Charge of security for organization

Assignment Help Basic Computer Science
Reference no: EM133117461

Users who see security as an obstacle or a nuisance are less likely to abide by security policies. Referred to as "resistance behavior," a Virginia Tech study found that even if people understand that a security breach can have severe consequences on an organization, that knowledge does not always make users accept and conform to security policy rules. Individuals may feel their competence challenged, which triggers a negative attitude toward security in general. Users may also view some security controls, such as scheduled password changes, as unnecessary interruptions. Security controls, such as a fingerprint scanner, that don't work consistently may make users feel overwhelmed and lead to mistrust of security controls or even overriding them.

If you were a professional in charge of security for an organization, what would you say to a user who believes they have the right to decide whether to participate in security measures?

In the same scenario, what kind of incentive do you think would encourage the user to participate?

Reference no: EM133117461

Questions Cloud

Planning approach in comparative approaches to program : What have you learned about ethical violations in research this week through the required reading and reading you have completed on your own?
Concepts of machine learning are applied in health care : Establish how concepts of machine learning are applied in health care. Support with examples.
Application of theoretical concepts to research : An Evaluation of the Theory: a description of the theory's weaknesses and how the metaparadigms are described in the theory.
Maintenance of Racial Harmony Act : Select the function that the Singapore government is operating and discuss the objectives of the Maintenance of Racial Harmony Act.
Charge of security for organization : If you were a professional in charge of security for an organization, what kind of incentive do you think would encourage the user to participate?
Vlans and wireless technologies : What wireless technologies do you anticipate becoming available in the future? How do you imagine that will affect you in your networking career?
Define the project management processes : Define the project management processes and project methodology and is the first piece of the project management plan.
President obama vs president trump cybersecurity strategy : President Obama's 2009 Cybersecurity Strategy versus President Trump's 2017 Cybersecurity Strategy
Compare two significant international laws : Research and compare two significant international laws that relate to the practice of information security.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Do you feel the benefits of cloud computing

Do you feel the benefits of cloud computing are worth the threats and vulnerabilities ?

  What is global warming

What is "global warming"? Is there general agreement (consensus) on what causes it? Please back up your comments with research (certainly beyond the textbook) and not platitudes or mantras?

  Activity of obtaining information resources

Information retrieval (IR) is the activity of obtaining information resources relevant to an information need from a collection of information resources. This activity plays an important role in data integration and data mining.

  Refrigerators per month but the companys

Cooling Tools Inc. is currently producing 1,072 of small refrigerators per month but the companys CEO plans to increase production at the rate of 7.09 percent

  Why institutions are reluctant to move their it to the cloud

Why institutions are reluctant to move their IT to the cloud. Consider specific industries like education, medicine, military, etc.

  Leveraged cloud computing technologies

Select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.

  Organization current structure and design

Analyze the relevance of the organization's current structure and design. Explain the leadership style(s) used within the organization.

  Why isdn failed to catch on as wan technology

What technologies are found in MANs? Which of the technologies listed in 8 and 9 can be used in MANs?

  Design a traffic policer

Use leaky bucket to design a traffic policer which can satisfy the following requirements: The long term average rate is r packets/second

  Describe the concept of the unary one-to-many relationship

How is a unary one-to-many relationship constructed in a relational database?

  Relationship between elasticity and total revenue

Does understanding the Relationship Between Elasticity and Total Revenue help you understand why some goods go on sale and others don't?

  How did you decide what price to charge for your services

How did you decide what price to charge for your services? Did you think the price was worth more than the effort you put into it?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd