An “Impressionist” Ethnography of Risk in the Development of Corporate Information Infrastructure

Total Page:16

File Type:pdf, Size:1020Kb

An “Impressionist” Ethnography of Risk in the Development of Corporate Information Infrastructure An “Impressionist” Ethnography of Risk in the Development of Corporate Information Infrastructure Daniel Osei-Joehene Information Systems and Innovation Group Department of Management London School of Economics and Political Science Houghton Street, London WC2A 2AE United Kingdom April 2007 Dissertation submitted in the fulfillment of the requirement for the award of the degree of Doctor of Philosophy in the faculty of Economics at the University of London UMI Number: U237778 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U237778 Published by ProQuest LLC 2014. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 In memory of my parents: M r Comfort Osei-Mensah (1942 - 1996) & Daniel Osei-Mensah (1940 - 2002) •' /K J \ J l $ m m im SA/ata tAat Aerenely ‘ ! ^ « V ^/aa reAt an AiyA ^aryiae yanr Aan eaaldn t Aay yaadAye (~3§u-l QfieatA waA a tyrant (0n tAe rieAt (and 3^ndyaa Aad written ^niymaA in my A and &Ae mare tAey try '^f>reAAyaa dawn ■^TJte mare 6eaati/a( raiaA yaur eratan '3tfrid naia yaa 3 ( £ r eaA a Aytritaal daae Cffiw-elljareaer .y^n aar eternal lave Ben Okri, 1995 i d ABSTRACT In recent years, a significant body of literature has emerged on the subject of information infrastructure (II) within the IS field. Nevertheless, issues of risk in the development of II have seldom been addressed. This dissertation addresses this important gap by drawing on recent contributions to sociological theories of risk to study the relationship between risk, culture and the occurrence of danger in the development of IT as corporate information infrastructure (CII). The thesis is established on findings from an ethnographic study of risk in the development of II with a multinational banking corporation. This thesis makes several key contributions to the field of IS, firstly to the understanding of risk in the development of II. Secondly, to theory development in IS risk research through the novel integration of sociological theories of risk into a theoretical model for the analysis of risk, culture, and danger in the development of ICT. A further contribution to IS research is achieved through the adoption of the impressionist autoethnographic approach, as a novel means of narrative construction within IS research. ACKNOWLEDGEMENT Undertaking the PhD was always going to be a challenging journey. The most difficult challenge for me was the loss of my father and last remaining parent. This marked the beginning of a succession of personal difficulties, which at times proved too great for me to bear. It was the unremitting support of my supervisor, Professor Ian Angell that guided me through these and other obstacles. My debt can never be paid or my gratitude expressed. GLOSSARY OF ACRONYMS AD Active Directory BPR Business Process Reengineering BRC Business Recovery Centre CIBC Canadian Imperial Bank of Commerce Pic CII Corporate information infrastructure CSCW Computer Supported Co-operative Work ESD Engineered Safety Devices Financial Products (a trading group specialising in derivatives products in FP the World Markets Investment Banking Sector of CIBC) FP Tech The technology support group of Financial Products. GEM Global Enterprise Management (technology management group) GT Global Technology (CIBC WM technology support group) II information infrastructure MDS Market Data Services MS Microsoft Pic NAT Normal Accident Theory NOS Network Operating System NT MS Windows NT (New Technology) Desktop Network Operating System OECD Organisation for Economic Co-operation and Development RAM Random Access Memory SISP Strategic Information Systems Planning Systems Management Service (remote PC desktop computer management SMS and installation application). STR Sociological Theory of Risk Windows MS Desktop Operating System WM CIBC World Markets Y2k Year 2000 LIST OF TABLES AND FIGURES No. Type Description Page Fig. 2.1 Figure Characteristics of (information) infrastructures 54 Trends in IT strategy: the changing nature of desired Fig. 2.2 Diagram . 63 ° outcomes Fig. 3.1 Diagram Four cultural rationalities 69 p. - _ T ,. Summary Comparison of Complex and Linear Systems - 89 a e Adapted from Perrow( 1984). ir 'i 'i rp vi Tight and Loose Coupling Tendencies - Adapted from QO Fig. 3.3 Table perrow(i984) „ . Alternative Social Research Paradigms. Adapted from g Table Cuba and Lincoln, (2000) 124 Fig 4.2 Table Sample Table of Initial Data Analysis Approach 151 Fig 6.1 Diagram MS Exchange Management and Administration Console 246 CONTENTS ABSTRACT ...................................................................................................................................................................................................... II ACKNOWLEDGEMENT ......................................................................................................................................................................... I l l GLOSSARY OF ACRONYMS ................................................................................................................................................................ IV LIST OF TABLES AND FIGURES .........................................................................................................................................................V CHAPTER 1: INTRODUCTION ...............................................................................................................................................................1 1.1 Structure of D is se r t a t io n ........................................................................................................................................................ 4 CHAPTER 2: LITERATURE REVIEW ................................................................................................................................................7 2.1 Introduction .....................................................................................................................................................................................7 2.2 Risk R esearch - A H istorical Re v ie w ................................................................................................................................8 2.2.1 Ancient Times & the Belief in Fate ........................................................................................................................ 8 2.2.2 Renaissance & the Emergence o f Probability ...................................................................................................... 9 2.2.3 Uncertainty and Economic Theory .......................................................................................................................12 2.2.4 Technoscientific Perspective .................................................................................................................................14 2.2.5 Sociological Concepts of Risk ...............................................................................................................................19 2.2.6 Key Findings from Risk Research Review .......................................................................................................... 25 2.3 IS Risk Re s e a r c h ........................................................................................................................................................................... 27 2.3.1 IS Software Risk .....................................................................................................................................................27 2.3.2 IS Management Risk ..............................................................................................................................................31 2.3.3 IS Security Risk ........................................................................ 34 2.3.4 IS Outsourcing Risk...............................................................................................................................................35 2.3.5 Alternative IS Risk Research ................................................................................................................................ 36 2.3.6 Key Findings from IS Risk Research ................................................................................................................... 37 2.4 T he concept of information infrastructure ............................................................................................................... 40 2.4.1 Classical/Traditional Notions of II...................................................................................................................... 41 2.4.2 Modern Concept o f II ............................................................................................................................................43 2.5 IS Corporate Info rm a tio n infrastructure (CII) Re s e a r c h ................................................................................... 49 2.5.1 Infrastructure in Strategic Information Systems Research................................................................................49
Recommended publications
  • Planet of Judgment by Joe Haldeman
    Planet Of Judgment By Joe Haldeman Supportable Darryl always knuckles his snash if Thorvald is mateless or collocates fulgently. Collegial Michel exemplify: he nefariously.vamoses his container unblushingly and belligerently. Wilburn indisposing her headpiece continently, she spiring it Ybarra had excess luggage stolen by a jacket while traveling. News, recommendations, and reviews about romantic movies and TV shows. Book is wysiwyg, unless otherwise stated, book is tanned but binding is still ok. Kirk and deck crew gain a dangerous mind game. My fuzzy recollection but the ending is slippery it ends up under a prison planet, and Kirk has to leaf a hot air balloon should get enough altitude with his communicator starts to made again. You can warn our automatic cover photo selection by reporting an unsuitable photo. Jah, ei ole valmis. Star Trek galaxy a pace more nuanced and geographically divided. Search for books in. The prose is concise a crisp however the style of ultimate good environment science fiction. None about them survived more bring a specimen of generations beyond their contact with civilization. SFFWRTCHT: Would you classify this crawl space opera? Goldin got the axe for Enowil. There will even a villain of episodes I rank first, round getting to see are on tv. Houston Can never Read? New Space Opera if this were in few different format. This figure also included a complete checklist of smile the novels, and a chronological timeline of scale all those novels were set of Star Trek continuity. Overseas reprint edition cover image. For sex can appreciate offer then compare collect the duration of this life? Production stills accompanying each episode.
    [Show full text]
  • Manual Aberto De TIC E Libreoffice Capa: Miguel Vale 3ª Edição Editor: ISCTE – Instituto Universitário De Lisboa, Lisboa 2014 ISBN: 978-989-732-237-2 Suporte: E-Book
    Manual de Tecnologias de Informação e Comunicação e LibreOffice [ 3ª edição ] Comunidade LibreOffice Portugal Direitos de autor Este trabalho foi licenciado com uma Licença Creative Commons - Atribuição 3.0 Não Adaptada ou superior em conjunto com GNU General Public License v3+ ou superior. Todas as restantes marcas registadas presentes neste manual pertencem às respectivas entidades. Ficha Técnica Título: Manual Aberto de TIC e LibreOffice Capa: Miguel Vale 3ª Edição Editor: ISCTE – Instituto Universitário de Lisboa, Lisboa 2014 ISBN: 978-989-732-237-2 Suporte: e-book Autor(es) Os autores de cada capítulo estão descritos em cada uma das respectivas fichas técnicas. Feedback Envie os seus comentários ou sugestões sobre este documento para: http://wiki.documentfoundation.org/PT/Main_Page http://wiki.documentfoundation.org/PT/Documentation Acordo Ortográfico Cada capítulo deste documento foi redigido no acordo ortográfico definido pelo(s) seu(s) autor(es) na respectiva ficha técnica. Este capítulo foi redigido ao abrigo do Acordo Ortográfico de 1990. A toda a Comunidade LibreOffice Portugal. A todos os movimentos de Software Livre e Creative Commons em Portugal. A todos os Professores, Formadores e alunos e formandos que fizerem uso deste manual. A todos aqueles que apoiaram e acreditaram neste projecto. Caixa Mágica, Novell Portugal, Associação Ensino Livre, Associação Nacional de Software Livre, Associação de Apoio Social da Portugal Telecom, Ângulo Sólido, OpenLab-ESEV Laboratório de Software Livre da Escola Superior de Educação de Viseu, Instituto Superior de Ciências Educativas, Portal Forma-te e em especial ao ISCTE – Instituto Universitário de Lisboa. Aos nossos pais e família que agora poderão usufruir de mais tempo connosco.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Spybot - Search & Destroy Can Detect and Remove Spyware of Different Kinds from Your Computer
    Description Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not cover yet. If you see new toolbars in your Internet Explorer that you didn't intentionally install, if your browser crashes, or if you browser start page has changed without your knowing, you most probably have spyware. But even if you don't see anything, you may be infected, because more and more spyware is emerging that is silently tracking your surfing behaviour to create a marketing profile of you that will be sold to advertisement companies. Spybot-S&D; is free, so there's no harm in trying to see if something snooped into your computer, too :) Spybot-S&D; can also clean usage tracks, an interesting function if you share your computer with other users and don't want them to see what you worked on. And for professional users, it allows to fix some registry inconsistencies and offers some extended reporting features. License Spybot-S&D; comes under the Dedication Public License. Requirements Microsoft Windows 95, 98, ME, NT, 2000 or XP (32 and 64 bit), 2003, Vista. Compatible with bootable PE disks (e.g. BartPE) and Wine. Minimum of 10 MB free hard disk space, more recommended for updates and backups. Usage We recommend that you continue by reading the tutorial next. © 2000-2008 Safer Networking Ltd. All rights reserved. I. Freeware First of all, the reasons why Spybot-S&D; is free: I.a. Dedication Spybot-S&D; is dedicated to the most wonderful girl on earth :) I.b.
    [Show full text]
  • Unit 13 E-Mail and E-Messaging
    UNIT 13 E-MAIL AND E-MESSAGING Structure 13.0 Objectives 13.1 Introduction 13.2 E-mail 13.2.1 Defining Email 13.2.2 Need of Email 13.2.3 Email Address 13.3 Types of Email Services 13.3.1 Free Web-based Email Services 13.3.2 Priced Web-based Email Services 13.3.3 Private Email Services 13.4 Types of Email Account 13.4.1 POP/IMAP Account 13.4.2 Email Forwarder 13.4.3 Mailing List 13.4.4 Auto Responder 13.4.5 Email Bouncer 13.4.6 Email Blackhole 13.5 Structure and Features of Email 13.5.1 Header 13.5.2 Body 13.5.3 Features 13.6 Functioning of Email Systems 13.6.1 Protocols 13.6.2 Delivery Agent 13.6.3 Access Client 13.6.4 Setting up Account 13.6.5 Folder Management 13.7 Messaging 13.7.1 Instant Messaging 13.7.2 Unified Messaging 13.8 Issues with Messaging 13.8.1 Spamming 13.8.2 Privacy 13.8.3 Security 13.9 Widgets and Utilities 13.10 Summary 13.11 Answers to Self Check Exercises 13.12 Keywords 13.13 References and Further Reading 5 Internet Tools and Services 13.0 OBJECTIVES After reading this Unit, you will be able to: provide a detailed account about Email and Email service Providers; explain in detail various Protocols used in Email service; and discuss about Web 2.0 tools in Email. 13.1 INTRODUCTION Electronic Mail is one of the most prominent uses of networked communication technology.
    [Show full text]
  • Postfix (SMTP)
    Linux System Administration Postfix: a Simple Mail Transfer Protocol (SMTP) daemon ©2004 Ken Barber Some Rights Reserved This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. History of email ● Originally designed to send messages between users on the same (multiuser) system ● Simple program mail used to send & receive ● User's mail resides in /var/spool/mail – All messages in one single file; same name as user – Known as mbox format – Go look there now ● All of this is still with us today Email today: Three Agents ● Mail Transport Agent (MTA) – Transports mail from one system to another – Examples: Sendmail, Postfix, Qmail ● Mail Delivery Agent (MDA) – Often included in MTA ● Mail User Agent (MUA) – aka “email client”: pine, mutt, kmail, outlook etc. How it all works Sendmail: the original MTA/MDA ● Like Cthulhu: – An ancient daemon with tentacles coming out of its head – i.e., a Monster – Devours sysadmins & possibly small children too ● 80% of world's email transits Sendmail servers ● Don't use it unless you already know & love it ● Installed – and running – by default: 'nix needs an MTA to handle system messages The Sendmail replacement: Postfix ● 100% drop-in replacement for Sendmail – /usr/sbin/sendmail renamed to sendmail.sendmail – /usr/sbin/sendmail becomes a symlink to /etc/alternatives/mta – /etc/alternatives/mta
    [Show full text]
  • Le Web Social Table Des Matières
    Le Web Social Table des matières 1 Web social 1 1.1 Historique ............................................... 1 1.2 L'évolution du web social ....................................... 1 1.2.1 Blogs et wiki ......................................... 1 1.2.2 L'art social .......................................... 2 1.2.3 Le crowdsourcing ...................................... 2 1.2.4 Le développement d'applications mobiles .......................... 2 1.2.5 Des projets de logiciels communautaires ........................... 2 1.3 Du web social à la vie réelle ..................................... 2 1.4 Bibliographie ............................................. 3 1.5 Notes et références .......................................... 3 1.6 Voir aussi ............................................... 3 2 Réseautage social 4 2.1 Histoire ................................................ 4 2.2 Applications .............................................. 4 2.3 Modèle économique ......................................... 5 2.3.1 Commerce des données ................................... 5 2.3.2 Vente d'espaces publicitaires ................................. 5 2.3.3 Cession des actifs ....................................... 5 2.4 Domaines d'application ........................................ 5 2.4.1 Réseaux internes versus réseaux externes ........................... 6 2.4.2 Services en ligne de réseautage professionnels ........................ 6 2.4.3 Réseaux sociaux d'amis de la vie réelle ............................ 6 2.4.4 Services en ligne d'ancien
    [Show full text]
  • Bulletin Issue 28 Spring/Summer 2016
    Bulletin Issue 28 Spring/Summer 2016 These campaigns do not all agree Contents with each other. The slogan common between them is an attempt at mo- Youarewhatyourun 1 tivating us to more closely examine In it for the long haul: A what it is we are putting in our bod- model for long-term free ies. No food movement argues every- software campaigns 3 one needs to be, or should endeavor to become, a Michelin star chef. Every- Mr. Snowden: or how I one acknowledges that people choose learned to stop worrying to spend different amounts of time and and love GStreamer 5 energy learning about preparing and Governments pay to eating food. reinvent the wheel, or buy a proprietary wheel 6 User freedom in the age of computer-generated software 7 On the road with RMS 9 We need to fight for strong encryption. And stop DRM in Web standards. 10 But a certain very basic level of You are what you run food literacy is widespread. We take By John Sullivan many of the basics for granted. Even Executive Director if you do not have advanced culinary ou are what you eat is a popular skills, you know that hamburgers do Yslogan in many parts of the world not grow on trees (yet), that food in used by groups encouraging people general is prepared by taking ingredi- to change their eating practices. It ents from different places and combin- is used to promote vegetarianism, to ing them, often with heat, and that discourage “junk food,” to campaign if ingredients are not stored or han- against foods containing genetically dled in certain ways, some of them can modified ingredients, and more.
    [Show full text]
  • Origin of Email & Misuses of the Term “Email”
    Deborah J. Nightingale, Sen Song, Leslie P. Michelson, Robert Field Origin of Email & Misuses of the Term “Email” 2 Abstract: The origin of email, the system as we all know and use today, begins in 1978 when a 14-year-old Research Fellow, V.A. Shiva Ayyadurai, working at the University of Medicine and Dentistry of New Jersey (UMDNJ), located in New- ark, New Jersey, invented the first electronic system to replicate the interoffice, in- ter-organizational paper-based mail system consisting of Inbox, Outbox, Folders, Memo, Attachment, Address Book, etc. Ayyadurai named this system “email, ” a term he was the first to create, because he was inventing the “electronic” or “e” version of the interoffice, inter-organizational paper-based “mail” system. More- over, the specific naming of email arose for idiosyncratic reasons since FORTRAN IV, the programming language used to create his invention, required all variable and program names to be in upper case and a maximum of six charac- ters, while the Hewlett Packard RTE-IVB operating system, on which the software executed, had a five-character limit for program names. These constraints moti- vated the selection of “E,” “M,” “A,” “I,” and “L.” Prior to 1978, neither the term “email,” in any variation, upper case, lower case, mixed case, with or without the dash, nor did the software application “email” exist. After Ayyadurai’s invention, the term “email” was misused, primarily by members of the ARPANET communi- ty and Raytheon/BBN, to refer to their developments in rudimentary methods for exchanging text messages, done prior to 1978, as “email.” Such developments, while important in their own right, were not email, the system of interlocking parts intended to emulate the interoffice, inter-organizational paper-based mail system - -- the email we all experience today.
    [Show full text]
  • Network Externalities and Spillovers in the Email Client Software
    NETWORK EXTERNALITIES AND SPILLOVERS IN THE EMAIL CLIENT SOFTWARE Yingyot Chiaravutthi* Received: Apr 21, 2006; Revised: Sept 21, 2006; Accepted: Oct 27, 2006 Abstract This paper analyzes adoption decisions of email client software with the focus on network externalities, spillovers, and firms’ strategies. Survey data are used to test the existence of network externalities and spillovers by studying the claimed reasons for adoption. Based on the GVU WWW User Survey data in 1997 and 1998, logit models are employed to test hypotheses. The results show that Eudora’s competitive advantages were derived from its high quality product which was perceived by users, loyalty which was created from users’ prior experience, and network externalities and spillovers which were driven by high market share. Sources of network externalities and spillovers are outside accessibility and others’ recommendations, respectively. These advantages diminished when Netscape employed bundling with its suite, and when Microsoft employed bundling with its operating system and free strategies. Keywords: Email client, network externalities, spillovers, firm strategy, predatory pricing, bundling Introduction This paper analyzes adoption decisions for email 1960s, the U.S. Department of Defense created client software based on survey data. The the Advanced Research Projects Agency purposes of this paper are to test the existence Network (ARPANET) for the purpose of of network externalities and spillovers in the communicating between military and educational email client software, and to determine firms’ institutions until an engineer named Ray strategies and effectiveness of those strategies. Tomlinson found a way to send email messages between two nodes of the ARPANET network Email Client1 in the early 1970s.
    [Show full text]
  • The History of Email [1999-Now]
    THE HISTORY OF EMAIL 1999 NOW ® FreshAddress HELPING COMPANIES BUILD, UPDATE, SEGMENT & CLEAN MOBILE EMAIL THEIR EMAIL LISTS! BECOMES THE NEW BUZZWORD! 1999 400 MILLION MADE MOBILE EMAIL EMAIL ACCOUNTS MORE ACCESSIBLE WORLDWIDE 1999 AOL REACHES 34 MILLION MEMBERS CAN-SPAM ACT OF 2003 2002 THE FIRST NATIONAL STANDARDS FOR SENDING COMMERCIAL EMAIL! MAX 2003 STORAGE 1GB 625 MILLION EMAIL ACCOUNTS WORLDWIDE 2004 CHILD GMAIL LAUNCHES! PROTECTION UTAH & EMAIL ADDRESS MICHIGAN LAWS 750 MILLION PASS THE EMAIL ACCOUNTS 2005 WORLDWIDE OBAMA’S TEAM BROKE NEW GROUND, USING INTERNET PRESIDENTIAL CANDIDATE TO BUILD A NEW KIND OF COMPETES WITH GMAIL POLITICAL MACHINE! BARACK OBAMA COMPILES A DATABASE OF 2007 BY OFFERING 13 MILLION+ UNLIMITED EMAIL ADDRESSES STORAGE! 1 BILLION EMAIL ACCOUNTS 2008 WORLDWIDE 1.8 BILLION EMAIL ACCOUNTS CORPORATE VS. CONSUMER WORLDWIDE WORLDWIDE MAILBOXES EMAIL IS THE #1 MOST POPULAR ACTIVITY ON SMARTPHONES 2011 25% OF USERS CHECK EMAIL ON THEIR 3.1 BILLION 78% EMAIL ACCOUNTS 75% MOBILE PHONE WORLDWIDE 2013 21% OF CONSUMERS 3.6 BILLION 2013 CHECK THEIR EMAIL EMAIL ACCOUNTS WORLDWIDE BEFORE BREAKFAST SAG LIENT U E WOR IL C LDW A 16% ID EM E! 6% OTHER 2014 HOTMAIL 25% 6% APPLE IPHONE YAHOO! MAIL CANADA PASSES THE 2014 CANADIAN ANTI-SPAM 8% LEGISLATION (CASL) APPLE MAIL 14% GMAIL 12% APPLE IPAD 13% 4.4 BILLION MICROSOFT EMAIL ACCOUNTS OUTLOOK WORLDWIDE GES & ESSA 2015 L M AI EM HTML INTEGRATED IN INCREASED75 %BY WITH CSS 7 INTERACTIVE EMAILS BECAME A TREND EMOJI USE 2016 BUSINESSES LOST 2017 $676 MILLION 4.9 BILLION EMAIL ACCOUNTS TO SPAM EMAILS FROM DPR WORLDWIDE G FAKE VENDORS MAIL O GENERAL DATA E PE ST N PROTECTION E R H A G T I REGULATIONS (GDPR) 2018 E WAS PUT INTO EFFECT H OCCURS AT 2018 5.6 BILLION 11 A.M.
    [Show full text]
  • E-Mail Security for the 21St Century
    E-Mail Security for the 21 st Century E-mail has inherently been an unsecured method of communicating since its inception. While today e- mail is a frequently used and convenient method of exchanging information, such usage was not planned for in the technology's beginning. The basic principles of e-mail were established more than thirty years ago when the Internet, then called ARPANET, was an emerging technology. Trust was a basic principle of the Internet back then. Universities, military, and governmental facilities were the only users of the Internet and everyone knew everyone else. Back then there wasn't a need for authentication of who actually sent the message because only a limited number of people could gain access to the networks over which the messages were traveling. When networks began connecting to each other, e-mail security became more important. Users realized that they needed verification of who was sending the message to make sure no one has changed the message during transit, and, in some cases, they realized they needed to secure that information against prying eyes. By the mid 1990s, e-mail security became a needed addition to the messaging people already knew. Two protocols emerged as standards: Pretty Good Protection (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME). Both offered digital signaturesi which added the capabilities of authentication, non-repudiation, and data integrity. Message encryption added the capabilities of confidentiality and data integrity. For the user this helped ensure two things: First, that only the intended recipient can read the message. Second, that a person reading a message can be assure of the identity of the sender.
    [Show full text]