Faculty of Administration University of Ottawa Ottawa, Ontario KlN 6N5, Canada
Dr. Chia-Hao Chang
Department of Industrial and System Engineering University of Michigan-Dearborn Dearborn, MI, USA 48128
Computer viruses have recently drawn a lot of Managerial Perspective
attention because of some spectacular examples of their power of disruption. This paper dis- The implications of the computer virus growth cusses the impact of computer viruses on differ- are especially important for management ent sectors of the society. Four important information systems (MIS). Management is perspectives of society will be discussed here: becoming more aware of the security consid- erations and internal policies of the firm . In 1. The managerial perspective order to prevent system contamination, em- 2. The users' perspective ployees should be warned not to use any 3. The manufacturers' perspective unchecked programs . The MIS management 4. The security specialists' perspective should set more straightforward policies and the repercussions of not abiding by them. Brief Overview Similarly, any software used in the office should remain there and no place else . This is A virus is a program that can infect other pro- to safeguard against possible infections that grams by modifying them to include a possibly could occur outside of the office environment. evolved copy of itself. With its infection prop- The focus of most policies will be on prevent- erty, a virus can spread throughout a computer ing external intrusions rather than internal system or network using the authorization of threats simply for the sake of reducing every user to inflict his/her own programs . external dangers. Every program that gets infected may in turn act as a virus and thus start an endless cycle. This Management should also emphasize better ability to reproduce itself combined with the education and training of its workers. It might numerous points of interconnection in today's be worthwhile to expose them to virus attack computer systems makes it spread like AIDS . simulations during their training period . This
viruses will dramatize the importance of security which computer operate . The test issues by showing how all the valuable data, way for users to protect against viruses and hardware other personal computing hazards is through programs and even of the users can be tapped by a virus. The computer virus, as a education. Users require good knowledge of training tool, would help users understand the DOS to realize the seriousness of the problem dangers inherent in program and data ex- and to understand the risk involved when change. those DOS-related problems arise. Common sense and a healthy dose of caution will go a Although the control mechanisms are impor- long way towards protection against viruses . tant, management should not overreact to the virus threat and thus suffocate end users' The immediate effect on users of the new innovations. The manager must strike a bal- cautious environment is putting an end to the ance between the benefits of information uninhibited program swapping that made the exchange and the isolation of computer sys- early days of the computer revolution so excit- tems. ing. Just as the threat of AIDS has made people become cautious of casual sexual be- Users' Perspective havior, the computer virus may also restrain the development of software pirating . The impact of computer viruses upon the users could be severe . The initial impact may be a Manufacturers' Perspective trend towards software development that is bulletproof rather than user friendly . With Besides the development of vaccines and software, antidotes, the software manufacturers may see more complex me result could be a longer learning curve for new users. the computer virus as a potential marketing tool. By providing warranties or guarantees to The interchange of programs on "Bulletin the purchaser against the existence of viruses Boards" is also affected by the virus epidemic. in their software, they believe that they can This cheap source of new programs has dried eradicate the pirates and copycat vendors who up as name and name people become con- are cannibalizing their markets. cerned with potential contamination. A similar decline has taken place in second-hand Vicious software developers may use viruses or borrowed software as the "fortress mental- as a selective predator, targeting only software hardware ly" sets in. or sold by specific vendors . With the rapid spread of PC-to-mainframe linkages, With the decline of borrowed or pirated those malicious developers may use viruses to software, there is a sign of growth in the sales attack competitors without leaving a trace. of programs at some reputable, safe retail outlets. People seem to be willing to trade As manufacturers grapple with the threats and some cost for an increased sense of security opportunities posed by computer viruses, they with their programs . must also deal with the plethora of legal ramifications that will eventually follow . Users may protect themselves by fully under- standing their equipment and the process by
Co er Security Specialists' Perspective this opens up a new field of legal repercus- sions and costs for the company. The growing need for computer security specialists is predictable. Consultants may Conclusion earn enviable income by telling corporate computer users how to protect their machines This paper has considered each stakeholder in from catastrophic failure and how to use the computer industry who may have an antidote and vaccine products . interest in the activities of computer viruses. Managers will have to compromise between The computer specialists will be in a never innovation and control. Users may have to be ending game with each other. As they de- more cautious of software pirating . Manufac- velop preventive vaccines and administer the turers must recognize the opportunities and viral antidotes, the viral breeders will also be threats of computer viruses as a marketing developing new viruses to overcome the new weapon. Security specialists face a never security measures . The phenomenon will be ending battle against virus creators trying to exactly the same as the situation in disk copy overcome their security measures, antidotes and protection in the past few years. and vaccines . These are just a few of the impacts that can be expected on the computer The problems of computer security specialists industry . For the computer society, the com- are compounded by the existence of fake puter virus has become a fact of life . antidotes . These antidotes appear to cure the program but in fact implant a new virus. Recently, a more dangerous retrovirus has References emerged to give security personnel real head- aches . The retrovirus remains even after the Cohen, F., 1984, "Computer Viruses : Theory computer memory has been erased . and Experiment", University of Southern California, July . Rather than contracting a Germany company to build a gas plant, it is much easire for Elmer-Dewitt, Philip, 1988, "Computer terrorist groups to hire a computer specialist to Viruses", Time Magazine, September 26. build virus programs that will attack airplanes, banks and national defense. Computer spe- Dvorak, J.C ., 1988, "Virus Wars Ahead", PC cialists, especially those who develop the Magazine, November 15, 1988, p. 71 . military system, should be very carefully screened . Finch, J.H. and Dougall, E.G., 1984. Com- puter Security: A Global Challenge, Some terrorists blackmail victims by inserting Elsevier Science Publishers, Amsterdam . a "time bomb" virus into a system and then demand payment. The emergence of virus Hadler, E., 1982 . Computer Security Hand- hoaxes should appear shortly, as malicious book, Brandon Publishing, New York, New pranksters phone in with threats of viruses. York. Since the use of viruses is difficult to prove,