Wednesday, May 6, 2020

Case Study of Academics for Academics-Free-Samples for Students

Question: Discuss about the Case Study of Academics for Academics. Answer: Unethical consideration of workplace conditions in A4A Consequences of exposing unethical behavior If any member is found handling the information of the students very casually, first he would be given a warning. If he modifies himself, then he would be provided with an external assistance in forwarding the information posted by the student to the management. This would include the assurance regarding solving the query of the student in an efficient and effective manner. On the contrary, if it is found that the member has adopted some wrong means, which has stalled the transmission of the content of the students to the manager, the member would be expelled from the job (Pathan 2016). Not only this, he would be compelled to provide the student with monetary compensation for the loss, damages and lost honor and respect. This would add meaning to the rationale behind the clients and students investments in the company services. Developing policies for unethical approach These policies would be effective only if the personnel expose rational approach towards its formation. For the achievement of positive results, the personnel need to make plans. Mere making plans would not yield positive results. After making the plans, they need to be evaluated in terms of assuring that the personnel are progressing on the right track. Absence of this evaluation would prove harmful for A4A personnel in terms of beautifying the future of the students and clients (Zammani and Razali 2016). This strategic approach would secure the market position of the company in the competitive ambience. This ambience is needed, as it is a startu External assistance Assistance of the law officials would be crucial in terms of providing justice to the students and clients, especially the non-natives. This is because they are unacquainted with the system and operations of the company. Along with this, in terms of handling these matters, skilled and professional experts are needed. Experimentation with the limited knowledge would be difficult for the company personnel to tackle the matters in an efficient and effective manner. Along with this, maintenance of stable relationship with government law officials would be an added assistance of the company in terms of safeguarding the personnel from the scandals (Nancylia et al. 2014). Herein lays the importance of legislations, which would help the company to add value to developed policies. Non-compliance with the legislations and the workplace standards would compel the personnel to encounter customer turnover, which would take the revenue and profit margin and revenue of the company to an utter loss. This loss would add vulnerability to the market position of the company. The aspects highlighted in the above paragraphs bring the aspect of unethical consideration into the discussion. Along with this, these aspects also contradict the inner essence of the term management as mentioned in the variable of the topic. Attachment of the concept of security in this context snatches away the assurance from the students and the clients of A4A in terms of maintaining the safety, security and privacy of their personal data and information (Ifinedo 2014) References Agrawal, V., 2017. A Comparative Study on Information Security Risk Analysis Methods.JCP,12(1), pp.57-67. Bamakan, S.M.H. and Dehghanimohammadabadi, M., 2015. A Weighted monte carlo simulation approach to risk assessment of information security management system.International Journal of Enterprise Information Systems (IJEIS),11(4), pp.63-78. Cavusoglu, H., Cavusoglu, H., Son, J.Y. and Benbasat, I., 2015. Institutional pressures in security management: Direct and indirect influences on organizational investment in information security control resources.Information management,52(4), pp.385-400. Choi, M. and Lee, C., 2015. Information security management as a bridge in cloud systems from private to public organizations.Sustainability,7(9), pp.12032-12051. Cholez, H. and Girard, F., 2014. Maturity assessment and process improvement for information security management in small and medium enterprises.Journal of Software: Evolution and Process,26(5), pp.496-503. Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013. Future directions for behavioral information security research.computers security,32, pp.90-101. Fenz, S., Heurix, J., Neubauer, T. and Pechstein, F., 2014. Current challenges in information security risk management.Information Management Computer Security,22(5), pp.410-430. Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2014, June. Game theory meets information security management. InIFIP International Information Security Conference(pp. 15-29). Springer, Berlin, Heidelberg. Goo, J., Yim, M.S. and Kim, D.J., 2014. A path to successful management of employee security compliance: An empirical study of information security climate.IEEE Transactions on Professional Communication,57(4), pp.286-308. Ifinedo, P., 2014. Information systems security policy compliance: An empirical study of the effects of socialisation, influence, and cognition.Information Management,51(1), pp.69-79. Kang, H.S., 2014. An analysis of information security management system and certification standard for information security.Journal of Security Engineering,11(6), pp.445-468. Lin, G.T., Lin, C.C., Chou, C.J. and Lee, Y.C., 2014. Fuzzy Modeling for Information Security Management Issues in Cloud Computing.International Journal of Fuzzy Systems,16(4). Nancylia, M., Mudjtabar, E.K., Sutikno, S. and Rosmansyah, Y., 2014, October. The measurement design of information security management system. InTelecommunication Systems Services and Applications (TSSA), 2014 8th International Conference on(pp. 1-5). IEEE. Ortmeier, P.J., 2017.Introduction to Security. Pearson. Park, J.H., Yi, K.J. and Jeong, Y.S., 2014. An enhanced smartphone security model based on information security management system (ISMS).Electronic Commerce Research,14(3), pp.321-348. Pathan, A.S.K. ed., 2016.Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press. Peltier, T.R., 2013.Information security fundamentals. CRC Press. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees adherence to information security policies: An exploratory field study.Information management,51(2), pp.217-224. Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review.International Journal of Information Management,36(2), pp.215-225. Tot, L., Grubor, G. and Marta, T., 2015. Introducing the Information Security Management System in Cloud Computing Environment.Acta Polytechnica Hungarica,12(3), pp.147-166. Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security.computers security,38, pp.97-102. Whitman, M. and Mattord, H., 2013.Management of information security. Nelson Education. Yang, Y.P.O., Shieh, H.M. and Tzeng, G.H., 2013. A VIKOR technique based on DEMATEL and ANP for information security risk control assessment.Information Sciences,232, pp.482-500. Zammani, M. and Razali, R., 2016. An empirical study of information security management success factors.International Journal on Advanced Science, Engineering and Information Technology,6(6), pp.904-913.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.