Question

In: Operations Management

Discussion Questions: Employees are often one of the greatest challenges for enhancing information security in government....

Discussion Questions: Employees are often one of the greatest challenges for enhancing information security in government. What can public organizations do to increase employee awareness of information security?

Solutions

Expert Solution

It is true that the employees provide the largest variability and risk factor in various information security measures. Irrespective of the measures taken, if the employees do not cooperate or makes mistake then the whole endeavor of information security is defeated. This needs to be tackled by every organization.

The key to defeating this is identifying the underlying reason why employees often form the Achilles’ heel for information security measures. This is sometimes due to lack of understanding the gravity of the situation, sometimes it is due to mistake, sometimes it is due to lack of caring, and more.

In each of these cases, there are situations of negligence from the part of the employees. As a public organization such situations should be avoided. Hence the only way to achieve this is through several stages.

Firstly the organization needs to hire the right people. The employees’ attitude towards security, citizenship behavior and ethical reasoning should be strong. Next, the organization should focus on training employees and their sensitivities towards information security. Finally, these trainings and rehearsals should be repeated on a regular basis.


Related Solutions

Discussion Database Security and UML Often, systems have only one level of security when it comes...
Discussion Database Security and UML Often, systems have only one level of security when it comes to databases. Imagine that someone is trying to add a name (which should be composed only of letters) to a database. The user mistakenly hits a number, and the system rejects the entry. Such security can be implemented at the database management system (DBMS) or the application level. Where would you apply security? Justify your choice. What are some alternative practices or standards of...
Discussion questions: Florence Nightingale was one of nursing's greatest pioneers in holistic nursing using your Dossey...
Discussion questions: Florence Nightingale was one of nursing's greatest pioneers in holistic nursing using your Dossey book and readings: Compare and contrast the theories and principles of Florence Nightingale’s and Jean Watson’s work. Discuss their impact on the global field of Nursing. What attributes do I have that reflect the core values of holistic nursing? Give examples of environmental patterning. PLEASE USE CITATION IF USING IT.
Discussion questions: Florence Nightingale was one of nursing's greatest pioneers in holistic nursing using your Dossey...
Discussion questions: Florence Nightingale was one of nursing's greatest pioneers in holistic nursing using your Dossey book and readings: Compare and contrast the theories and principles of Florence Nightingale’s and Jean Watson’s work. Discuss their impact on the global field of Nursing. What attributes do I have that reflect the core values of holistic nursing? Give examples of environmental patterning. PLEASE USE CITATION IF USING IT.
a few Health Questions : 1. What do you believe are the greatest nutrition challenges for...
a few Health Questions : 1. What do you believe are the greatest nutrition challenges for pregnancy and lactation? 2. What is the order in which solid foods are introduced to an infant over the first year of life? 3. How do nutrient requirements change over time from childhood, through adolescence, adulthood, and older adulthood?
One of the greatest challenges the international financial manager faces is in understanding how to deal...
One of the greatest challenges the international financial manager faces is in understanding how to deal with international accounting differences. Discuss this contention explaining the nature of the challenge and the ways in which it can and should be dealt with. (600 WORDS)
In this discussion, you will select one of TSA’s 20 layers of security or one of...
In this discussion, you will select one of TSA’s 20 layers of security or one of the layers of security for General Aviation. In your opinion, how effective is it? Give one example of how this layer of security would work successfully. Give one example of how this layer of security would not work. DO NOT COPY FROM SOMEWHERE! TELL ME ONW YOUR WORD.
What are some HIPAA security and privacy rules training questions for the employees of a healthcare...
What are some HIPAA security and privacy rules training questions for the employees of a healthcare facility. Give me 20 questions and answeres.
Security and Network Discussion Questions a) Discuss the pros and cons of an organization regularly engaging...
Security and Network Discussion Questions a) Discuss the pros and cons of an organization regularly engaging in penetration testing. + b) What are the motivations of the ethical hacker?
Lesson One Discussion Question: People differ on the need for and role of the government. Government...
Lesson One Discussion Question: People differ on the need for and role of the government. Government is the legitimate use of force to control behavior. It is legitimate in that citizens have surrendered some rights willingly to government in exchange for the services provided by the government. The Preamble to the Constitution indicates the willingness of citizens to surrender to the government for the sake of common good (to establish justice, insure domestic tranquility and secure the blessing of liberty)....
Humans are the greatest threat to electronic health information. What are some of the threats to data security from people?
Humans are the greatest threat to electronic health information. What are some of the threats to data security from people?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT