is
the best choice from the standpoint of security and ethics, and
earns the highest number of points for this simulation.
Companies have a responsibility to protect their customer's
data. Strategy A ignores the problems, and earns 0 points.
Strategy C earns partial credit.
2. Advertising Allocation Poll
Points: 5 out of 5
Select the advertising campaign approach you think is best:
1. Testimonial from Robert Pattinson (vampire from The
Twilight Saga)
2. Leaking information to bloggers about which celebrities are
playing
67. 3. 30 day free trial
You chose 3, which is an excellent choice. It was also a good
decision on your part to NOT choose #2, which would violate
your customers' privacy.
3. Phishing Scam
Points: 0 out of 5
The email that appeared to come from D&L Bank was a
simulated phishing scam. The link provided in such emails often
takes the victim to a fraudulent website that appears legitimate,
so that the criminals can obtain the victim's login credentials or
other personal information.
You entered the login information that Jama provided, thereby
giving away your account information to the criminals.
4. Break-In Issues
Points: 20 out of 20
Your point totals are shown below. Organizations must respond
68. quickly to a large data breach like this one, informing all the
affected people, the company's stakeholders, and the police.
Because information like this goes viral on social media, it is
not feasible to try to contain it. Instead, company executives
should take full responsibility for the breach, assure customers
that they have taken measures to protect the data going forward,
and that they will do what is needed to make amends.
Your Choice
Correct Choice
Points Earned
1. Inform customers that their data has been breached.
Agree
Agree
2
2. Inform the Board of Directors about the break-in.
Agree
Agree
2
3. Delay letting customers know until we know who hacked in.
69. Disagree
Disagree
2
4. Prompt customers to change their passwords.
Agree
Agree
2
5. Do not alert the police because it may be an inside job.
Disagree
Disagree
2
6. Issue a press release about the break in now.
Agree
Agree
2
7. Report break in to the police immediately.
Agree
Agree
2
8. Take the games down until the encryption project is done.
Agree
Agree
2
9. Offer affected customers 1 year free identity protection.
Agree
70. Agree
2
10. Don't do anything until we know who DragonFly is.
Disagree
Disagree
2
Total Points for Scored Choices
You received 30 out of 35 points, or 86%.
Discussion Questions
1. Describe the main ethical and security issues that the Digital
Artists executive team confronted.
(
Responsible decision-making, accountability
)
2. During the budget discussion, what arguments would you
have used to persuade the team that more funding is needed for
information security?
(
Responsible
73. games
down
until
the
encryption project is completed. Though it effect the incoming
revenue.
)
3. Why is it important for a company to inform their customers
when a data breach such as this occurs? What risks does the
company assume if the leadership decides not to disclose the
information?
(
Privacy
and
confidentiality
of
76. as
utilitarian
ethics.
)
4. If you were constructing a risk matrix for yourself as a
student, which would be your top three vulnerabilities and why?
(
It is important to inform the customers whenever the data
breach happens. When the Sony PS data breach happened
in
the
year
2011,
the
company
78. out as a costly mistake for Sony. If the leadership decides not to
disclose the information, it is not the right move as per
many
laws.
More
than
the
law,
the
organization
will
lose
the