Welcome to the Nexus of Ethics, Psychology, Morality, Philosophy and Health Care

Welcome to the nexus of ethics, psychology, morality, technology, health care, and philosophy
Showing posts with label Theft. Show all posts
Showing posts with label Theft. Show all posts

Friday, August 24, 2018

Government Ethics In The Trump Administration

Scott Simon
Host, Weekend Edition, NPR
Originally posted August 11, 2018

President Trump appointed what's considered the richest Cabinet in U.S. history, and reportedly, more than half of the president's Cabinet, current and former, have been the subject of ethics allegations. There's HUD Secretary Carson's pricey dining table, VA Secretary Shulkin's seats at Wimbledon, Scott Pruitt's housing sublet from a lobbyist, Interior Secretary Zinke's charter planes, Treasury Secretary Mnuchin taking a government plane to see the solar eclipse, and Commerce Secretary Wilbur Ross might need his own category. Forbes magazine reports on many people who have accused him of outright theft, saying - Forbes magazine - quote, "if even half of the accusations are legitimate, the current United States secretary of commerce could rank among the biggest grifters in American history."

The interview is here.

Saturday, March 24, 2018

Facebook employs psychologist whose firm sold data to Cambridge Analytica

Paul Lewis and Julia Carrie Wong
The Guardian
Originally published March 18, 2018

Here are two excerpts:

The co-director of a company that harvested data from tens of millions of Facebook users before selling it to the controversial data analytics firms Cambridge Analytica is currently working for the tech giant as an in-house psychologist.

Joseph Chancellor was one of two founding directors of Global Science Research (GSR), the company that harvested Facebook data using a personality app under the guise of academic research and later shared the data with Cambridge Analytica.

He was hired to work at Facebook as a quantitative social psychologist around November 2015, roughly two months after leaving GSR, which had by then acquired data on millions of Facebook users.

Chancellor is still working as a researcher at Facebook’s Menlo Park headquarters in California, where psychologists frequently conduct research and experiments using the company’s vast trove of data on more than 2 billion users.

(cut)

In the months that followed the creation of GSR, the company worked in collaboration with Cambridge Analytica to pay hundreds of thousands of users to take the test as part of an agreement in which they agreed for their data to be collected for academic use.

However, the app also collected the information of the test-takers’ Facebook friends, leading to the accumulation of a data pool tens of millions strong.

That data sold to Cambridge Analytica as part of a commercial agreement.

Facebook’s “platform policy” allowed only collection of friends’ data to improve user experience in the app and barred it being sold on or used for advertising.

The information is here.

Monday, March 27, 2017

Healthcare Data Breaches Up 40% Since 2015

Alexandria Wilson Pecci
MedPage Today
Originally posted February 26, 2017

Here is an excerpt:

Broken down by industry, hacking was the most common data breach source for the healthcare sector, according to data provided to HealthLeaders Media by the Identity Theft Resource Center. Physical theft was the biggest breach category for healthcare in 2015 and 2014.

Insider theft and employee error/negligence tied for the second most common data breach sources in 2016 in the health industry. In addition, insider theft was a bigger problem in the healthcare sector than in other industries, and has been for the past five years.

Insider theft is alleged to have been at play in the Jackson Health System incident. Former employee Evelina Sophia Reid was charged in a fourteen-count indictment with conspiracy to commit access device fraud, possessing fifteen or more unauthorized access devices, aggravated identity theft, and computer fraud, the Department of Justice said. Prosecutors say that her co-conspirators used the stolen information to file fraudulent tax returns in the patients' names.

The article is here.

Tuesday, September 30, 2014

How Unethical Behavior Becomes Habit

by Francesca Gino, Lisa D. Ordóñez and David Welsh
Harvard Business Review Blog
Originally posted September 4, 2014

When a former client’s secretary was arrested for embezzlement years before his own crimes were uncovered, Bernie Madoff commented to his own secretary, “Well, you know what happens is, it starts out with you taking a little bit, maybe a few hundred, a few thousand. You get comfortable with that, and before you know it, it snowballs into something big.”

We now know that Madoff’s Ponzi scheme started when he engaged in misreporting to cover relatively small financial losses. Over a 15-year period, the scam grew steadily, eventually ballooning to $65 billion, even as regulators and investors failed to notice the warning signs.

The entire article is here.

Monday, June 30, 2014

Unethical for the Sake of the Group

Risk of social exclusion and pro-group unethical behavior

By S. Thau, R. Defler-Rozin, M. Marko and others
Journal of Applied Psychology, Apr 28 , 2014, No Pagination Specified. doi: 10.1037/a0036708

Abstract

This research tested the idea that the risk of exclusion from one’s group motivates group members to engage in unethical behaviors that secure better outcomes for the group (pro-group unethical behaviors). We theorized that this effect occurs because those at risk of exclusion seek to improve their inclusionary status by engaging in unethical behaviors that benefit the group; we tested this assumption by examining how the effect of exclusion risk on pro-group unethical behavior varies as a function of group members’ need for inclusion. A 2-wave field study conducted among a diverse sample of employees working in groups (Study 1) and a constructive replication using a laboratory experiment (Study 2) provided converging evidence for the theory. Study 1 found that perceived risk of exclusion from one’s workgroup predicted employees’ engagement in pro-group unethical behaviors, but only when employees have a high (not low) need for inclusion. In Study 2, compared to low risk of exclusion from a group, high risk of exclusion led to more pro-group (but not pro-self) unethical behaviors, but only for participants with a high (not low) need for inclusion. We discuss implications for theory and the management of unethical behaviors in organizations.

Introduction

Rising reports of corporate scandals and incidents of employees engaging in behaviors that are considered "illegal or morally unacceptable to the larger community" (Jones, 1991, p. 367) have increased scholarly attention to the nature and causes of unethical behavior in organizations.

Examples of unethical behaviors include stealing from one's employer, deceiving customers, and misrepresenting performance (Trevino, den Nieuwenboer, & Kish- Gephart, 2014).

The costs associated with just one type of these behaviors--employee theft--are estimated at as much as $40 billion yearly (U.S. Chamber of Commerce, 2013), which is nearly ten times the cost of all street crime combined, including burglaries and robberies (Federal Bureau of Investigation, 2011).

A large body of research has identified characteristics of individuals, moral issues, and organizational contexts as antecedents of unethical behavior (Kish-Gephart, Harrison, & Trevin~o, 2010; Trevino, 1986; Trevino et al., 2014; Trevino, Weaver, & Reynolds, 2006).

The entire article is here, behind a paywall.

Reprints for the article can be emailed to this author.

Wednesday, November 23, 2011

Congress examines health data thefts

By Jeremy Herb
The Star Tribune

In the wake of high-profile health-care data breaches in Minnesota this year, Sen. Al Franken on Wednesday examined how sensitive data can be better protected as more of it moves to the "wild, wild West" of the Internet.

Thefts of laptops containing patient data from Fairview and North Memorial hospitals earlier this year were just a small slice of health data thefts in the United States. In a 15-month span, the Department of Health and Human Services (HHS) found that more than 50 laptops were stolen from hospitals, clinics and medical centers.

The entire story can be found here.


Monday, October 10, 2011

HIPAA Summit West: 1 in 4 Organizations Report Data Breaches

Dom Nicastro, for HealthLeaders Media, September 27, 2011

Ali Pabrai said it best at last week's fifth national HIPAA Summit West at the Grand Hyatt in San Francisco. Pabrai, a data security expert, noted that 97% of chief information officers are concerned about data security.

"My question is, 'Who are these other three percent?'" Pabrai asked the hundreds of laughing attendees.

Pabrai, MSEE, CISSP (ISSMP, ISSAP), of ecfirst's HIPAA Academy in Newport Beach, CA, delivered a message that resonates with HIPAA privacy and security officers: Everyone, especially those charged with protecting the privacy of patient information, needs to be concerned about data security.

Numbers game

The numbers at the HIPAA Summit told the story:
  • 1 in 4: Organizations reporting a data breach (source: Pabrai)
  • 250,000 to 500,000: Medical identity thefts (source: Pabrai)
  •  330: Organizations reporting a breach of unsecured protected health information affecting 500 or more individuals since September 2009 (source: Office for Civil Rights, or OCR)
  • 34,000: Number of reports of breaches submitted to OCR affecting fewer than 500 individuals (source: OCR)
From how and from where the 500-or-more breaches are coming:

How:
  • Theft: 50%
  • Unauthorized access disclosure: 20%
  •  Loss: 16%
  • Hacking/IT: 7%
Where:
  • Paper records: 24%
  • Laptop: 23%
  • Desktop computer: 17%
  • Portable electronic device: 16%
  • Network server: 10%
In August, McAfee reported that hackers broke into the United Nations data system and hid there for two years unnoticed, Pabrai said.

"How do we know that someone isn't hiding in our systems, and how long have they been there?" Pabrai asked the audience. "Do we have appropriate controls? What is the state of our information security?" Do you have intrusion protection and intrusion prevention in place?

"This is not just a compliance issue," Pabrai said. "This will have significant risk to the organization and will impact your facility in the seven figures."

The entire story can be read here.

Wednesday, October 5, 2011

IU medical school warns thief may have gained access to patient data of 3,000 people

The Chicago Tribune, as cited from The Associated Press

INDIANAPOLIS (AP) — The Indiana University School of Medicine says a thief who stole a physician's laptop computer may have gained access to the confidential patient information of more than 3,000 people.

The news release can be found here.