The greater the employee ownership and vested interest in a program's success, the greater the probability of its success. This emanates from a leader's choosing to endorse and actively support an information security program and show consistency of effort and focus to attain tis objectives (Madnick, 1978).
A third critical success factors is the providing of periodic feedback as to the progress of the information security program. The ability to actively monitor an information security program's progress using analytics and metrics of performance will significantly increase the likelihood of continued support (Straub, Welke, 1998). As is the case with many change management initiatives, the use of analytics and metrics also provide feedback to the employees and leadership of an organization, reinforcing adoption to the information security program over time (Guttman, Herzog, 2005).
Conclusion
The basis of effective change management is predicated on giving employees the ability to attain autonomy of their jobs, along with providing a foundation of also gaining mastery...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now