DocumentCode :
3544173
Title :
Information confidentiality and the Chinese Wall Model in Government tender fraud
Author :
Rama, Sobhana ; Flowerday, Stephen V. ; Boucher, Duane
Author_Institution :
Dept. of Inf. Syst., Univ. of Fort Hare, East London, South Africa
fYear :
2012
fDate :
15-17 Aug. 2012
Firstpage :
1
Lastpage :
8
Abstract :
Instances of fraudulent acts are often headline news in the popular press in South Africa. Increasingly these press reports point to the government tender process as being the main enabler used by the perpetrators committing the fraud. The cause of the tender fraud problem is a confidentiality breach of information. This is accomplished, in part, by compromising the tender information contained in the government information system. This results in the biased award of a tender. Typically the information in the tender process should be used to make decisions about a tender´s specifications, solicitation, evaluation and adjudication. The sharing of said information to unauthorised persons can be used to manipulate and corrupt the process. The reliance on uncompromised information during the tender process, points to the need to ensure that information confidentiality is present. A lack of information confidentiality can occur when a government official involved in the tender process derives personal gain by knowingly possessing a conflict of interest. This in turn corrupts the tender process by awarding a tender to an unworthy recipient. This paper addresses the conflict of interest which can arise between government officials and external stakeholders in the government tender process. It suggests that conflict of interest together with a lack of information confidentiality in the information system paves the way for possible corruption. Thereafter, information flow models, and the Chinese Wall Model are discussed as a means of mitigating instances where conflict of interest can occur. The Chinese Wall Model is applied to three existing case studies associated with corruption to determine its viability in the conflict of interest problem within the tender process. Finally, an adapted Chinese Wall Model, which includes elements of the tender process, is presented as a conceptual view of how the Chinese Wall Model can mitigate fraud in the government tender process.
Keywords :
government data processing; security of data; Chinese wall model; South Africa; external stakeholders; government information system; government officials; government tender fraud; information breach; information confidentiality; Adaptation models; Companies; Context; Government; Information systems; Investments; Security; Chinese Wall Model; Government tender fraud; conflict of interest; information confidentilaity;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security for South Africa (ISSA), 2012
Conference_Location :
Johannesburg, Gauteng
Print_ISBN :
978-1-4673-2160-0
Type :
conf
DOI :
10.1109/ISSA.2012.6320438
Filename :
6320438
Link To Document :
بازگشت