Use Link Jucs.org Jucs 18 12 An Overview Of Current Abstract Essay

¶ … security is becoming one of the most important issues in many walks of life and in differing environments around the world. Data and information has become the new religion and its importance and security should be a top concern for organizations wishing to maintain a competitive advantage in their industry and markets. Understanding the issues associated with today's unique and collective world can help leadership units within companies to apply their information technology resources in the most effective, economic and efficient manner that fuses strategy and operations into a seamless flow of power and intent. The purpose of this paper is to examine the aforementioned topic by first describing the multicultural and multinational issues that are most pertinent in information security today. This essay will next address the issues and complexities that accompany organizations that has multiple directors and the problems that can arise in this situation. Finally this essay will address these issues and apply them to Stratified Custom Manufacturing (SCM) by developing an alternative structure to support the demands of new security initiatives that address these new and unfolding problems.

Cultural Issues in Information Security

Mellado & Rosado (2012) explained how it is inevitable that successful companies integrate technological change into their organizations...

...

They wrote " The permanent and global nature of security threats and the increasing complexity of IT infrastructures are currently leading organizations throughout the world to revise their approaches towards information security. Hiring the ICT's (Information and Communication Technologies) equivalent of military men, i.e. security technologists and white-hat hackers, and entrusting security to them is no longer sufficient, (p.1598).
Disorganization as an Information Technology Security Threat

The militarization of information technology is necessary due to the multicultural and multinational influences the markets have succumbed to in recent times. Cultures fly in the face of everyone and everywhere consent is offered. Protection of national and cultural interests are often overlooked due to false ideals that have been perhaps mistakenly institutionalized through our places of learning and education. Regardless, the threat of new culture and multinational approaches must be regarded with caution and IT departments must become like soldiers in their defense of the valuable data and information contained in these organizations.

Devine (2009) suggested that "what you need is a high level security function which is seen as a benefit, as protecting the company from experiencing…

Sources Used in Documents:

References

Cases in Information Security: Law and Ethics. Eds. Michael E. Whitman and Herbert J. Mattord. Boston: Course Technology, 2011.

Devine, S, (2009). Complex Information Security Compliance for Multinational. Infosecurity Magazine, 19 Nov 2009. Retrieved from http://www.infosecurity-magazine.com/view/5347/complex-information-security-compliance-for-multinational

Mellado, D. & Rosado, D. (2012) An Overview of Current Information Systems Security Challenges and Innovations. Journal of Universal Computer Science, 2012 18(12); 1598:1607.


Cite this Document:

"Use Link Jucs Org Jucs 18 12 An Overview Of Current Abstract" (2013, October 28) Retrieved May 18, 2024, from
https://www.paperdue.com/essay/use-link-jucsorg-jucs-18-12-an-overview-125751

"Use Link Jucs Org Jucs 18 12 An Overview Of Current Abstract" 28 October 2013. Web.18 May. 2024. <
https://www.paperdue.com/essay/use-link-jucsorg-jucs-18-12-an-overview-125751>

"Use Link Jucs Org Jucs 18 12 An Overview Of Current Abstract", 28 October 2013, Accessed.18 May. 2024,
https://www.paperdue.com/essay/use-link-jucsorg-jucs-18-12-an-overview-125751

Related Documents

One of the major reasons for this vulnerability is the increased and widespread presence of these groups within the American home soil. As a result of the various operations in about 40 states in America, the sleeper cells are carefully planning and waiting for their next attacks. The second major reason for America's vulnerability to operations of sleeper cells is that the country's first-line defenders are neither adequately trained

S. Department of Energy). Q3. Discuss the internet of things and its likely consequences for developing an enforceable information assurance (IA) policy and implementing robust security architecture. The internet of things refers to the inevitable connectedness of all things in all regions of the world through the internet. "The fact that there will be a global system of interconnected computer networks, sensors, actuators, and devices all using the internet protocol holds so

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Security Audit for FX Hospital EHR/EMR Systems The study carries out the security audits for the FX Hospital EHR/EMR information systems to identify the vulnerabilities in the systems. The study uses the BackTrack as an auditing tool to penetrate the website, and outcomes of the auditing reveal that the website is not secure and can be subject to different vulnerabilities. After carrying out the auditing, the study is able to collect

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is