What kind of incentive do think would encourage the user

Assignment Help Basic Computer Science
Reference no: EM132883603 , Length: 2

Users who see security as an obstacle or a nuisance are less likely to abide by security policies. Referred to as "resistance behavior," a Virginia Tech study found that even if people understand that a security breach can have severe consequences on an organization, that knowledge does not always make users accept and conform to security policy rules. Individuals may feel their competence challenged, which triggers a negative attitude toward security in general. Users may also view some security controls, such as scheduled password changes, as unnecessary interruptions. Security controls, such as a fingerprint scanner, that don't work consistently may make users feel overwhelmed and lead to mistrust of security controls or even overriding them.

Answer the following question(s):

Question 1: If you were a professional in charge of security for an organization, what would you say to a user who believes they have the right to decide whether to participate in security measures?

Question 2: In the same scenario, what kind of incentive do you think would encourage the user to participate?

  • Need 2 pages with apa style and no plagirism.

Reference no: EM132883603

Questions Cloud

Analyze the history of caesar cypher : Analyze the history of Caesar Cypher and its impact on cryptography. You must use at least one scholarly resource. Every discussion posting must be
Find the gross margin for Pacific for the latest quarter : Assume that direct labour is a variable cost and that there was no beginning or ending inventories. Find the gross margin for Pacific for the latest quarter
Technology and enterprise resource planning : As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity.
Definition of the catechism and vatican ii on marriage : -Re-read the definition of the Catechism and Vatican II on Marriage. Find the word that binds their similarities on marriage.
What kind of incentive do think would encourage the user : If you were a professional in charge, What would you say to a user who believes they have the right to decide whether to participate in security measures?
How is physical security related to security : How is physical security related to security? Are there connections to Information Security? How does it related to cybersecurity?
Big data analytics can be used with smart cities : This reading centered around how Big Data analytics can be used with Smart Cities.
Determine the amount of goodwill or gain on bargain purchase : Determine the amount of goodwill or gain on bargain purchase that should be recognized if the non- controlling interest is measured on a fair value basis
How can best convey skills in working with a team : How can you best convey your skills in working with a team while maintaining your ethical boundaries? Research appropriate interview styles

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Goal types and categories and goal model building

Compare and contrast behavioral goal and soft goals. Propose five functional goals and five non-functional goals.

  How you obtained cpt employment

Discussing how you obtained this CPT employment(Java Developer) as well as how this CPT employment is directly related to major area of study

  Incentives for the development of new technology

Why might private markets tend to provide too few incentives for the development of new technology? Give an example using the concepts of private and social

  Determine the maximum shore spacing

For the slab of Problem 12-3, assume that double 2 × 10 stringers spaced 5 ft-0 in. o.c. will support the joists. Determine the maximum shore spacing. Draw a sketch of the formwork. (Neglect shore capacity)

  Physical security of it infrastructure

When it comes to the physical security of an IT infrastructure, there are an almost unlimited number of possible physical threats,

  Benefits of applying formal methods at each one of levels

In Section 12.2.2, three different levels of formal methods have been introduced. Explain each one of these levels and discuss the costs and benefits of applying formal methods at each one of these levels.

  Write the equation of the line passing

1. Write the equation of the line passing through A (-1, -3) and parallel to the line 2x + 3y = 6 in slope intercept form.

  Failure of the others

Give examples of how failure of one security property (confidentiality/integrity/availability) can lead to the failure of the others.

  Create and destroy databases and database objects

The Data Definition Language (DDL) is used to create and destroy databases and database objects. These commands will primarily be used by database administrators during the setup and removal phases of a database project.

  Sql queries will produce a correct response

Formulate SQL queries for (a) and (b) with reference to the database specified for homework 2. Ensure that your SQL queries will produce a correct response for every instance of the database. a. List the employeeid and salary of those supervisors who..

  What does a financial statement

What does a financial statement tell a reader about an agency or government? How does this differ from an audit report?

  Economize by purchasing refurbished computers

A memo from an executive refusing a manager's proposal to economize by purchasing refurbished computers. The executive and the manager.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd