Sunday, June 21, 2020

Describe Information Security Training and Awareness - 14300 Words

Describe Information Security Training and Awareness (Other (Not Listed) Sample) Content: Comp Exam First Report IntroductionInitially, it is imperative to state that quantifiable study is allied to positive prototype. However, it could be explained further that quantitative study comprises of collection of raw data and consequent conversion of statistical information into mathematical form that enables ease of statistical analysis and conversely drawing an explorative conclusions. Moreover, determination and manipulation of statistical data require comparison of quantitative analysis methods between Structural Equation Modeling and Regression Analysis would be used to analyse how inadequate employee training can compromise valuable information in an organization. However, the process of research will have one or more hypotheses especially regarding questions to be addressed; for example, the predictions about perceived relationships. The process would enhance disparities and comparison of variables. But, in order to ensure the integrity and reliability of the study, it would explore distinct questions through the use of various instruments and materials like observation check lists and computer tests, in addition to a clearly defined plan of action (Finger, 2007). Importance of Information Security Training and AwarenessWith regard to organization, information security could only be enhanced through effective training, which is not simple task. As such, employees within an organization need to explore challenging tasks (Aloise, 2010). But, unless there is effective training on how effective information system could be handled, it would me more or less useless to waste resources to train. When one or many of the employees is/are unable to maintain high confidentiality of information, organization risks exhibiting information mishandling or inappropriate use of information by unauthorized persons (Tipton Krause, 2008). Such organization is likely to be noncompliant of highly growing number of legal implications that necessitate adopt ion of specific level of privacy and data security. Other valuable assets and organizational corporate reputation are likely to be compromised (Vacca, 2012).Moreover, when initiating change, it is imperative to state that not every employee or members of management team would embrace similar ideology (Tipton Krause, 2008). To some extent, some of the incompetent employees/ personnel would feel as is the process of initiative information system is to render their services obsolete since they are not able to cope with change, while others would view it with positivity since organization would be at stake without enhancing stringent security measures to safeguard data and information system (Aloise, 2010). The process of analyzing how inadequate training of employees could compromise valuable information within an organization require numeric dataset hence the need to adopt quantitative analysis methods and techniques (Vacca, 2012). Moreover, the analyses are based on levels of resear ch validity, reliability and also considering information bias so that an all-inclusive approach may be adopted to deliver comprehensive outcome on how organizational information could be secured to enhance high productivity and effective work culture (Aloise, 2010).An organization should brainstorm on several factors before engaging in quantitative data analysis; for example, there should be explicit understanding of how organization communicate its policies to personnel, how the trainings are conducted, methods adopted by organization in communicating the training resources, whether the organization is concerned with verification of desired results from training sessions or not (Vacca, 2012). In other words, it calls for in-depth understanding of whether organization updates its education programs as a routine culture to effectively improve in getting the right output and communication from the personnel (Aloise, 2010; Vacca, 2012). Training should also consider and integrate work ethics and compliance ethics between the employees and management, which implies that both staff and management should undergo and put into practice similar educational message being staff of the same institution (Aloise, 2010). This could enhance customer trust and satisfaction as a result of due diligence, accountability, and compliance with published policies within the organization leading accomplishment of targeted benchmarks (Tipton Krause, 2008). Sentences Data will be collected through respective processes and procedure that could effectively be integrated in statistical analysis. However, data collection process would be conducted through stylish SCP (statistical computer packages) like SPSS (Hoyle, 2014). Moreover, analysis will determine the extent to which IT and management practices impact organizational practices (Mueller, 2012). There would research variables which conversely varies with research process adopted. This could be a simple association (e.g. the IT syste m in place). However, statistical analysis will explore complex relationships and also determine the extent one variable influences another. In accomplishing the task, research will explore and discuss issues related to sampling, data validity, reliability, and bias respectively (Hoyle, 2014).Objectivity of the research is very important in quantitative research. Consequently, it will explore employee and managements attitude towards training to affirm that inadequate training could compromise IT system (Fox, 1997). However, in some cases, adopting IT training may change the employee or management approach to common problems that necessitated the integration of new system making the participants to derive negative attitude towards the management practices (Mueller, 2012). Moreover, this could also necessitate adoption of critical approach to examining appropriate methods of implementing the system leading to distinct conclusions that underscores any exhibited bias. Besides, research will ensure measure what claims about whether IT systems have positive impact on management in organizational setup (Ryan, 2008). There would be clear understanding of the kind of IT system in place and what the system mean to the management fraternity in organization. Hence this approach has to be considered especially in preparing and controlling IT systems (Fox, 1997; Mueller, 2012). External factors, which might affect the results like employees level of acquaintance with IT, should also be recognized as an important factor in ensuring that information management system (IT system) is not accompanied by other changes that might adversely affect the organization (Fox, 1997). Moreover, it could be stated that key emphasis within quantitative study is based on rational perception; this is believed to adopt a tend aimed at moving from general to specific IS (information system) considerations regarding the study topic, which at times could be regarded as a top-down approach. But, it is somewhat that the legitimacy of conclusions would however, be illustrated based on numerous considerations within the organization. Thus affirming prior statements, findings or conditions as being valid (Hoyle, 2014). According to Fox (1997), researchers seldom access other processes within distinct groups (e.g. employees with IT skills, and managers who embrace integration of IT systems in enhancing the integrity of valuable information (Hoyle, 2014). This creates the need to derive the in-depth meaning of Reliability, which could be described as an extent to which require stable set of variables that it is anticipated to quantify. Moreover, if numerous dimensions are adopted in deriving reliability, then it would effectively be dependable in affirming respective research values.The comprehensive examination will entail comparative analysis of two quantitative analysis regarding effects of inadequate training on valuable organizational information (Ryan, 2008). In contrast, it will explore a more effective quantitative analysis which could be adopted in analyzing e real life situation as far as Information technology is concerned in an organization. In furtherance, the paper will somewhat explore issues of sampling, validity, reliability and bias as far as quantitative data analysis processes are concerned (Hoyle, 2014).Quantitative MethodsThere is a growing interest in adoption and use of Structured Equation Modeling (SEM) techniques in regard to adoption and use of information system within organizations. In furtherance, it is important to compare between two SEM and derive a conclusion in order to derive in-depth understanding of Structured Equation Model techniques (Mueller, 2012). This enhance better understanding on realization of when to use SEM. Moreover, in understanding the level and extent to which SEM methods could be implemented in information system research; similar dataset would be analyzed and compared in two classes (Ryan, 2008). In t his case, there would be discussion on linear regression models so that an explicit understanding would be realized on when to use either linear regression model of structured equation techniques in analyzing quantitative data. Leading to conclusion on best approach to take in analyzing how insufficient employee training can compromise valuable information (Mueller, 2012).Structured Equation Modeling (SEM) TechniquesThis is an integration of techniques like PLS (partial Least Squares) and LISREL1 which could often be referred to as SGM (second generation models) of analyzing data (Hoyle, 2014; Mueller, 2012). Moreover, these two techniques are affirmed to be effective in testing the extent to which information technology system research that meets distinct and recognized standards in high quality statistical analysis. It implies that the techniques could be used for statistical inclusion validity (Fox, 1997). However, SEM in contra...