Verified Document

Security Program Increasing Employee Participation Article Review

The greater the employee ownership and vested interest in a program's success, the greater the probability of its success. This emanates from a leader's choosing to endorse and actively support an information security program and show consistency of effort and focus to attain tis objectives (Madnick, 1978). A third critical success factors is the providing of periodic feedback as to the progress of the information security program. The ability to actively monitor an information security program's progress using analytics and metrics of performance will significantly increase the likelihood of continued support (Straub, Welke, 1998). As is the case with many change management initiatives, the use of analytics and metrics also provide feedback to the employees and leadership of an organization, reinforcing adoption to the information security program over time (Guttman, Herzog, 2005).

Conclusion

The basis of effective change management is predicated on giving employees the ability to attain autonomy of their jobs, along with providing a foundation of also gaining mastery...

These three factors of autonomy, mastery and purpose are very powerful catalyst of organizational change (Leavy, 2012). Leaders who can design information security programs to attain these objectives will drastically improve the likelihood of success.
References

D'Arcy, J., Hovav, a., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79-98,155,157.

Guttman, J.D., & Herzog, a.L. (2005). Rigorous automated network security management. International Journal of Information Security, 4(1-2), 29-29.

Leavy, B. (2012). Michael Beer - higher ambition leadership. Strategy & Leadership, 40(3), 5-11.

Madnick, S.E. (1978). Management policies and procedures needed for effective computer security. Sloan Management Review, 20(1), 61-61.

Straub, D.W., & Welke, R.J. (1998). Coping with systems risk: Security planning models for management decision making. MIS Quarterly, 22(4), 441-469.

Sources used in this document:
References

D'Arcy, J., Hovav, a., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach. Information Systems Research, 20(1), 79-98,155,157.

Guttman, J.D., & Herzog, a.L. (2005). Rigorous automated network security management. International Journal of Information Security, 4(1-2), 29-29.

Leavy, B. (2012). Michael Beer - higher ambition leadership. Strategy & Leadership, 40(3), 5-11.

Madnick, S.E. (1978). Management policies and procedures needed for effective computer security. Sloan Management Review, 20(1), 61-61.
Cite this Document:
Copy Bibliography Citation

Related Documents

Employee Stock Ownership
Words: 1130 Length: 4 Document Type: Research Paper

Employee Stock Ownership Programs Employee Stock Ownership Employee motivation practices have significantly developed in accordance with the developing needs of companies to have skilled employees performing better, and the needs of employees of improving their social standards. Motivation strategies are not limited to financial bonuses, but also provide stock ownership programs in the case of listed companies. Specialists in the field have identified such programs to have an important effect on employee

Employee Satisfaction and Productivity a Case Study Based on the...
Words: 12732 Length: 44 Document Type: Case Study

Employee Satisfaction And Productivity employee satisfaction and productivity ASTRACT Employee satisfaction directly links to organizational excellence and/or productivity. Maybe… Maybe not… Researchers regularly debate exactly what components contributing to employee satisfaction and the company's and/or organization's productivity. Similarly, employers and employees do not typically agree on the reason/s an employee stays committed to a company or what factors contribute to an employee's satisfaction with the company. During the mixed-method case study, the researcher focuses

Employee Motivation in a Pcba
Words: 17554 Length: 64 Document Type: Dissertation

Indeed, effective problem solving in these circumstances often requires high levels of creative collaboration (Richards, 2007a, p. 34). In recognition of this reality, employers consistently name the ability to work together creatively as a primary and crucial skill -- even though many organizations have created cultures that undercut individual and collective creativity. In order to solve this problem there is a need of a comprehensive review of the facility management

Motivation Employee Motivation Managers and Business Owners
Words: 3442 Length: 12 Document Type: Term Paper

Motivation Employee Motivation Managers and business owners know the importance of employee motivation to the success of their business. To that extent, they seek to understand it better for mutual success. Gateth R. Jones and Jennifer M. George, in their book entitled "Contemporary Management," define employee motivation as a combination of "psychological forces, which determine the direction" of an employee's behavior in an organization (Consador 2013)." They also describe it as an

Employee Theft and Relationship Between Pre-Employment Background...
Words: 5282 Length: 20 Document Type: Term Paper

relationship of employee theft and organizational objectives in Capstone. It has sources. Capstone Turbine Corporation, incorporated in 1988, is an organization that designs and creates turbines. They use the latest technology to create these turbines, as they are ones that are in demand for hybrid electric vehicles. Capstone Turbine Corporation develops, manufactures and markets microturbine technology, which is used in stationary distributed power generation applications. These include combined heat and power,

Thematic Analysis of Security Issues
Words: 20201 Length: 78 Document Type: Dissertation

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now