Discuss a separation of duties and job rotation

Assignment Help Computer Engineering
Reference no: EM131722104

You are a local business owner, and you've recently hired a new General Manager (GM). The GM will be responsible for hiring, firing, and placing new employee's in their positions. After working with the new GM for a few weeks, you notice that the he does not like to delegate job duties to new employees. When you ask him about it, he says that he does not trust the employees enough to hand over these responsibilities to them yet. He decides to handle all the HR, payroll, and expense sheets himself. Is this a good idea?

In your discussion post:

Explain the differences between a separation of duties and job rotation. Why is separation of duties important? Why would you do job rotation?

What is the purpose of each? What does each prevent?

Using the public web (i.e., a search engine like Google or Bing), find an example of a security breach involving job rotation or separation of duties. Summarize the article you've found in a paragraph. Provide the link to the article for your peers.

List three (3) other security measures you can put in place. When you are commenting on your peers' posts, discuss their measures that they've listed. Do you think these are useful? What are the possible pros and cons of the security measures they've listed?

If you do not know anything about the topics being discussed, conduct some research and come back to the board. Remember to provide proper APA citation for any resources you use and make sure to include the source links. Remember to proofread and spell check your discussion contributions before posting.

Reference no: EM131722104

Questions Cloud

Check the validity of the given argument : No promises made under duress are enforceable contracts. Therefore, no unenforceable contracts are promises made in the absence of duress.
What combination of investments would you recommend : She has come to you to help her make a logical decision. What combination of investments would you recommend?
Is the promise enforceable : A few months later, Mr. Brown asks for the $50,000.00 and the architect firm refuses to pay. Is the promise enforceable?
How technology is affecting teaching in the traditional : Find and read an article written within the last 3 years on how technology is affecting teaching in the traditional classroom.
Discuss a separation of duties and job rotation : Explain the differences between a separation of duties and job rotation. Why is separation of duties important? Why would you do job rotation
Supply chain management at triangle : Explain how forecasting would be related to supply chain management at Triangle's North Carolina plants.
Define name the fallacy committed for given argument : All ladies of the night are individuals with low self-esteem. Therefore, no ladies of the night are individuals with high self-esteem.
Definition of assessment : Create a handout or make a video explaining the concept of assessment to the parent of a student.
Executing steps for a new endeavor : Describe tactical steps to get a business going. Who do you get involved in the planning & executing steps for a new endeavor?

Reviews

Write a Review

Computer Engineering Questions & Answers

  In short define asynchronous communications

express packet switching and the benefits of packet switching. What are examples of packet switching networks.

  Express and give an example of a web database.

Explain the difference between system design and system analysis.

  Why is analysis required and what are the tools involved in

why is analysis required and what are the tools involved in the spreadsheet analysis process? since this is a graded

  Which type of insider threat is the most threatening and why

Insider threats can be both intentional and unintentional. Which type of insider threat is the most threatening and why?

  Create a new project in bluej called assignment

Facebook now want to expand their software to include extra features. They need the software to be able to maintain large numbers of Friends and Stories. It must also include the ability to add Events and to classify Friends as best friends or close ..

  Assume f is a function

assume f is a function that returns the result of reversing the string of symbols given as its input, and g is a function that returns the concatenation of the two strings given as its input. If x is the string abcd, what is returned by g(f(x),x).

  Difference between lan or wan

What are the different sorts of network topologies used on a LAN or WAN?

  Design formulas or use the autosum function

You do not require to put in personal information or actual values if you do not wish, but you must include some data for each of the various categories and income and expense line items.

  How does the pmmu avoid need for vast number of descriptors

Why cannot the 68000 be used (in conjunction with the 68451 MMU) to design true virtual memory systems?

  What exactly did eckert and mauchley patent and why

What exactly did Eckert and Mauchley patent and why did the judge feel their system was based on Atanasoff's earlier work?

  Configuring a database

Configuring a Database

  Perform a swot analysis on the viability of upgrading to

you are a junior network administrator for wingtip toys a medium-sized toy manufacturing company with approximately 100

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd