Journal of Business Management & Change Summer 2020

Total Page:16

File Type:pdf, Size:1020Kb

Journal of Business Management & Change Summer 2020 JBMC Journal of Business Management & Change Summer 2020 A Publication of the WBM Conference Series Edited by Emin Ozkan, Ph.D JBMC The Journal of Business Management and Change is a publication of the WBM Conference series focusing on leading- edge research on the Business and Management Disciplines http://www.wbmconference.net Journal of Business Management & Change Summer 2020 Library of Congress ISSN: 1967-6839 Cover Photo: San Francisco in Abstract J B M C I N D E X / S P R I N G 2 0 2 0 Papers Pages Cocoa’s Bittersweet Supply Chain 3 - 15 Lisa M Spencer, Ph.D. Financial Performance of Socially Responsible Companies 16 – 29 Tzu-Man Huang, Ph.D; David Zhu, Ph.D; & Sijing Zong, Ph.D Determining if there is a Relationship between How Much Time a Faculty 30 – 40 Member Spends Assessing Student Assignments and Final Grades at a Rural University: A One Year Analysis Gary F. Keller, Ph.D & Allen Klingenberg, Ph.D Cybersecurity, Ethics, best Practices, & Risk Management in Small Businesses 41 – 63 and New Ventures: A Research Review, Organization & Management Sumeet Jhamb, Ph.D & Agnes Tobey Cocoa’s Bittersweet Supply Chain Lisa M. Spencer Craig School of Business California State University, Fresno Abstract Despite well-intentioned programs and sizeable investments by major players in the global chocolate industry, the West African cocoa supply chain is still plagued by child labor, deforestation, poorly executed certification programs, and difficulties tracing cocoa beans back to the farms from which they came. A variety of solutions are touted to offer hope in addressing these endemic problems. Digital payment systems are among the most promising, providing benefits to farmers and increasing traceability within the supply chain. Keywords: Cocoa, West Africa, chocolate industry, supply chain management, sustainability, child labor, ethics, digital transactions, traceability INTRODUCTION Once asked how important cocoa is to those living in Ivory Coast, government representative N’Zi Kanga Remi replied, “It doesn’t make sense to ask an Ivorian what cocoa means to him! It means everything! It’s his first source of income! My education was funded by cocoa! Our houses are built with cocoa! The foundations of our roads, our schools, our hospitals is cocoa! Our government runs on cocoa! All our policy focuses on sustaining cocoa!” (Whoriskey & Siegel, 2019) Two decades ago leaders in the chocolate industry, representing companies like Nestle, Mars, and Hershey, vowed to improve their cocoa supply chains in West Africa, where most of the world’s cocoa originates. At the top of the list was the lofty but admirable goal of eliminating child labor so the roughly two million children working on cocoa farms could instead be in school. Other more recent objectives included halting deforestation, teaching farmers better growing practices, and improving life in cocoa communities. Despite great effort, much of the chocolate eaten by consumers in the developed world still starts in the hands of child laborers. Large expenditures by chocolate companies did not rid supply chains of underage workers, and evidence suggests that in some areas the problem has grown even worse. Chocolate companies still struggle to trace their supply chains back to the individual farms that produced the beans they purchase. Without traceability, it is hard to know if child labor was used or not. Even when the beans are traceable, certifying that beans are free from child labor is problematic for other reasons. Extreme poverty in cocoa producing nations generates endemic challenges that are not easily overcome. (Whoriskey & Siegel, 2019) The crux of the problem is that too many West Africans depend on cocoa for their livelihood, and too few global consumers are willing to pay more for their chocolate. COCOA INDUSTRY OVERVIEW The global chocolate industry generates sales of over $107 billion a year with strong growth forecast for the next five years. Major players include Nestle, Mars, Hershey, Mondelez, and Godiva, as well as numerous niche companies. All of these chocolate companies rely on a steady supply of cocoa grown mainly in developing countries. (Odijie, 2019) About sixty percent of the world’s cocoa comes from West Africa, home to about two million cocoa farms, with most grown in Ivory Coast and Ghana. Ivory Coast holds the biggest share at 30 percent, and cocoa is its number one export. Cocoa is Ghana’s third largest export, following gold and crude oil. Significant amounts of cocoa also come from Ecuador, Cameroon, Nigeria, Indonesia, Brazil, Mexico, and Peru. (Wexler, 2019) Worldwide, about 4.85 million tons of cocoa was processed for the 2018-2019 growing season which ended in September, making it the largest crop on record since 1960. Cocoa’s performance in commodity markets has been strong, and the 2019-2020 harvest looks promising as sufficient rain in West Africa erased worries of a dry season. (Wallace, 2019) Price per metric ton varied in recent years from $1,800 in 2017 to over $3,250 in the 2015-2016 season. At the beginning of 2020, it stood at $2,500 per metric ton. (Wexler, 2019) COCOA SUPPLY CHAIN In West Africa, about two million farmers and their families grow cocoa trees in fields and dry the beans after harvest. October marks the beginning of the main harvest season. Yellow cocoa pods are cut from the trees and split open with machetes, and the pulpy beans are removed. They are laid out on chicken wire or reed trays to dry, becoming darker as they ferment. Once dry, they are measured into jute sacks and travel to cocoa processing facilities in the United States and Europe. (Ryan, 2019) Individual farmers sell cocoa beans in 140 pound sacks to local middlemen who aggregate beans from surrounding communities. The price paid to farmers is set by the government. Middlemen then sell the beans to the government which makes them available to cocoa processors. Processors convert the beans into cocoa powder or cocoa butter for use in many food products. Chocolate companies like Hershey and Mars then buy the cocoa products for use in their candies. (Wexler, 2019) LIFE OF WEST AFRICAN COCOA FARMERS Poverty is a root problem of many of the day-to-day struggles of West African farmers, and for a variety of reasons, some are worse off now than in the 1970’s and 1980’s. Endemic issues cause stubborn problems in the supply chain that are difficult for chocolate companies to solve even when large amounts of money are spent. (Odijie, 2019) Sources such as World Bank and Fairtrade, a cocoa certification entity, report the small West African farmer’s cocoa income at $1,900 to $2,000 a year. Describing it another way, a World Bank report found that 80 percent of cocoa farmers in West Africa live on less than $3/day. (Wexler, 2019) Another report suggests that a typical farmer earns about $0.78 per day from cocoa farming, about enough to purchase one Kit Kat bar. (Adams, 2019) More income may come from other sources, such as farming other types of crops or perhaps from earning slightly more from the cocoa itself. (Ryan, 2019) While cocoa prices move up and down in world markets, daily living expenses for farmers seem to only increase, as does the cost of running their farms. Chemicals, equipment, and labor make up the biggest expenses. (Wexler, 2019) Most West African farms are small, ranging between five to 12 acres, and lack modern farm equipment and practices. Some farmers are sharecroppers, keeping about a third of the crop’s value and turning the rest over to landlords. (Ryan, 2019) In rural areas, many residents lack electricity, and some villages do not have a water pump or safe sanitation practices. (Adams, 2019) UNESCO cites the Ivorian literacy rate around 44 percent. Living in such extreme poverty makes it hard for parents to pay school fees for their children. Instead it often requires the work of the whole family to grow the cocoa. (Whoriskey & Siegle, 2019) PROBLEMS AND SUSTAINABILITY ISSUES There are two main issues that sustainability programs initiated by chocolate companies, West African governments, and private organizations are working to address: deforestation and the use of child labor. In addition, programs often seek to help farmers learn better farming techniques and to raise the quality of life in cocoa communities. Deforestation Tropical forestland is required to grow cocoa, but farmers are no longer allowed to expand into new areas. In the past, new farmland was carved out of the forests using a slash and burn approach. When existing farmland grew infertile, new forested areas were cut down, burned, and planted with cocoa. New farmland was richer and less troubled by disease or pests; thus, it yielded more cocoa at a lower cost. Whereas there were nearly 40 million acres of forest in Ivory Coast in 1960, by 2005 there were fewer than five million. (Odijie, 2019) One problem is that in Ivory Coast, for instance, as much as 500,000 tons of cocoa, equating to 18.5% of the country’s total production, is farmed illegally in protected forest areas. (George, 2020) For farmers who opt to produce legally, by contrast, no new land is available, so they have to rework their existing plots of land. Rework requires more labor, fertilizers, and pesticides, and if therefore much more expensive than moving to new areas. In fact, it costs about twice as much now to replant as in the past, and the process can take up to three times as long. Unfortunately, farmers cannot pass their increased costs along to the middlemen who buy their beans, since the beans are sold at a fixed price.
Recommended publications
  • How to Use Hacker Persona's to Successfully Build Devsecops
    How to use hacker persona’s to successfully build DevSecOps Pipeline • Robin Yeman • Lockheed Martin Sr. Fellow • Lockheed Martin • twitter @robinyeman Agenda • DevOps and Pipeline • Securing the pipeline • Apply the practices 2 DevOps and delivery pipeline DevOps DevOps is “a cross-disciplinary community of practice dedicated to the study of building, evolving and operating rapidly-changing resilient systems at scale.” - Jez Humble Why DevOps Forsgren, Nicole. “DevOps Solutions | Google Cloud.” Google, Google, 22 Aug. 2019, https://cloud.google.com/devops/state-of- devops/. DevOps Pipeline Requirements / Design Version Control Build Tool(s) Continuous Integration Test Framework(s) API Library End to End Security Commit & Build Validate Deploy D Application Code & Build Application a s Integration Acceptance Production h Version Control Test Test Deploy b Environment o Commit & Build Validate Deploy Infrastructure Automation Package Infrastructure a Development Integrated r d API Library Configuration Environments Monitoring Artifact Repository Product Backlog Management Schedule Securing the delivery pipeline Threat Modeling • Identify Assets • Using IDDIL-ATC Methodology • Define the Attack Surface – Gain understanding • Decompose the System – Assess risk • Identify Attack Vectors – Justify security controls • List Threat Actors • Analysis & Assessment • Triage • Controls DevOps Pipeline Threat Model Attack Surfaces in the pipeline Requirements / Design Version Control Build Tool(s) Continuous Integration Test Framework(s) API Library
    [Show full text]
  • Information Provided by DHS Regarding Russian Scanning Was Incorrect Date: Wednesday, September 27, 2017 12:49:59 PM
    From: (b) (6) To: (b) (6) Subject: FW: Information Provided by DHS Regarding Russian Scanning was Incorrect Date: Wednesday, September 27, 2017 12:49:59 PM From: Secretary of State, Press Sent: Wednesday, September 27, 2017 2:58:05 PM To: Secretary of State, Press Subject: Information Provided by DHS Regarding Russian Scanning was Incorrect AP17:073 FOR IMMEDIATE RELEASE September 27, 2017 CONTACT: Jesse Melgar or Sam Mahood (916) 653-6575 Information Provided by DHS Regarding Russian Scanning was Incorrect SACRAMENTO – California Secretary of State Alex Padilla issued the following statement. “Last Friday, my office was notified by the U.S. Department of Homeland Security (DHS) that Russian cyber actors 'scanned' California’s Internet-facing systems in 2016, including Secretary of State websites. Following our request for further information, it became clear that DHS’ conclusions were wrong.” “DHS confirmed that Russian scanning activity had actually occurred on the California Department of Technology statewide network, not any Secretary of State website. Based on this additional information, California voters can further rest assured that the California Secretary of State elections infrastructure and websites were not hacked or breached by Russian cyber actors.” “Our notification from DHS last Friday was not only a year late, it also turned out to be bad information. To make matters worse, the Associated Press similarly reported that DHS has reversed itself and 'now says Russia didn’t target Wisconsin’s voter registration system,' which is contrary to previous briefings.” epic.org EPIC-17-03-31-DHS-FOIA-20180416-Production-1 000001 NPPD 000650 “The work of our intelligence agencies is critical in defending against cyber threats.
    [Show full text]
  • And You Thought It Could Not Get Worse
    And You Thought It Could Not Get Worse Joe Vigorito/Director, Mobility & Security Annese & Associates, Inc. Sad State of Security “Many cyberattacks can be mitigated by relatively simple measures. Unfortunately, some people fail to take what appear to be basic precautions–such as using strong passwords, applying patches, and running a security solution. In many cases, breaking into a company’s network is easier than it sounds.” Costin Raiu Director, Global Research & Analysis Team Kaspersky Lab “I could teach a third-grader to do it.” Darren Martyn aka “PwnSauce” LulzSec After hacking senate.gov in 2011 The Current State of Cybersecurity is Not Nearly Good Enough, and is getting worse all the time! Not getting worse? Lets look… • Yahoo! – Perpetrator unknown. 500 million accounts in Sept. ‘16, 1 billion in December. User names, email addresses, date of birth, passwords, phone #’s and security questions leaked Not getting worse? Lets look… • Yahoo! – Perpetrator unknown. 500 million accounts in Sept. ‘16, 1 billion in December. User names, email addresses, date of birth, passwords, phone #’s and security questions leaked • Mark Zuckerberg Hack – OurMine Group. His Pinterest and Twitter accounts were hacked multiple times because he used the password ‘dadada’ Not getting worse? Lets look… • Yahoo! – Perpetrator unknown. 500 million accounts in Sept. ‘16, 1 billion in December. User names, email addresses, date of birth, passwords, phone #’s and security questions leaked • Mark Zuckerberg Hack – OurMine Group. His Pinterest and Twitter accounts were hacked multiple times because he used the password ‘dadada’ • Oracle Micros Hack – Russian hacking group known for hacking banks compromised Oracle’s POS system code on one of the top 3 payment card systems globally Not getting worse? Lets look… • Yahoo! – Perpetrator unknown.
    [Show full text]
  • JAN 2017 Part B.Pdf
    Page | 1 CBRNE-TERRORISM NEWSLETTER – January 2017 www.cbrne-terrorism-newsletter.com Page | 2 CBRNE-TERRORISM NEWSLETTER – January 2017 Lost Nukes Present Opportunities for Terrorists Source: http://i-hls.com/2017/01/lost-nukes-present-opportunities-terrorists/ Jan 01 – Could Islamist terrorists get a hold of a nuclear bomb? Dozens of nuclear warheads have gone missing during the 1950s, 60s, 70s and 80s – with many confirmed the loss of at least eight atomic bombs – with a combined explosive force 2,200 times the Hiroshima bomb. According to The Sun, the Russians have never disclosed their missing weapons. However, according to the Berlin Information Centre for Transatlantic Security up to 50 nukes have been lost across the world since the 1950s. Most of these highly dangerous weapons are still lying on the ocean floor after military planes and subs sank without a trace. Experts claim that while they would probably be no use as weapons they could easily be salvaged, and the uranium would be used to build a “dirty” bomb (a weapon that combines radioactive material with conventional explosives). ISIS terror fanatics, who have been working to bolster their ranks with a team of jihadi scientists capable of creating a dirty bomb, have already launched chemical attacks. According to security service officials, finding a missing nuke would be a huge achievement for any terror group. Now, experts say the jihadis who want to develop nuclear weapons are the biggest threat to Europe since the end of the cold war. Moshe Kantor, head of the Luxembourg Forum on Preventing Nuclear Catastrophe, warned: “ISIS has already carried out numerous chemical weapons attacks in Syria.
    [Show full text]
  • 2017 Cybersecurity Predictions
    ATTACKS INTENSIFY REGULATION EMERGES FROM THE SHADOWS 2017 CYBERSECURITY PREDICTIONS Published: January 2017 SEEK TRUTH FIND RESILIENCE TABLE OF CONTENTS Intro Foreword ............................................................................................................................................................ 4 Scorecard for 2016 predictions ................................................................................................................. 5 2017 Predictions 1. Criminals harness IoT devices as botnets to attack infrastructure ...................................... 8 2. Nation state cyber espionage and information war influences global politics and policy ............................................................................................................................................................ 10 3. Data integrity attacks rise .................................................................................................................. 12 4. Spear-phishing and social engineering tactics become more crafty, more targeted and more advanced ............................................................................................................................... 14 5. Regulatory pressures make red teaming the global gold standard with cybersecurity talent development recognized as a key challenge ..................................... 16 6. Industry first-movers embrace pre-M&A cybersecurity due diligence ............................. 18 Conclusion Conclusion......................................................................................................................................................
    [Show full text]
  • Why Your Organization Should Treat Every Account As Privileged 2 Introduction
    CREATE POSITION Univers 55 Roman Depth is 2x width of “I” Standard IA Light Gray “I” 2x width of “I” Space between TM and logo is 1 x “I” 1x “I” Align with top of letter or top Why Your Organization of ribbon. Should Treat Every Account as Privileged Contents PAGE INTRODUCTION 3 YOU’VE BEEN LOOKING AT PRIVILEGED ACCESS ALL WRONG 5 YOUR BUSINESS SYSTEMS AND DATA ARE LESS SECURE THAN YOU THINK 7 IMPACT OF FAILING TO ACT 11 PROTECT YOUR ORGANIZATION WITH IDENTITY-DRIVEN SECURITY BEST PRACTICES 14 GET STARTED 18 Why Your Organization Should Treat Every Account as Privileged 2 Introduction There have been a slew of major data breaches in recent years. The number of records exposed in data breaches last year alone reached 174.4 million—close to five times the The hard truth is that 36.6 million records exposed in 2016.1 any unsafe system or individual puts Every time you turn around, another organization is in the headlines for having millions of everyone at risk. records compromised. Look no further than the recent Equifax breach in which sensitive information on more than 140 million individuals was stolen. This trend is expected to continue, with data breaches and other cybercrime costing the world $6 trillion per year by 2021, up from $3 trillion annually in 2015.2 In the vast majority of data breaches, stolen credentials for privileged accounts are the prime target for hackers. In fact, Forrester estimates that 80 percent of security breaches involve privileged accounts.3 Traditional privileged accounts are IT-based and have special active directory (AD) attributes.
    [Show full text]
  • Personally Identifiable Information (PII)
    Personally Identifiable Information (PII) MIS 5206 • In The News • Confidentiality Risk of Personally Identifiable Information • Team exercise • No Quiz to today https://www.theverge.com/2017/9/15/16315870/vevo-hack-celebrity-files-ourmine-posted http://thehackernews.com/2017/09/windows10-app-permissions.html https://www.schneier.com/blog/archives/2017/09/shadowbrokers_r.html http://www.independent.co.uk/life-style/gadgets-and-tech/news/petya-cyber-attack-world-global-destruction-money-ransomware-ukraine-chernobyl-wpp-merck- wannacry-a7816036.html https://www.infosecurity-magazine.com/news/fitbit-vulnerabilities-expose/ https://www.theverge.com/2017/9/18/16325202/ccleaner-hack-malware-security http://www.technewsworld.com/story/84818.html https://www.csoonline.com/article/3202071/security/pii-of-1-million-compromised-in-washington-state-university-safe-heist.html http://www.computerweekly.com/opinion/Security-Think-Tank-Cyber-resilience-cheaper-than-attack-recovery https://www.theverge.com/2017/9/18/16328172/sms-two-factor-authentication-hack-password-bitcoin http://money.cnn.com/2017/09/15/technology/china-bitcoin-exchanges-prices-crash/index.html http://www.technewsworld.com/story/83998.html http://www.businessinsider.com/cctv-camera-infrared-bypass-air-gap-exfiltrate-data-2017-9 https://www.darkreading.com/endpoint/how-apples-new-facial-recognition-technology-will-change-enterprise-security/a/d-id/1329908? http://www.politico.com/story/2017/09/20/sec-cybersecurity-breach-242956 https://www.washingtonpost.com/news/business/wp/2017/09/20/sec-reveals-it-was-hacked-information-may-have-been-used-for-illegal-stock-
    [Show full text]
  • Data Breaches in IT Systems
    Data Breaches in IT Systems Magdalena Neumann Betreuer: Heiko Niedermayer Seminar: Innovative Internettechnologien und Mobilkommunikation SS2016 Lehrstuhl Netzarchitekturen und Netzdienste Fakultät für Informatik, Technische Universität München Email: [email protected] KURZFASSUNG denen Kosten fur¨ Unternehmen, aber auch fur¨ die direkt Datenpannen haben sich im letzten Jahrzehnt zunehmend Betroffenen diskutiert. Abschließend werden die Ergebnisse zu einem schwerwiegenden Problem entwickelt. Obwohl der zusammengefasst und Erkenntnisse abgeleitet. Diebstahl von Daten nicht immer nur aus finanziellen Grun-¨ den erfolgt, entstehen meist hohe Kosten fur¨ die Gesch¨adig- 2. GRUNDLAGEN ten. Diese Arbeit ordnet den Begriff Datenpanne ein, stellt Mit der steigenden Zahl an Datenpannen ist es aus analyti- aktuelle Zahlen vor und besch¨aftigt sich mit der Frage, wie scher Sicht von großer Bedeutung, s¨amtliche gemeldete F¨alle sich der Trend in den letzten Jahren entwickelt hat. Dabei sinnvoll zu erfassen und einzuordnen. Dabei gilt es in erster werden zwei verschiedene Datensammlungen genauer unter- Linie zu uberpr¨ ufen,¨ ob es sich definitionsgem¨aß uberhaupt¨ sucht und Gemeinsamkeiten sowie vor allem Unterschiede um eine Datenpanne handelt und welcher Kategorie diese vorgestellt. Insgesamt wird die Problematik der Vergleich- zuzuweisen ist. Hierfur¨ werden in diesem Kapitel zun¨achst barkeit thematisiert. Zus¨atzlich wird der Umgang mit Da- verschiedene Definitionen vorgestellt. Anschließend werden tenpannen in der Realit¨at anhand zweier bekannter
    [Show full text]
  • Getting​​Personal
    ​ ​​ ​​ ​​ ​ Getting​ ​Personal The impact of cybercrime on executive leadership. ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ Executive​ ​Risk​ ​Whitepaper Corporate leaders and directors are often the targets of cyber crime. Sometimes they​ ​are​ ​just​ ​collateral​ ​damage.​ ​​ ​In​ ​either​ ​case,​ ​it​ ​can​ ​be​ ​costly​ ​and​ ​career​ ​ending. EXECUTIVE​ ​RISK​ ​WHITEPAPER Contents ​ ​[2]​​ ​​ ​​Executive Summary [3]​ ​​ ​​Take​ ​it​ ​from the​ ​top ​ ​​ ​​ ​​ ​​ ​[6]​ ​​ ​​A​ ​Broken​ ​Circle of​ ​Trust [7]​​ ​​ ​​Accidents Happen [8]​ ​​ ​​Sent​ ​Packing [9]​ ​​ ​​Spare​ ​Me [10]​ ​​ ​​Conclusion ©​ ​2017​ ​4iQ,​ ​Inc.​ ​All​ ​rights​ ​reserved. ​ ​​ ​​ ​​ ​​ ​​ ​​ ​​ ​​ ​​​ ​​[​​ ​1​​ ​] EXECUTIVE​ ​RISK​ ​WHITEPAPER Executive Summary When it comes to cyber threats, the C-suite and board room have a lot to worry about. What would a breach do to our company’s reputation? What could happen to our stock price? What if our intellectual property is stolen? How could the cost of a breach affect our financials? Or our viability​ ​as​ ​a​ ​company? These are all important questions, and smart companies consider how to answer them before an incident occurs. But there is one question that few executives think to ask​ ​until​ ​it’s​ ​too​ ​late: What​ ​if​ ​I​ ​am​ ​the​ ​source​ ​of​ ​the​ ​breach? When a CEO’s account is breached, it can trigger an earthquake for the entire enterprise. Aftershocks often include phishing scams, exfiltrated intellectual property, exposed stolen customer lists, and countless other incidents that cause severe​ ​financial​ ​and​ ​reputational​ ​damage​. 4iQ’s unique, outside-in approach can keep you and your company safe. We scour the full attack surface to uncover lost, leaked or​ ​stolen​ ​credentials​ ​and​ ​data. ©​ ​2017​ ​4iQ,​ ​Inc.​ ​All​ ​rights​ ​reserved. ​ ​​ ​​ ​​ ​​ ​​ ​​ ​​ ​​ ​​​ ​​[​​ ​2​​ ​] EXECUTIVE​ ​RISK​ ​WHITEPAPER Take​ ​it​ ​from​ ​the​ ​Top Increasingly, cyber criminals are targeting company leadership to gain access to networks, information, notoriety and money.
    [Show full text]
  • 'Even Facebook Is Hackable': Social Networking Website's Twitter Page Was Compromised 10 February 2020, by Dalvin Brown
    'Even Facebook is hackable': Social networking website's Twitter page was compromised 10 February 2020, by Dalvin Brown Security researcher Jane Manchung Wong captured the incident in real-time, uploading a screengrabbed video soon after it ended. Facebook Messenger's Twitter page was hacked in a similar manner along with Facebook's Instagram account. The tech giant's official website was not hacked. Facebook wasn't immediately available for comment, however, a spokesperson for Twitter told The Verge the takeover happened through a third- party platform. "As soon as we were made aware of the issue, we Credit: CC0 Public Domain locked the compromised account and are working closely with our partners at Facebook to restore them," Twitter said in a statement. Another day, another hack. According to screenshots of the tweets, the third- party platform may have been linked to the social Some of Facebook's official social media accounts media management site Khoros. were temporarily hijacked by a firm that has compromised accounts belonging to other high- OurMine is known for breaking into social profile tech companies. networking accounts belonging to celebrities and media companies. In 2017, the team of "white hat" Late Friday evening, the hacking firm OurMine hackers compromised several HBO official Twitter cracked into Facebook's official handle on Twitter profiles, including the official Game of Thrones and tweeted, "Hi, we are OurMine. Well, even page. Netflix, Marvel and the NFL have also been Facebook is hackable but at least their security is targeted. better than Twitter." OurMine says it has no bad intentions and claims The firm says its agenda is to generate awareness that its purpose is to help companies secure about cyber vulnerabilities.
    [Show full text]
  • Research on Pre-Electoral Intervention by Foreign Countries in a Digital World
    Research on Pre-Electoral Intervention by Foreign Countries in a Digital World The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation Gilani, Syed. 2018. Research on Pre-Electoral Intervention by Foreign Countries in a Digital World. Master's thesis, Harvard Extension School. Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:42004033 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#LAA Research on Pre-Electoral Intervention by Foreign Countries in a Digital World Syed Gilani A Thesis in the Field of International Relations for the Degree of Master of Liberal Arts in Extension Studies Harvard University November 2018 © 2018 Syed Gilani Abstract The election is now over, The result is now known. The will of the people Has clearly been shown. Let’s all get together; Let bitterness pass. I’ll hug your Elephant; And you kiss my Ass. —Hillary Clinton, 2018 The 2016 U.S. presidential election is long over, but the will of the people is still being contested in the media and by many in the general public. Bitterness has severely divided the nation along ideological fault lines, and hugs and kisses are far from reality. Alleged Russian intervention in the U.S. national elections, in favor of Republican nominee Donald J. Trump, has been named as one of the major problems of this recent post-election discord across America.
    [Show full text]
  • Accounting and Financial Reporting for Fiduciary Activities Gasb-84
    GOVERNMENTAL UPDATE, AUDITING UPDATE AND THINGS THAT KEEP US UP AT NIGHT State of Maine Eric S. Berman, MSA, CPA, CGMA, Partner [email protected] 208.424.3524 AGENDA – GASB UPDATE June 30, 2018 Year Ends: GASB 81 – Irrevocable Split-Interest Agreements GASB 75 – Accounting and Financial Reporting for Postemployment Benefits Other than Pensions (OPEB) GASB 85 – Omnibus 2017 GASB 86 – Certain Debt Extinguishment Issues Implementation Guide Update 2017-1 OPEB Employers’ Implementation Guide June 30, 2019 and beyond GASB-83 – Asset Retirement Obligations GASB-84 – Fiduciary Activities GASB-87 – Leases GASB 88 – Debt Disclosure and Direct Borrowing GASB 89 – Accounting for Interest Cost during the Period of Construction Likely GASB 90 - Accounting and Financial Reporting for Majority Equity Interest The Latest on the Financial Reporting Model Project These seminar materials are intended to provide the seminar participants with guidance in accounting and financial reporting matters. The materials do not constitute, and should not be treated as professional advice regarding the use of any particular accounting or financial reporting technique. Every effort has been made to assure the accuracy of these materials. Eide Bailly LLP and the author do not assume responsibility for any individual's reliance upon the written or oral information provided during the seminar. Seminar participants should independently verify all statements made before applying them to a particular fact situation, and should independently determine consequences of any
    [Show full text]