Access over 20 million homework & study documents

Security Policy Implementation

Content type
User Generated
Subject
Writing
School
University of the Cumberlands
Type
Homework
Rating
Showing Page:
1/5
Running head: SECURITY POLICY IMPLEMENTATION 1
Security Policy Implementation
Student's Name
Institution Affiliation
Date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5
SECURITY POLICY IMPLEMENTATION 2
Security Policy Implementation
User Apathy and Security Policy Implementation
Most organizations continue to spend more resources and time on security awareness
policies and training because of the existing gap between information security, awareness,
and actions. Despite the efforts taken to put huge budgets and time towards employees and
users' training, human behavior or apathy does not improve (Flowerday & Tuyikeze, 2016).
Therefore, user apathy has continuously resulted in financial losses and misplaced budgets
for many organizations and devoting astronomical sums of money to non-profitable projects.
Apathetic users might not disclose their login credentials to suspecting cybercriminals but are
less likely to draw from their information security awareness knowledge on a day-to-day
routine. This indicates that user apathy is not a light issue and requires the indulgence of
users, information technology experts, and organizational managers to tackle. User apathy
also affects security policy implementation by derailing overall progress and actualization of
organizational goals and projects. This effect is witnessed when some degree of human
errors, mistakes, and misfortunes appear inevitable. However, increasing employee
engagement can successfully tackle the self-willed user apathy and violation of security
policies and tackle circumstances that result from negligence. Lastly, user apathy does not
encourage redundancy; therefore, organizations find themselves relying on single-sourced
points of failure, for example, one technology or one person (Ahmad, Maqsood, & Ali,
2018).
Importance of Change Model in Implementing Security Policies
Firstly, the change model or implementation theory allows organizations to account
for apathy, resistance, and possible uncertainty to change experienced at all levels. Secondly,
when implementing security policies, companies need to consider how user apathy or
employee behaviors vary depending on the form of management structure or transtheoretical

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running head: SECURITY POLICY IMPLEMENTATION Security Policy Implementation Student's Name Institution Affiliation Date 1 SECURITY POLICY IMPLEMENTATION 2 Security Policy Implementation User Apathy and Security Policy Implementation Most organizations continue to spend more resources and time on security awareness policies and training because of the existing gap between information security, awareness, and actions. Despite the efforts taken to put huge budgets and time towards employees and users' training, human behavior or apathy does not improve (Flowerday & Tuyikeze, 2016). Therefore, user apathy has continuously resulted in financial losses and misplaced budgets for many organizations and devoting astronomical sums of money to non-profitable projects. Apathetic users might not disclose their login credentials to suspecting cybercriminals but are less likely to draw from their information security awareness knowledge on a day-to-day routine. This indicates that user apathy is not a light issue and requires the indulgence of users, information technology experts, and organizational managers to tackle. User apathy also affects security policy implementation by derailing overall progress and actualization of organizational goals and projects. This effect is witnessed when some degree of human errors, mistakes, and misfortunes appear inevitable. However, increasing employee engagement can successfully tackle the self-willed user apathy and violation of security policie ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4