Nobody downloaded yet

The relation between IM, Information Security and HRM - Essay Example

Comments (1) Cite this document
The paper emphasizes the involvement of the top management in making information security an important part of the organization culture, need to establish a clear and effective information security policy and guidelines for employees…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
The relation between IM, Information Security and HRM
Read TextPreview

Extract of sample
"The relation between IM, Information Security and HRM"

Download file to see previous pages Software assurance is another aspect of information security. Software vulnerabilities can jeopardize intellectual property, consumer trust, business operations and services, thus the use of any software by the organization has to be in conjunction with the information security department, and these among others are some of the key roles information security plays in the safeguard of information in the Human resource departments. The paper also emphasizes the involvement of the top management in making information security an important part of the organization culture, need to establish a clear and effective information security policy and guidelines for employees. The absence of information security measures not only lead to theft, but the organization could suffer damage with minimal legal redress against the individuals concerned. In the end the paper discusses the need for an accurate measurement system and a continuous improvement policy to ensure the organization is abreast with the dynamic nature of the issue and is prepared to meet newer security concerns. Introduction Information management is a very vast concept; it includes a cycle of processes that supports firm’s learning activity by identifying, organizing, storing, processing and acquiring information (Choo, 1995). Information is one the most fundamental resources of an organization, one that needs to be managed like any other resource, like plant, equipment or people.  Forward-looking companies consider information as a strategic asset that can be leveraged into a competitive advantage in the markets served by the company (Karim & Hussein, 2008). Information, being such an important resource in an organization,...
The paper affirm that the value of a firm’s investment in information security can be measured by examining the stock market investor’s behaviours towards firms IT security investment announcements. In examining the current business environment and the risks associated with it, it is important to include the role of Internet. The internet is one of the most critical infrastructures of a modern business. Firms have to take into account the broader picture when it comes to information security. Management of information in an effective manner is the only way to secure information. Board involvement is an absolutely critical issue and the top management should always play an active role in the formulation of the information security policy. Most of the times, the board members are not up to speed with the technology systems being used in the organization and what kind of attacks the company is vulnerable to. The board needs to be updated on the information security systems at least on a quarterly basis so that adequate measures can be taken to upgrade the systems, with the fast changing technologies; it has become imperative to remain in constant touch with the risks that the changing technological environment possesses. Comprehensive information security policies are well written, responsibilities are assigned and roles well outlined. Human resource department is responsible for managing human capital of an organization. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“The relation between IM, Information Security and HRM Essay”, n.d.)
Retrieved de
(The Relation Between IM, Information Security and HRM Essay)
“The Relation Between IM, Information Security and HRM Essay”, n.d.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
jonesrozella added comment 6 months ago
Student rated this paper as
This essay was always my weak point. I could never complete it successfully. Still, after I found this precise document, I understood how it should be done. So, I performed my research afterward and completed the essay in several hours, instead of months as it was previously.
Information Security
...and internal controls to make certain that the integrity and privacy of data and operation procedures are achieved in an organization. Accessibility of the information is as well vital to the organization. If the integrity of the information is confidential, but if it is not obtainable to formal users, it would be of no use. Security to enterprise resource planning (ERP) system needs to be administered by the similar ideologies as conservative information security. All the business related information of an organization is controlled through an ERP system. Moreover information relating...
12 Pages(3000 words)Essay
Information Security
...its business activities. The progress in the field of information technology has been favorable because it has brought various benefits for the users all around the world. However, along with many significant benefits, the advancement in information technology has also created various issues related to the security of computer networks. These network-related issues need to be tackled properly in order to make the internet world safe and secure. Literature Review regarding Current State of Network Security Kaminsky (2010) asserts, “Network security comprises the measures a company takes to protect its...
5 Pages(1250 words)Research Paper
Information Security
...assortments to merely the information needed intended for their legal practice. Moreover, the users of information security management should not reveal confidential information to illegal persons lacking a legal business motive intended for access to that particular information. State plus federal acts, laws and policies offer standards used for the sharing of diverse types of information related to the business critical areas (Sipior & Ward, 2008), (Northern Illinois University, 2007) and (Grimaila, 2004). Information Utilization: The utilization of constrained information intended for...
10 Pages(2500 words)Essay
Information Security
...? Need for Information Security Introduction The intervention of technology has increased competition for organizations since communication has broken geographical barriers and has transformed the world into a global village. The increasing competition makes it vital for all types of organizations to be equipped with information and data about their customers, market trends, consumer behavior etc. However, the possession of complete information is considered to be an incomplete victory if it is not protected in an effective manner against prevailing threats and vulnerabilities. Lack of awareness and execution to protect company’s information assets can...
3 Pages(750 words)Research Paper
Information Security
...? Information Security in Small Business Firms Information Security in Small Business Firms Introduction The explosive growth of internet has added to the efficiency and convenience of modern business operations. However, a wide variety of information security threats, particularly computer hacking raises potential challenges to keeping and transferring information securely over the internet. Even a small business organization needs to deal with huge volume of confidential and sensitive information. Evidently, unauthorized access to such information would hurt the...
3 Pages(750 words)Research Proposal
Information Security
...? Information Security INFORMATION SECURITY Following the anti-virus up from McAfee that affected computers running Windows XPinternationally, the company made an official announcement, contending that a very small percentage of their clients had been affected. The apology was initially given by a spokesman for the company, and it was him who claimed that only less than 0.5% of their clients had been affected by the erroneous update (Harkins, 2013). This was the wrong person to have come out with such an apology, and it seemed that McAfee realized it. The next morning, Barry McPherson, their EVP, released a statement that was well phrased, but still unapologetic. Again,...
3 Pages(750 words)Essay
Information Security
...should strike a balance between information security and information sclerosis and what professional competencies ought to oversee information security policies, procedures, and practices. Striking a Balance: An Incremental Approach to Information Security As an initial matter, it should be noted that information security can be neglected by business organizations (National Institute of Standards and Technology, 1998) as well be over-hyped and made far too complex for complete use (Angus, 2005; Miller, 2005). The most prudent course of action, to be sure, is neither...
4 Pages(1000 words)Essay
Information Security
...Information Security Graciela Campbell MGT327 Dr Angelia Williams  September 7, Information Security (Information security components, 2009) Nagarajan (n.d) has mentioned that credit card information of 40 million customers stolen till now and BPO scams can happen anywhere in the world. Moreover he also pointed out that “European companies to splurge on BPO services “Spend on financial services` Back office, procurement& customer care to rise to $ 35 billion by 2011” (Nagarajan n.d, p.1). The above information point towards the huge dimensions of the information security related problems we are facing now. The term Information security refers to the protection of information and information systems from unauthorized access. Based... ...
6 Pages(1500 words)Term Paper
Information Security
...with healthcare so, because of its nature of work it needs to store a lot of information regarding healthcare, finance and similar other numerous sensitive information. Thus, it becomes must for an organization to safeguard and make certain about the security of all the stored data. The intention of the policy in relation to information security is to defend the privacy, dependability and ease of admission of the systems as well as the information’s (CMS, 2006). Ensuring the Effectiveness of the Information Security Policies The organization OUMC Edmond checks with the...
2 Pages(500 words)Essay
Information Security
...Information Security White Paper (Section) Due) Information plays a very important role in the decision makingprocess within a business organization irrespective of the organization’s size. Information is increasingly acquiring central role in business given the repercussions associated with incorrect information or lack thereof. Information theft posses a great danger to small businesses as well corporations such as profit losses, damage to reputation besides the costs associated with litigations. It is a key parameter affecting business risk. Information security is therefore imperative for business...
3 Pages(750 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic The relation between IM, Information Security and HRM for FREE!
Contact Us