The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Request the attached filed be reviews and reworded. Each question has been answered just need it to be reworded
Â
Chapter 131. Why is leadership outlook on security critical to employee buy-in at all levels? Giveexamples to justify your position.Through the collective engagement in ‘communities of practice,’ or COP, different roles withinthe company converse and share their levels of understanding in an effort to expand the overallfield of knowledge within the organization. Such practice will aid leaders’ understanding on howdifferent sectors work and what their needs essentially are; this is crucial in accomplishing buy-in. For example, a COP meeting in which multiple employees discuss their various concerns withcompany leadership may provide an opportunity for leaders to explain how the latest securitythreats the company face also affect employee software systems at home. Moreover, he/she maythen provide effective tools and policies for thwarting these malicious activities. Playing anactive role in fostering a culture of security within the organization is another critical step leadersmay take in acquiring employee buy-in; installing a reward system based on achieving desiredbehavior could help in reinforcing these stated initiatives.4. What are the challenges to implementing security policies in an organization when theyhave not been in place previously? Give examples to support your position.As simple as having the employees implement the policies when they have not done so in thepast is challenging enough. Some initial challenges in implementing new security policiesinclude lack of employee awareness and training pertaining to security, risky employee behavior,and an overall deficiency in employee motivation. For instance, employees may express troubleoperating around a newly placed firewall or threat detection system because they are custom toengaging in risky behavior at work (such as accessing Facebook or so). Furthermore, employeesmight express resistance to significant changes in security policies if such measures change theform in which he/she works drastically, thus making for an uncomfortable transition. Forexample, an employee may be required to go through extra security protocols in order to evenstart the workday (such as maintaining and showing identification cards or providing afingerprint for system access). In these cases, accomplishing employee buy-in is crucial inensuring a smooth transition in policy.
Attachments: