CSE1720 Semester 1 2005 week12 / 1 Week 12 Ethics, Privacy, Security Social Implications Coles.

Slides:



Advertisements
Similar presentations
What is Business-to-Business E-Commerce? Any activity between companies that is supported electronically - - Online purchasing - Online sales -
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Creating a Winning E-Business Second Edition
Creating a Winning E-Business Second Edition Operating Your E-Business Chapter 5.
Principles of Information Systems, Sixth Edition Electronic Commerce Chapter 8.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
FIT3105 Security and Identity Management Lecture 1.
Lecture 6 Functional Business Systems. Objectives Functional Business Systems: –Marketing Systems –Manufacturing Systems –Human Resource Systems –Accounting.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Functional areas Retail Business.
Introduction to SAP R/3.
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Introduction to Business Organisations
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
The Office Procedures and Technology
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
G041: Lecture 16 Section B Revision Questions
Cyber crime & Security Prepared by : Rughani Zarana.
G041: Lecture 07 Business ICT Systems Mr C Johnston ICT Teacher
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2003 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Information Systems Security Operational Control for Information Security.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 7: E-Commerce Security and Payment system
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Unit 22 People in Computing
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Network Security & Accounting
CHAPTER 2 TYPES OF BUSINESS INFORMATION SYSTEM. INTRODUCTION Information System support business operations by processing data related to business operation.
Internet Safety Internet Safety LPM
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
CONTROLLING INFORMATION SYSTEMS
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
The main functional areas within business organisations OCR Diploma.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Welcome to the ICT Department Unit 3_5 Security Policies.
Information Security and Privacy in HRIS
Add video notes to lecture
Information Technology
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Ethics.
Presentation transcript:

CSE1720 Semester week12 / 1 Week 12 Ethics, Privacy, Security Social Implications Coles

CSE1720 Semester week12 / 2 Ethics, Privacy and Security Some common uses of data about people:

CSE1720 Semester week12 / 3 Ethics, Privacy and Security People Public Information Business Transactions Birth Certificates Mail Orders Driver Licenses Telephone Orders Car Registrations Subscriptions Property Records Donations Marriage Licence Credit Cards Census Records Warranty Cards Telephone Directories Tattslotto,... Consumer Surveys Accounts Payments Passports Visas

CSE1720 Semester week12 / 4 Ethics, Privacy and Security which can lead to : Multiple Mailing Lists : Subscriptions Entertainment Specials Donations Memberships Catalogues Social Clubs Professional Development

CSE1720 Semester week12 / 5 Ethics, Privacy and Security Computers and privacy Intellectual Property rights Truth in Art and Journalism Threats to Computers and Communications systems Security issues relating to Computers and Communications Systems

CSE1720 Semester week12 / 6 Ethics, Privacy and Security Ethics: A set of principles which govern the conduct of an individual or group Privacy: The right of people not to reveal information about themselves, the right to keep personal information from being misused Electronic invasion of personal data has become a serious ethical issue

CSE1720 Semester week12 / 7 Ethics, Privacy and Security Invasion of Privacy : Would you agree to : Your shopping habits, your income, to be available to any number of businesses ? Your medical records being used by your employer as one of the means of making decision regarding promotions, hiring, redundancy ?

CSE1720 Semester week12 / 8 Ethics, Privacy and Security The rapid expansion of use of the Internet and E-Commerce has raised many problems with ‘privacy’ aspects. In America there exists the ‘Association of Corporate Privacy Officers’ which would indicate that there is much interest and concern regarding privacy of data. Privacy Officers : train employees about privacy examine a company’s policies for potential risks manage customer-privacy disputes inform senior executives on how the company deals with privacy issues

CSE1720 Semester week12 / 9 Ethics, Privacy and Security Rules and Laws on Privacy and other social aspects: Privacy Act 1974, amended 2001 Freedom of Information Act Fair Credit Reporting Act Right to Financial Privacy Act Computer Fraud and Abuse Act Federal Data-Matching Program (Assistance and Tax Act) Australian Consumer and Competition Commission Office of Fair Trading

CSE1720 Semester week12 / 10 Ethics Some application definitions of ethics a member must –be honest, forthright and impartial –serve the community –strive to increase the competency and prestige of the profession –use special knowledge and skill for the advancement of human welfare

CSE1720 Semester week12 / 11 Ethics - Australian Computer Society Competence (part only of the Standards of Conduct) –A member must endeavour to provide products and services which match the operational and financial needs of my clients and employers –A member must give value for money in the services and products supplied by the member –A member must respect and protect the clients’ and employers’ proprietary interests

CSE1720 Semester week12 / 12 Ethics - Australian Computer Society Social Implications –A member must protect and promote the health and safety of those affected by her/his work –A member must consider and respect people’s privacy which might be affected by a member’s work –A member must respect employees and refrain from treating them unfairly The full statement of the code of ethics is available at

CSE1720 Semester week12 / 13 Ethics, Privacy and Security Intellectual Property Rights: Products of the human mind and includes tangible (i.e. ‘real products’) and intangible property (i.e. ‘ideas’) 3 common methods of ‘protection’ :- Patents (inventions) Trade Secrets (formal or method of conducting business) Copyright ( Laws which prohibit copying of intellectual property without the permission of the copyright holder)

CSE1720 Semester week12 / 14 Ethics, Privacy and Security Piracy: Theft or unauthorised distribution or use Software Piracy: Unauthorised copying of copyright software Network Piracy: The use of electronic networks to distribute unauthorised copyright materials in digitised form Plagiarism: Is the use of another’s text, findings, interpretations and presenting it as one’s own original work Also involved here is the ownership of images and sounds : for example Walt Disney animations and ‘speech/sound’

CSE1720 Semester week12 / 15 Ethics, Privacy and Security How do you feel about this ? Draw 98 is a Microsoft product It is available from the Microsoft Web site (so is other software) It is part of the progression to server based software Downloading Draw98 initiates a scan of the user’s hard disk for components of the Office suite so that ‘the installer (software) knows what you need to make Draw 98 run correctly’ Full marks to Microsoft for innovation ??

CSE1720 Semester week12 / 16 Ethics, Privacy and Security Art and Journalism: Manipulation of Sound - mixing, overlays, reductions, deletions, substitution Manipulation of photographs and video recordings - ‘touch ups’, overlays, repositioning, insertions, deletions, enhancing, minimising Morphing - construction of an image (at pixel level) to superimpose, enhance, overlay, redirect, recolour, animate, animation with voice commentary, disjoint morphing ( a person’s head which is rotated - change of facial attitude)

CSE1720 Semester week12 / 17 Ethics, Privacy and Security Questions : What is ‘REAL’ data Which data is ‘ACCURATE’ Which data can be used to MANIPULATE people

CSE1720 Semester week12 / 18 Some Threats to Computers and Communications Systems Errors and Accidents People errors Procedural errors (Ariadne rocket) Software errors Electromechanical failures Bad, incorrect or missing data

CSE1720 Semester week12 / 19 Some Threats to Computers and Communications Systems Natural and Other Hazards: Fires, floods, earthquakes Civil unrest, terrorism, war

CSE1720 Semester week12 / 20 Some Threats to Computers and Communications Systems Crimes against Computers and Communications: (illegal act against computers and/or telecommunications) Theft of hardware Theft of software Theft of time and services Theft of Information Crimes of malice and destruction

CSE1720 Semester week12 / 21 Some Threats to Computers and Communications Systems Viruses: Boot sector virus File virus Worm Logic Bomb Trojan Horse Polymorphic Virus mutation engines ANTI VIRUS SOFTWARE

CSE1720 Semester week12 / 22 Some Threats to Computers and Communications Systems Crimes against Computers and Communications: (The use of computers to effect an illegal act) Computer Criminals: Employees Outside users Hackers and Crackers Professional criminals

CSE1720 Semester week12 / 23 Some Interesting Extensions Data Matching Profiling Transaction Monitoring Performance Analyses - Human and Other Long Distance Surveillance and recording Electronic Identification of ProductsVehicles AnimalsPeople

CSE1720 Semester week12 / 24 Public Safety Aspects –Factory / Production Processes and Controls –Dangerous Materials –Power Generation and Distribution - Power Surges –Weaponry –Transport - Road, Rail, Sea, Air –Computer Controlled Communications

CSE1720 Semester week12 / 25 SECURITY

CSE1720 Semester week12 / 26 Some Aims of Security To guard against –Physical loss of equipment –Physical loss of data –Logical loss of equipment –Logical loss of data Some other Aspects –Physical Security –Data security –Software Copying –Viruses

CSE1720 Semester week12 / 27 Some Security Threats Unauthorised usage, copying, changing, corrupting, or browsing Electronic bugging of communication lines, terminal buffers, storage media Sabotage - includes erasing and altering data, substituting erroneous data, destruction of the media device Position misuse, false identification, bribery, transferred authorisations Suppression of security measures by staff Masquerading - a program which poses as an operating system and has access to user password files

CSE1720 Semester week12 / 28 Database Security and Integrity Database Security: is the protection of a database from – unauthorised access – unauthorised modification – destruction PRIVACY is the right of individuals to have some control over information about themselves INTEGRITY refers to the correctness, completeness and consistency of data

CSE1720 Semester week12 / 29 Security Some Random Ideas: Physical Access Controls : badges, closed circuit TV, guards Terminal Authentication, User I/D’s, Passwords, (at System and Database levels) Authorisation - Authorisation Rules - Which users can access which Information - What operation can users invoke read only, read/write, update, delete User Views - Non updatable access, but access to latest level of Information

CSE1720 Semester week12 / 30 Security Other Tools : Security Logs Audit trails Encryption * Data Encryption Standards * Public Key Encryption

CSE1720 Semester week12 / 31 Information Security AIMPREVENTS * ConfidentialityUnauthorised disclosure * IntegrityUnauthorised Amendment * AvailabilityUnauthorised Withholding Security Systems: 1. Computer Security 2. Communications Security - transmission - encryption 3. Procedural security 4. Physical security

CSE1720 Semester week12 / 32 Banking Frauds Melbourne July Westpac and ANZ customers were (? are) under attack Customers were advised by s to ‘reactivae’ their accounts at a new internet address The ‘new’ website was almost identical to the genuine online banking site BUT - account numbers and passwords directed to the ‘new site’ were transmitted to criminal operators. The spam didn’t carry a virus, and there is nothing in the message to alert a firewall

CSE1720 Semester week12 / 33 Banking Frauds The effect was undetected identity theft of banking details and financial fraud Both Banks have databases of known hoaxes - and the number is growing The Banks have notified customers that the Banks would carry any customer losses The Banks are also altering their customers not to respond to messages of this nature - it is NOT the method that the Banks approach their customers

CSE1720 Semester week12 / 34 Some Thoughts on the Social Implications of Technology Some Thoughts on the Social Implications of Technology

CSE1720 Semester week12 / 35 Some Social Implications of Technology Background of ‘Computing’ Automation of ‘manual’ tasks of existing procedures and systems (Accounting, Payroll, Inventory etc....) Benefits were faster, more accurate processing Earlier posting of results Some improvement in locating sensitive or cost areas of organisations (especially high cost, low productive) Some necessity to enhance people skills Some opportunity to use people more effectively Some opportunity to reduce number of people

CSE1720 Semester week12 / 36 Some Social Implications of Technology The next stage was the development and introduction of Information Systems which has the effect of Management being able to begin to monitor performance on a corporate basis. People skills definitely upgraded - more research, analysis, simulations, planning, reviews, policy changes, work practices, ‘better’ based Information both Internally and Externally Use of Information in an increasingly COMPETITIVE environment

CSE1720 Semester week12 / 37 Some Social Implications of Technology New Developments / Applications Funds transfers Electronic Libraries Electronic Surveillance Electronic Document Interchange Database Communications Networking World Wide Web Electronic Applications Integration ( EAI )

CSE1720 Semester week12 / 38 Some Social Implications of Technology Emergence of Social Engineering and associated disciplines Some Major Concerns: Ability of people to * Accept * Accommodate * Change at a HIGH RATE OF CHANGE The Total Cost of Technology (Modelling ?)

CSE1720 Semester week12 / 39 Some Social Implications of Technology Retraining : Capacity / Ability Redeployment / Relocation Social Costs : Redundancy – PERSONAL ASPECTS: Contribution Self Esteem / Worth Dehumanising Aspects ‘Spare’ Time- Occupation / Alternative Outlets (Unpaid, Part time, Volunteer Races, Casino, Tabaret, TV, Community Groups..)

CSE1720 Semester week12 / 40 Some Social Implications of Technology BEHAVIOURAL ASPECTS Human Resources Balance between PEOPLE Management and Automation Management based on Organisational Needs Personnel Management People Motivation Training Retention

CSE1720 Semester week12 / 41 Some Social Implications of Technology Organisational Changes Altered Skills Requirements (Assignment 1 ?) Spreadsheets, Databases, Word processing, Simulations, Internet, Projections, Forecasting, Modelling, Communications, Resource Management Alteration to Number of People in the Workforce Culture Changes - Shared Work, Sessional, Casual, ‘On Demand’ Changes in communication methods and content

CSE1720 Semester week12 / 42 Responsibilities of Managers TO MANAGE CHANGE Analyse Situations Develop Alternatives Evaluate Alternatives Make Decisions / Policies Implement Communicate Minimise disruption / Maximise Returns Review Revise where NECESSARY APPROPRIATE PLAN, rather than REACT

CSE1720 Semester week12 / 43 Other Implications of Technology Safety Critical Systems Jan 13, 1992: Boeing Washington to Heathrow Computer generated reduction of 50 knots Jan 26, 1992: Boeing Barbados to Gatwick Computer generated sudden increase in thrust Jan 27, 1992: Boeing Manchester to Islamabad Computer generated rapid upwards movement Investigations revealed that these incidents were due to ‘ Software Error ’ Highlights the need for development methods for testing complex software ( ? your spreadsheet, database ?)

CSE1720 Semester week12 / 44 A Commercial System Customer Order Control Warehouse and Stock Control Purchase Order Control Catalogue Accounts Payable Standard Costing Forecasting and Ordering Accounts Receivable Fixed Assets General Ledger Payroll Manufacturing and Factory Control

CSE1720 Semester week12 / 45 A Business Disaster Company X produces high quality products and part of the ‘final production assembly’ is to emboss their International logo onto the custom made items. This involves ‘knowledge’ of the number of items required for embossing A new computer system was introduced in February, 1999, which malfunctioned and did not provide details of the number of custom-made products required.

CSE1720 Semester week12 / 46 A Case Study The production Manager could not tell the production workers how many sets to assemble Shipping had no details of the number of products leaving the factory - consequently there were no deliveries planned or made as there was no documentation The transport trucks were idle as no invoices (delivery instructions) were produced The sales outlets could not access the system to get details of equipment in stock

CSE1720 Semester week12 / 47 A Case Study And the outcome ? Loss of sales Loss of productive salaries Loss of customer loyalty Loss of image Probably not a good example of ‘Customer Loyalty’ ? Question : Could this have been avoided ? How ?

CSE1720 Semester week12 / 48 A Mind Bender The following exercise is based on advanced mathematics and mental gymnastics 1. Write down the number of times per week night that you eat out (if you don’t, write down 0) 2. Multiply this value by 2 3. Add 5 4. Multiply the result of (3) by If you have already had your birthday this year add 1750 If not, add Subtract your year of birth 7. You should have a 3 digit number. The first digit should be the same as in (1) above, and the other 2 are your age.

CSE1720 Semester week12 / 49 Final Thoughts Industrial Age Advantage Mass Production Mass Marketing Customer Research Optimisation of Physical Value Chains Physical Collaboration with Suppliers Excellent Customer Service Physical Location Prompt Delivery of Physical Products to Door Knowledgeable sales Help IT Age Advantage Mass Customisation One-to-One Marketing Customer Participation Optimisation of Information Chain Information Collaboration with Suppliers Customer Self_service Virtual Globisation OnLine Delivery of Virtual Products Software Agents with acknowledgement to Bernard Boar, RCG Information Technology, who provided some of the basis for the materials

CSE1720 Semester week12 / 50

CSE1720 Semester week12 / 51 A Shopping Trip We are now going to ‘visit Coles’ to look at some of the Technology, and Management Information which is generated You have probably visited Coles and bought a wide a variety of goods. The Company (Coles Myer Ltd) operates about 80 stores in the Melbourne area and there are other stores in the Regional areas (Geelong, Ballarat, Bendigo) and large Country cities such as Warragul, Colac, Traralgon, Benalla, Shepparton, Ararat …….. They also operate Interstate

CSE1720 Semester week12 / 52 Coles Myer Ltd The Company is updating its Customer outlet scanning equipment, but like most Companies cannot do this ‘all at once’ or ‘all at the same time’ - any suggestions why this is so ? The Glen Waverley, East Burwood and Caulfield East stores, which have recently been refurbished, are equipped with ‘state of the art’ equipment

CSE1720 Semester week12 / 53 Coles Myer Ltd The equipment consists of –multi dimensional laser scanners, which have built in scale (weighing) facilities –2 LCD screens per lane. Full colour and high resolution –The Operator’s screen is a touch screen (also colour) –The printer - high speed thermal printer

CSE1720 Semester week12 / 54 Coles Myer Ltd If you watch carefully you will notice that printing does not occur until the items have been paid for (any reason for this ?) Payments may be made by –credit / debit card –cash –shareholder discount cards –vouchers –cheque –CML gift vouchers Fly Buy credits are also active.

CSE1720 Semester week12 / 55 Coles Myer Ltd Each check out consists of the devices mentions plus a PC There is a LAN in each store (for what purpose ?) The checkouts will operate in a standalone mode if a network failure occurs (what about the credit cards … ?) Fail safe : Each store has a standby generator, UPS and battery backup emergency lighting

CSE1720 Semester week12 / 56 Coles Myer Ltd Prices are maintained in 2 databases Each store has a price look up local database Each Point of Sale unit has a copy of the database prices in case the unit has to operate on a stand-alone basis

CSE1720 Semester week12 / 57 Coles Myer Ltd Price changes are maintained in a central database (Coles System Reference), and this is sent to all stores once a week via communications. Individual stores use this new data to update item shelf prices (and of course for customer purchases)

CSE1720 Semester week12 / 58 Coles Myer Ltd Store devices –Point of Sale –Client –Point of Sale Server –Back Office Servers are Pentium PC’s running on Windows NT Central Processing is on Alpha Mainframes (as is Oracle here at Monash)

CSE1720 Semester week12 / 59 Coles Myer Ltd The retail stores are divided – into State operations – then 2 geographic regions within each State except South Australia and Tasmania – then into areas of 6 to 10 stores

CSE1720 Semester week12 / 60 Coles Myer Ltd State Operations Victoria New South Wales West Australia …… Region 1 Region 2 S1 S2 S3 S4 S5 ……. S10

CSE1720 Semester week12 / 61 Coles Myer Ltd Information ? Hourly sales Customer counts are available in all stores Customer Resource Management ? Yes. Captured at Point of Sale Numerically via transactions Quantitatively via the Fly Buys program (Coles + NAB Shell + Qantas/Ansett)

CSE1720 Semester week12 / 62 Coles Myer Ltd Seasonal variations in Items Soups and chocolate biscuits are in demand during the cooler months Fruit juices, frozen drink demand drops off in the same period Item popularity Management of ‘popular’ items - these are determined by the customers - and reported to the store manager. Success items stay ‘on show’ - less successful or non successful items are withdrawn - replaced by new lines

CSE1720 Semester week12 / 63 Coles Myer Ltd There are also ‘promotions’ and special analyses are made of the item performance during the promotion and for some time after the promotion. Item Procurement: Item suppliers are generally locally based, but may also be part of an International Business (can you think of one ?) Suppliers are required to respond to tenders. A supplier might provide many items (fruit juices, butter, meat, vegetables) and there can be ‘specialist’ suppliers - for instance organic products, health products.

CSE1720 Semester week12 / 64 Coles Myer Ltd Operator Training There are State Training Centres (off site from the stores) Casual or part time staff are given on-site training, and are supervised during and for a short period after training. Each operator has a set range of functions which they can use. Special or privileged function (reversals, error correction are handled by more senior staff who have higher level privileges). Coles Myer also have a Management Recruitment and Staff Progression Plan