Here is the synopsis of our sample research paper on Culture and Belief as it Respects Information Security. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 3 page paper examines beliefs as well as corporate culture and how they relate to information security. Bibliography lists 3 sources.
Page Count:
3 pages (~225 words per page)
File: RT13_SA916inf.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
a certain protocol is safe or that another one is based on myth. Neither belief may be accurate. Beliefs are important when evaluating security systems but culture is important too.
Organizational culture will dictate whether or not a great deal of security is used, or whether nothing is employed. Just as some people do not lock their doors, and do
not worry about getting robbed, some business owners take a similar view at the office. They simply do not become overly concerned about security and they end up doing nothing
about it. Before examining the role of belief and culture, it pays to define what information security issues are exactly. Information security is something that is sorely needed in
this day and age. Information is kept in many organizations around the globe, and it is also accessed and transferred to other locations. Unscrupulous people can break into systems and
then the data is compromised. Hackers often target systems in order to steal information for criminal purposes or even just for the purpose of entertainment. II. Belief and
Culture in Information Security Management The belief and culture perspective on the issue of information security management is relatively new. Yet, it is important to examine culture to
see how a culture of security can impact an ordinary business. One part of culture is how an organization sees routines and aesthetics. For example, some places of businesses employ
a minimalist ideology where desks are clear and personal objects are frowned upon. Some organizations have clear desk policies and expect nothing to be left on the desktop, especially papers
(McIlwraith, 2006). This is a good idea according to McIlwraith (2006) as this way no employee will have inadvertently left sensitive information out for prying eyes. This seems like a
...