Question

In: Operations Management

Address the following questions on ISO standards on information security management and ethics. -Describe the Plan-Do-Check-Act...

Address the following questions on ISO standards on information security management and ethics.

-Describe the Plan-Do-Check-Act process.

-What does this process accomplish?

-Discuss the difference between law and ethics; Research the Sarbanes-Oxley Act of 2002 and discuss how it has impacted information security in an organization.

Solutions

Expert Solution

a) Plan-Do-Check-Act is a four step continous process for carying out a change in the project. The four steps in it can be explained below.

  1. Plan: Plan a change after recognizing an opportunity of improvement.
  2. Do: Test the change. Carry out a small-scale study.
  3. Check: Review the test, analyze the results, and identify what you’ve learned.
  4. Act: If the change did not meet the expected results then make suitable changes in the plan and if the change meet the results then apply that change in a wider area.

b) It is a process that is never ending and is aimed at continous improvement of people and processes. The whole process has a low risk as any planned change is first carried out on a smaller scale.PDCA supports the principles of Kaizen too. Kaizen also focusses on bringing out small and useful changes. The PDCA Cycle provides a framework and structure for identifying improvement opportunities and evaluating them objectively.


Related Solutions

Imagine that you are the Information Security Officer (ISO) of your organization. Develop a plan to...
Imagine that you are the Information Security Officer (ISO) of your organization. Develop a plan to conduct a Web application penetration test on your network. Identify and explain all steps necessary to successfully complete the test.
To what extent does Deming’s principle of Plan-Do-Check-Act resonates with leadership model in total quality management?...
To what extent does Deming’s principle of Plan-Do-Check-Act resonates with leadership model in total quality management? Present your ideas with practical emphasis in a corporate environment
Code of Ethics for Nurses website and related articles. Be sure to address the following questions:...
Code of Ethics for Nurses website and related articles. Be sure to address the following questions: What is this website about? Discuss several specific concepts that you just learned from this website. Are there things that you did know before you reviewed the website? What were they? Did your prior knowledge and what you discovered in your review align? Discuss those things that did or did not align.
Information Security Management. answer the following questions. 1-- Explain what this video is about. 2-- What...
Information Security Management. answer the following questions. 1-- Explain what this video is about. 2-- What is unauthorized data disclosure? 3—What are some of the ways that business information security can be threatened? 4—Why do you think the Department of Homeland Security is interested in Information Security for businesses?
2. How do warranties and guarantees act as signals? What economic information problem might they address?...
2. How do warranties and guarantees act as signals? What economic information problem might they address? (p. 457 #2)
2. How do warranties and guarantees act as signals? What economic information problem might they address?
2. How do warranties and guarantees act as signals? What economic information problem might they address?
The steps to creating an information security plan would be in which of the following sequences?...
The steps to creating an information security plan would be in which of the following sequences? Identify threats, identify risks, design controls, incorporate controls into an enterprise-wide plan, Set forth policies Set forth policy, design controls, identify risks, identify threats, incorporate controls into an enterprise-wide plan
1. List and describe the extended characteristics (Six Ps) of information security management.
1. List and describe the extended characteristics (Six Ps) of information security management.
Address one of the following questions in the discussion. Choice one: Describe each of the four...
Address one of the following questions in the discussion. Choice one: Describe each of the four methods or approaches given in the Compensatory model used for final selection decisions. Then, in your own words, describe the pros and cons of each. Choice two: Describe the Multiple Hurdles predictor method of selection – What advantage do you see in this method compared to those given in the compensatory methods explained in your text?
Given the following information, answer the following questions for month 12 of this security -15 year...
Given the following information, answer the following questions for month 12 of this security -15 year FRMs, monthly payments -PSA 150 -4.5% mortgage rate, 0.5% servicing fee, 3.75% discount rate - Pool balance at the beginning of month 12: $75,946,124 - The loans were not seasoned before entering the pool C: What is the payment to investors in month 12? Round your answer to the nearest cent.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT