¶ … security is becoming one of the most important issues in many walks of life and in differing environments around the world. Data and information has become the new religion and its importance and security should be a top concern for organizations wishing to maintain a competitive advantage in their industry and markets. Understanding the...
Demystifying Abstract Writing An abstract represents a concise, well-articulated summary of an academic piece or research. But writing an abstract goes beyond merely creating a summary. In this piece, we'll delve into examples of abstracts to illuminate what they truly are, along...
¶ … security is becoming one of the most important issues in many walks of life and in differing environments around the world. Data and information has become the new religion and its importance and security should be a top concern for organizations wishing to maintain a competitive advantage in their industry and markets.
Understanding the issues associated with today's unique and collective world can help leadership units within companies to apply their information technology resources in the most effective, economic and efficient manner that fuses strategy and operations into a seamless flow of power and intent. The purpose of this paper is to examine the aforementioned topic by first describing the multicultural and multinational issues that are most pertinent in information security today.
This essay will next address the issues and complexities that accompany organizations that has multiple directors and the problems that can arise in this situation. Finally this essay will address these issues and apply them to Stratified Custom Manufacturing (SCM) by developing an alternative structure to support the demands of new security initiatives that address these new and unfolding problems.
Cultural Issues in Information Security Mellado & Rosado (2012) explained how it is inevitable that successful companies integrate technological change into their organizations by realizing its advantages and identifying the time and place for its application. They wrote " The permanent and global nature of security threats and the increasing complexity of IT infrastructures are currently leading organizations throughout the world to revise their approaches towards information security. Hiring the ICT's (Information and Communication Technologies) equivalent of military men, i.e.
security technologists and white-hat hackers, and entrusting security to them is no longer sufficient, (p.1598). Disorganization as an Information Technology Security Threat The militarization of information technology is necessary due to the multicultural and multinational influences the markets have succumbed to in recent times. Cultures fly in the face of everyone and everywhere consent is offered. Protection of national and cultural interests are often overlooked due to false ideals that have been perhaps mistakenly institutionalized through our places of learning and education.
Regardless, the threat of new culture and multinational approaches must be regarded with caution and IT departments must become like soldiers in their defense of the valuable data and information contained in these organizations. Devine (2009) suggested that "what you need is a high level security function which is seen as a benefit, as protecting the company from experiencing the problems, saving company time and defending the company image.
And that's starting to emerge -- seeing security as a proactive benefit." This great idea is only useful when a unified and leadership front has been developed within a company and clear and precise objectives are understood and readily communicated amongst key players within any IT department or larger organization. These challenges are most felt when a scattered leadership structure cannot effectively lead and direct operations according to policy and operationally procedure.
Security is most at risk when there is not an agreement on what is most important within the company. Unification through hierarchal models presents a military-style organizational structure that can best address security issues while presenting a unified command position to the rest of the company and its competitors. Organizational Structure For SCM Whitman & Mattord (2011) suggested that the "CIA" model that addresses confidentiality, integrity and availability should dictate the IT policies and strategies within a an organization wishing to create a competitive advantage within its industry.
The organizational structure of SCM should therefore reflect these principles as they most effectively address the issues with IT systems discussed previously. A military-style hierarchy consisting of sub-units with staffs allows SCM to maximize its resources and place a high emphasis on securing its precious data and information that is the key to its profits. The company should create organizational charts that explicitly.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.