Modernization Theory
Support managers, involve stakeholders, address resistance, celebrate victories and define the objective
Give focus and support to individuals involved in the change
Know the needs of all stakeholders
Start at the top
Change has to be implemented correctly and follow a process so as not to stall or be met with resistance (Schantz, 2018)
Change is required
Organizational Change
IT workers have to be more involved in making computers and networks safer for users
Anyone who uses the Internet is at risk of being hacked
Health care providers, IT workers, administrators, patients and all stakeholders have to be more aware of the cybersecurity risks attendant the use of multiple
medical devices (Shindell, 2018)
Medical devices can be hacked
(Anderson & Williams, 2018)Part I: Concept Map
Cybersecurity
Part II: Explaining the Concept Map
The Relationship of Parts
Cybersecurity, Organizational Change and Modernization Theory
As the concept map shows, cybersecurity, organizational change and Rostow’s modernization theory are all interrelated and flow into and out of one another. In fact, each depends on the other to make sense. Cybersecurity explains the goal of organizational change and yet without the concept of cybersecurity there would be no reason for organizational change: the relationship between the two is thus symbiotic. Modernization theory likewise informs both because it supplies the rationale for both cybersecurity and organizational change, while both simultaneously inform modernization theory as they are what make it possible for the strategies to be discovered to make modernization possible in the first place.
Cybersecurity. Cybersecurity is further developed into parts based on what computers can do and why cybersecurity is needed. The concept map defines these parts as four:
1) people use the Internet with the aid of computers,
2) medical personnel use devices that communicate with one another (Anderson and Williams, 2018),
3) medical personnel and computer users (including IT workers) have to be aware of the threats to cybersecurity and be informed on ways to make users safer (Shindell, 2018), and
Following from these points are the steps that are to be adhered to when conducting organizational change:
1) Change has to start at the top—i.e., with the executives running the organization so that they are aware of what’s needed, why and how to support the change process
2) Change cannot take place without first knowing the needs and viewpoints of all stakeholders—otherwise they might throw up an obstacle to change in the form of resistance that change managers did foresee
3) Individuals within the change process have to be the focus, as they are the ones who will be implementing the change—therefore, it is critical that they receive the necessary support from those above them
4) Managers have to be supported from above as well—i.e., the executives at the top—so that they can lead effectively
5) The change management plan should have procedures in place for dealing with the potential of resistance
6) Victories should be celebrated, no matter how small, so as to ensure that morale is boosted along the way
7) Stakeholders have to be involved in on-going discussions and dialogues so that that process is not hindered by surprise objections from stakeholders who do not like what is going on
8) The ultimate objective has to be defined for all so that everyone knows what the point and purpose of the change is
This last point in the process is crucial and helps to explain why education is so critical in any change management process. The understanding that is obtained in the cybersecurity section of the concept map has to translate into understanding…
References
Anderson, S., & Williams, T. (2018). Cybersecurity and medical devices: Are the ISO/IEC 80001-2-2 technical controls up to the challenge?. Computer Standards & Interfaces, 56, 134-143.
Bass, B. M. (1999). Two decades of research and development in transformational leadership. European journal of work and organizational psychology, 8(1), 9-32.
Dooley, K. J. (1997). A complex adaptive systems model of organization change. Nonlinear Dynamics, Psychology, and Life Sciences, 1(1), 69-97.
Schantz, J. (2018). How can leaders manage change successfully? HR.com, 8-9.
Shindell, R. (2018). Wearable devices: The next wave of cybercrime. Journal of AHIMA, 24-27.
Ten, C. W., Manimaran, G., & Liu, C. C. (2010). Cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 40(4), 853-865.
Southwest AirlinesTable of ContentsAbstract 1Introduction 1Organizational Setting 2Integration of Chapter Concepts to the Organizational Setting 3Controlling Service Quality 3Biblical Justification 3Customer Value 3Biblical Justification 4Lean Management 4Biblical Justification 4Supplier Management 5Biblical Justification 5Customer Relationship Management (CRM) 5Biblical Justification 6Balanced Scorecard 6Biblical Justification 6Strategy Map 6Biblical Justification 7Process Control 7Biblical Justification 7Conclusion 7References 8Appendices 9Strategic Analysis Data 9Environmental Scan 9SWOT Analysis 9Strategic Issues 9Operating Plan 9Communication of Plan 10AbstractThis paper provides
Solving the 1D Bin Packing Problem Using a Parallel Genetic Algorithm: A Benchmark Test The past few decades have witnessed the introduction in a wide range of technological innovations that have had an enormous impact on consumers, businesses and governmental agencies. Computer-based applications in particular have been key in facilitating the delivery of a wide range of services and information, and computer processing speeds have consistently increased incrementally. Computer processing speeds,
Small Business' Need for a CPA One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper for a small trucking firm in Birmingham, Alabama, wishes she had never heard of Ralph Summerford, CPA. Because of his thoroughness, Denise is facing several years in prison
Social Networks and Computer Ethics For the past 20 years, there have been many changes caused by the internet on many aspects of the contemporary life. The internet is growing rapidly. As of 2006, it was recorded that the number of internet users was about four million. For a long time, there have been promises made on how internet changes will positively impact people worldwide. These promises have reached many people
Big Data and the GovernmentIntroductionIn recent years, there has been an explosion of data generated by disparate sources, including social media, financial transactions, and sensor networks. This so-called Big Data has the potential to transform the way in which governmental agencies operate. For example, the Department of Homeland Security (DHS) has used Big Data to thwart terrorist attacks, by mining social media for suspicious activity. The Department of Health and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now