The University of SydneyPage 43Technology Enabled InterventionSilent Messages - Technology enabled organizational interventions Implications for security More often than not IT implementation takes place without adequate understanding of business processes. Important questions such as, is IT deriving change or is change determining the kind of IT remain overlooked. Purpose of integrated IT systems is to ensure integrity of operations. This intent gets defeated when user needs are not met. This often results in user groups seeking independent help. This defeats the organizational objectives and result in lack of security policy compliance. Any IT implementation needs to be properly introduced and users adequately trained. Training is usually targeted at the functionality of the system rather than ensuring training to accept the related business changes. Skewed emphasis on the kind of training provided defeats the purpose of ensuring integrity of the operations, a serious security threat Security is usually considered as an after thought and gets implemented at the level of password control and rudimentary risk analysis. Add on technical controls cannot be sustained because of fundamental authority and responsibility issues not getting addressed. IT systems by their very nature are formally structured. Unless carefully planned, they tend to constrain the natural way in which people work Systems analysis errors and problems have implications for system design. Errors creeping in early result in major security breaches.