Page 543 - Using MIS
P. 543

Q4  What Are the Security Challenges of International IS?   511





                                                                                                            Sales
                                                                                                           Database
                                         Purchasing
                                         Application            Purchasing
                                                                Application          Purchasing
                                                                                     Application






                                                                   Raw                 Processing
                                            Supply                Materials             Center               Store
                                           Inventory              Inventory            Inventory            Inventory
                                                    Supplies &          Finished Goods        Goods for Sale
                                                    Raw Materials




                                                       Orders                Orders   Walmart    Orders  Walmart
            Figure ID-8                   Suppliers           Manufacturers          Processing           Stores
            Eliminate Bullwhip Effect with                                            Centers
            True Demand Information



                               Q4      What Are the Security Challenges

                                       of International IS?


                                       Managing international systems creates unique security challenges that derive from differences
                                       in legal systems, physical environments, and cultural norms. These security challenges repre-
                                       sent very real threats to an organization’s ability to operate in another country.

                                       Legal Environment

                                       First, differences in legal environments between countries have a direct impact on the daily op-
                                       eration of information systems. The legal differences related to the use of encryption, distribu-
                                       tion of content, and personal privacy protections can substantially affect international IS.
                                           Most people are unaware that encryption is illegal or highly restricted in many countries.
                                       Yes, you read that correctly, illegal. In Russia and China, a license is required to import or export
                                                         7
                                       encryption products.  The use of any encryption product requires a license. China requires
                                       all wireless networks to use its own standard (WAPI). Other countries like England, India, and
                                       Australia have laws that can force decryption. Companies that use encryption need to be aware
                                       that encryption laws differ between countries and may affect their ability to operate effectively.
                                           Laws regarding the legality of the nature of the content stored in an organization’s systems
                                       are also different between countries. For example, in 2010 Google moved its search engine ser-
                                       vice from China to Hong Kong over censorship problems. The People’s Republic of China (PRC)
                                       regularly forced Google to remove content that the PRC found unacceptable.
                                           In  fact,  dozens  of  countries  regularly  block  access  to  certain  Internet  companies.  Iraq
                                       blocked Twitter, Facebook, and YouTube during a 2014 insurgency. Turkey’s government
                                       blocked Twitter and YouTube in an effort to suppress an embarrassing video showing officials
                                       talking about starting a war. 8


                                       7 Bert-Jaap Koops, “Crypto Law Survey,” Cryptolaw.org, February 2013, www.cryptolaw.org.August 12, 2014.
                                       8 Gul Tuysuz and Ivan Watson, “Turkey Blocks YouTube Days After Twitter Crackdown,” CNN, March 28, 2014,
                                       www.cnn.com/2014/03/27/world/europe/turkey-youtube-blocked/.August 12, 2014.
   538   539   540   541   542   543   544   545   546   547   548