Professional Documents
Culture Documents
ACCG3025 Week 1 Notes
ACCG3025 Week 1 Notes
ACCG3025 Week 1 Notes
News Headlines
- Ransomware demand increase in volume and $ value, including attacks on MSPs
- TikTok app data security
- Consumer Data Right for banking commenced in Australia on 1 July 2020
- Supply chain cuber-attacks increase
- Encrochat “secure” mobile phone service for criminals breached by
UK/French/Dutch law enforcement
Cybersecurity
- Is really a business issue
- People and processes just as important as tech
- Business faces both internal and external risks from its supply chain to its
customers
- Creates many externalities
- Software developers currently face insufficient liability for the risks they create.
Due to race to be first creating a less than optimal ability to reduce risks
- Customers cannot accurately assess the credibility of claims made by most
vendors as to the extent to which they have mitigated cybersecurity risks
- Attackers are always evolving – they only have to be right once to create an issue
- Info asymmetries and inadequate heuristic limits our ability to effectively
respond
Threats to privacy
- Social such as bullying and stalking
- Organisational such as secondary use by the data collector or third parties
- Improper access by employees, government or public
- Five theories of privacy
1. Privacy calculus theory
2. Social theory
3. Cognitive biases and heuristic theory
4. New institutional Economics theory
5. Quantum homomorphism theory
Australian Attitude’s
- Carried by OAIC 2017, 1800 interviewed
- Half were not aware of the existence of the Australian Privacy Commissioner
- Biggest perceived threats
Online services
ID fraud
Data security breaches
Risk to financial data
- Social media and e-commerce had the lowest trust
- Only 1% like to receive unsolicited communications (spam)
- Trust in an organisation declines with age
- 93% were concerned with data that was sent offshore