Sign In
Not register? Register Now!
You are here: HomeOther (Not Listed)Technology
Pages:
26 pages/≈14300 words
Sources:
15 Sources
Level:
APA
Subject:
Technology
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Describe Information Security Training and Awareness (Other (Not Listed) Sample)

Instructions:

Information Security Training and Awareness
Initially, it is imperative to state that quantifiable study is allied to positive prototype. However, it could be explained further that quantitative study comprises of collection of raw data and consequent conversion of statistical information into mathematical form that enables ease of statistical analysis and conversely drawing an explorative conclusions.

source..
Content:

Comp Exam First Report
Introduction
Initially, it is imperative to state that quantifiable study is allied to positive prototype. However, it could be explained further that quantitative study comprises of collection of raw data and consequent conversion of statistical information into mathematical form that enables ease of statistical analysis and conversely drawing an explorative conclusions. Moreover, determination and manipulation of statistical data require comparison of quantitative analysis methods between Structural Equation Modeling and Regression Analysis would be used to analyse how inadequate employee training can compromise valuable information in an organization. However, the process of research will have one or more hypotheses especially regarding questions to be addressed; for example, the predictions about perceived relationships. The process would enhance disparities and comparison of variables. But, in order to ensure the integrity and reliability of the study, it would explore distinct questions through the use of various instruments and materials like observation check lists and computer tests, in addition to a clearly defined plan of action (Finger, 2007).
Importance of Information Security Training and Awareness
With regard to organization, information security could only be enhanced through effective training, which is not simple task. As such, employees within an organization need to explore challenging tasks (Aloise, 2010). But, unless there is effective training on how effective information system could be handled, it would me more or less useless to waste resources to train. When one or many of the employees is/are unable to maintain high confidentiality of information, organization risks exhibiting information mishandling or inappropriate use of information by unauthorized persons (Tipton & Krause, 2008). Such organization is likely to be noncompliant of highly growing number of legal implications that necessitate adoption of specific level of privacy and data security. Other valuable assets and organizational corporate reputation are likely to be compromised (Vacca, 2012).
Moreover, when initiating change, it is imperative to state that not every employee or members of management team would embrace similar ideology (Tipton & Krause, 2008). To some extent, some of the incompetent employees/ personnel would feel as is the process of initiative information system is to render their services obsolete since they are not able to cope with change, while others would view it with positivity since organization would be at stake without enhancing stringent security measures to safeguard data and information system (Aloise, 2010). The process of analyzing how inadequate training of employees could compromise valuable information within an organization require numeric dataset hence the need to adopt quantitative analysis methods and techniques (Vacca, 2012). Moreover, the analyses are based on levels of research validity, reliability and also considering information bias so that an all-inclusive approach may be adopted to deliver comprehensive outcome on how organizational information could be secured to enhance high productivity and effective work culture (Aloise, 2010).
An organization should brainstorm on several factors before engaging in quantitative data analysis; for example, there should be explicit understanding of how organization communicate its policies to personnel, how the trainings are conducted, methods adopted by organization in communicating the training resources, whether the organization is concerned with verification of desired results from training sessions or not (Vacca, 2012).
In other words, it calls for in-depth understanding of whether organization updates its education programs as a routine culture to effectively improve in getting the right output and communication from the personnel (Aloise, 2010; Vacca, 2012). Training should also consider and integrate work ethics and compliance ethics between the employees and management, which implies that both staff and management should undergo and put into practice similar educational message being staff of the same institution (Aloise, 2010). This could enhance customer trust and satisfaction as a result of due diligence, accountability, and compliance with published policies within the organization leading accomplishment of targeted benchmarks (Tipton & Krause, 2008). Sentences
Data will be collected through respective processes and procedure that could effectively be integrated in statistical analysis. However, data collection process would be conducted through stylish SCP (statistical computer packages) like SPSS (Hoyle, 2014). Moreover, analysis will determine the extent to which IT and management practices impact organizational practices (Mueller, 2012). There would research variables which conversely varies with research process adopted. This could be a simple association (e.g. the IT system in place). However, statistical analysis will explore complex relationships and also determine the extent one variable influences another. In accomplishing the task, research will explore and discuss issues related to sampling, data validity, reliability, and bias respectively (Hoyle, 2014).
Objectivity of the research is very important in quantitative research. Consequently, it will explore employee and management’s attitude towards training to affirm that inadequate training could compromise IT system (Fox, 1997). However, in some cases, adopting IT training may change the employee or management approach to common problems that necessitated the integration of new system making the participants to derive negative attitude towards the management practices (Mueller, 2012). Moreover, this could also necessitate adoption of critical approach to examining appropriate methods of implementing the system leading to distinct conclusions that underscores any exhibited bias. Besides, research will ensure measure what claims about whether IT systems have positive impact on management in organizational setup (Ryan, 2008). There would be clear understanding of the kind of IT system in place and what the system mean to the management fraternity in organization. Hence this approach has to be considered especially in preparing and controlling IT systems (Fox, 1997; Mueller, 2012).
External factors, which might affect the results like employees’ level of acquaintance with IT, should also be recognized as an important factor in ensuring that information management system (IT system) is not accompanied by other changes that might adversely affect the organization (Fox, 1997). Moreover, it could be stated that key emphasis within quantitative study is based on rational perception; this is believed to adopt a tend aimed at moving from general to specific IS (information system) considerations regarding the study topic, which at times could be regarded as a top-down approach. But, it is somewhat that the legitimacy of conclusions would however, be illustrated based on numerous considerations within the organization. Thus affirming prior statements, findings or conditions as being valid (Hoyle, 2014).
According to Fox (1997), researchers seldom access other processes within distinct groups (e.g. employees with IT skills, and managers who embrace integration of IT systems in enhancing the integrity of valuable information (Hoyle, 2014). This creates the need to derive the in-depth meaning of Reliability, which could be described as an extent to which require stable set of variables that it is anticipated to quantify. Moreover, if numerous dimensions are adopted in deriving reliability, then it would effectively be dependable in affirming respective research values.
The comprehensive examination will entail comparative analysis of two quantitative analysis regarding effects of inadequate training on valuable organizational information (Ryan, 2008). In contrast, it will explore a more effective quantitative analysis which could be adopted in analyzing e real life situation as far as Information technology is concerned in an organization. In furtherance, the paper will somewhat explore issues of sampling, validity, reliability and bias as far as quantitative data analysis processes are concerned (Hoyle, 2014).
Quantitative Methods
There is a growing interest in adoption and use of Structured Equation Modeling (SEM) techniques in regard to adoption and use of information system within organizations. In furtherance, it is important to compare between two SEM and derive a conclusion in order to derive in-depth understanding of Structured Equation Model techniques (Mueller, 2012). This enhance better understanding on realization of when to use SEM. Moreover, in understanding the level and extent to which SEM methods could be implemented in information system research; similar dataset would be analyzed and compared in two classes (Ryan, 2008). In this case, there would be discussion on linear regression models so that an explicit understanding would be realized on when to use either linear regression model of structured equation techniques in analyzing quantitative data. Leading to conclusion on best approach to take in analyzing how insufficient employee training can compromise valuable information (Mueller, 2012).
Structured Equation Modeling (SEM) Techniques
This is an integration of techniques like PLS (partial Least Squares) and LISREL1 which could often be referred to as SGM (second generation models) of analyzing data (Hoyle, 2014; Mueller, 2012). Moreover, these two techniques are affirmed to be effective in testing the extent to which information technology system research that meets distinct and recognized standards in high quality statistical analysis. It implies that the techniques could be used for statistical inclusion validity (Fox, 1997). However, SEM in contra...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Food Saver
    Description: Referencing provides both the academic and technical writers with the means of acknowledging/mentioning the sources of the ideas used in their papers....
    5 pages/≈1375 words| No Sources | APA | Technology | Other (Not Listed) |
  • Resolving Intellectual Property Rights
    Description: A complete search shows that there exist a similar trademark but not identical to SafePac...
    3 pages/≈825 words| 5 Sources | APA | Technology | Other (Not Listed) |
  • U2 Research Project: Windows PowerShell
    Description: Windows PowerShell is a .NET-based framework from Microsoft that is used for automating and configuring management tasks...
    1 page/≈275 words| APA | Technology | Other (Not Listed) |
Need a Custom Essay Written?
First time 15% Discount!