Response to other Studenst
How would you handle the situation?
Response to Zane’s Answer
I agree with Zane’s answer in relation handling of the situation at the school. It is ideal to ensure that the employees understand the reasons behind the development of the security system. This is to ensure that they reduce the element of ill attitude towards the security policy in place to ensure safety of the confidential information within the school. It is notable not to help them have the opportunity to install their software. This would act ads participating in the hacking of the networking system of the institution thus violation of the laws. It is also essential to inform the individuals on the right way to air their grievances on the limitation of the security policy in relation to execution of their duties and obligations. I would also provide essential information to the authority on how to handle the commotion within the institution (Dhillon, 2001).
Response to Traci’s Answer
I agree with Traci’s answer on the effective and efficient manner to handle the situation at the institution. It is ideal to listen to their grievances and forward to the necessary authority. The authority would decide on the best method to handle the grievances thus explaining the importance of the security systems in place. It is necessary for employees to understand the advantages and rationale behind adoption and implementation of the security policies or protocols in relation to installation of software in the school’s properties.
Response to Saodat’s Answer
It is ideal to remain calm in the situation like this in order to adopt effective and efficient approach towards solving the problem. I agree with Saodat’s answer to the handling of the situation. Several factors should come into play when developing the best approach of solving the challenge or problem. The fast approach is to be keen in noting down the grievances in order to show concern and high level of understanding. The instructors must feel like you care about the situation they are facing in handling their duties and expectations. The second approach is to explain the situation to the instructors on the need and importance of security protocols. The last part of this approach is to forward the complaints to the relevant authority in order to adopt quality solution to the problem (Ciampa, 2012).
Response to Camiren’s Answer
I agree with Camiren’s answer in relation handling the situation. It is essential to listen to the grievances in order to have the idea on where the instructors are coming from in relation to security protocols. This would act as the first step towards solving their issues. It is also essential to make the instructors understand the rationale of the protocols. This would be effective through answering questions relating to privacy and confidentiality of information.
Response to James’ Answer
I agree with James’ answer in relation to handling of the situation at the institution. It is necessary to listen carefully to the grievances with the aim of adopting quality solution. It is also vital to explain the reason behind the adoption and implementation of the protocols to make them understand on their values and significance. In case of minimal understanding form the victims, convince them through forwarding their grievances to the relevant authority with much resources to solve their problems.
Response to Huda’s Answer
I agree with Huda’s answer in relation to effective and efficient approach in handling the situation. It is ideal to explain the reason behind the adoption of the security protocols. These instructors should understand how they benefit form the security protocols. It is also crucial to highlight on the threats available in the market to enhance the level of understanding of the instructors on the in relation to the benefits of security protocols. It is also beneficial to let the instructors know on the need to follow the right channel in order to address their grievances. Since I do not have the authority to help them install software in their computers, I would refer them to the IT administrator for the best solution to their restrictions. Assisting them would count as hijacking into the institution’s system thus violation of the laws (Johnson, 2011).
Response to Brandy’s Answer
I agree with the answer presented by Brandy in relation to handling the situation effectively and appropriately. The first approach is to focus on the issue at hand. This is through helping the instructor on the installation of program or software into the computer’s operating system. In the even of focusing on the task, let the other instructors know on the importance of the security protocols thus the rationale behind their adoption and implementation. It is also vital to make them understand on the crucial authority to address their grievances. The development of security protocols or policies is based on crucial reasoning. The instructors should understand the rationale behind the development of the policy. Channeling their grievances to the IT administrator should be the best option rather than creating a commotion in this scenario. The development of security policies is to protect the instructors and their confidential information hence should support this idea (Ciampa, 2012).
Response to Elisha’s Answer
I agree with Elisha in the effective approach towards handling the commotion with the instructors. It is crucial to listen to the grievances with the aim of providing adequate opportunity for instructors to air what they feel about the security protocols. This would enable the instructors to understand that I care for their situation. Then next step is to identify and explain the benefits of the security protocols in relation to enhancing protection to the confidential information of the institution and the instructors. This would enable the instructors understand on the reasons behind the adoption of the security mechanisms to enhance protection to the confidential information. It is also ideal to inform the instructors on the elements of threats in relation to their confidentiality. In case of lack of understanding up to this level, it is ideal to advice the instructors to channel their grievances to the relevant authority for further explanation (Fugini, 2004).
Response to Jagir’s Answer
I agree with Jagir’s answer in relation to handling of the situation with the instructors in relation to security policy and protocols. It is ideal to understand that the adoption and implementation of the security protocols is for the benefits of the instructors and other stakeholders of the institution. The instructors need to understand the benefits and protection mechanisms against available threats in the market. The security policy enables the instructors to protect their confidential information thus essential for their execution of duties and expectations. It is also crucial for instructors to understand on the right way to seek justice for their grievances. This is through filling complaints with the IT administrator. Instructors should know that I care for their grievances by listening efficiently in order to develop quality solution to their problems (Rittinghouse, 2004).
What is the best way to make users aware of a policy like this?
Response to Zane’s Answer
I agree with the answer provided by Zane in relation to enhancing the knowledge of the users on the essence of the security policies. Periodic orientation would be essential towards keeping the users aware relevant changes to the security policy. Informing the users through e-mails would also be essential to make understand on the needs and benefits of the security policies. It would also be effective to notify the users through memos.
Response to Traci’s Answer
I agree with Traci’s answer on how to inform the users on the essence of security policy. Written document entailing the importance and need for the security system would be essential to enhance the awareness of the users on the policy. It would also the effective to send all the users a soft copy of the security policy through their email addresses in order to act as point of reference.
Response to Saodat’s Answer
I agree with the answer provided by Saodat in relation to increasing the awareness of the users on the security policy by the institution. The first attempt towards ensuring that the users understand the concept of the surety policy is through the development of a detailed copy of the security mechanism. This document should contain relevant benefits of the policy and the available threats in the market. The document should be available to each user for further evaluation and understanding. It is also essential for the institution to conduct seminars on how to notify the users on the security policies and their influencing in preventing malicious hacking into private or confidential information. The seminars should be entertaining and ideal in order to maximize participation of the users. This would enhance their awareness on the available security policy (Preneel et al, 2008).
Response to Camiren’s Answer
I agree with Camiren’s answer in relation to increasing the awareness of the users on the security policies by the institution. The main aim for this process is to ensure that the security policy and relevant information are accessible to users. The authority can enhance the awareness of the users on the essence of the security policies through several methods. The first approach is through the organization of quality and effective meeting. During this meeting, the authority might take the opportunity to inform the users on the presence of the security policy and its benefits in enhancing the privacy of the information of the institution. It is also essential to print a detailed copy of the security policy and make it available to the user. The last approach is to ensure that the surety policy is available for users to access on the website of the institution (Whiteman, 2012).
Response to James’ Answer
I agree with James’ answer in relation to enhancing the awareness of the users on the security policy. It would be ideal to conduct extensive orientation programs to new users to ensure that they are in terms with the security policy. The authority should explain the benefits and threats available in order to enhance the understanding of the users on the need and significance of the security policies. This will enable users to embrace the security policy with the aim of enhancing their privacy and confidentiality.
Response to Huda’s Answer
I agree with the answer by Huda in addressing the question of security policy. It is ideal to make users aware of the policy and its importance. This is through the provision of hard and soft copies to enable them understand and agree to the terms of the surety policy. It is also ideal to highlight the benefits and rationale behind the adoption and implementation of the surety policies within the organization. This would increase the awareness of the users on the essence of security policy.
Response to Brandy’s Answer 1
I agree with Brandy’s answer in relation to increasing the awareness of the users on the relevance of the security policy. It is ideal to provide and execute effective and efficient training process to highlight on the benefits of the security policy within the institution. This is essential through orientations, seminars, and random evaluation of understanding of the users in relation to security policy. The users should also be informed on the essence of security policy through hard and soft copies. This is through identification of the current trends or changes to the security policy and informing the users through the website or email addresses. The users should understand the essence of threats and preventive mechanisms in relation to confidentiality and privacy of information (Whiteman, 2011).
Response to Brandy’s Answer 2
I agree with Brandy’s answer in relation to effective means of informing the users on the security policy. It is ideal to provide written documents with detailed information with reference to security policy. This should supplement efforts by the authority to conduct training programs and seminars with the aim of enhancing the awareness of the benefits and influences of the security policy. This would enhance the understanding of the reasons behind adoption and implementation of the policies.
Response to Elisha’s Answer
I agree with Elisha’s answer in relation to the need to enhance the awareness of the users on the security policy. It is ideal to provide hard and soft copies to enable users to grasp the concept f the security policy and agree to the terms. In order to make this method effective, it is crucial for users to read and understand the proposals and terms of the surety policy before agreeing or declining to the terms. The next approach is to enhance the awareness through extensive and interactive training process. This will promote participation of the users towards the achievement of the goals and objectives of the security policy. Through the training, the users should understand the benefits of the security policy in protecting their confidential information (Pfleeger, 2003).
References
Information Resources Management Association., & Khosrowpour, M. (2006). Emerging trends and challenges in information technology management. Hershey, Penn: Idea Group.
Johnson, R., & Merkow, M. S. (2011). Security policies and implementation issues. Sudbury, MA: Jones & Bartlett Learning.
Ciampa, M. D. (2012). Security+ guide to network security fundamentals. Boston, MA: Course Technology, Cengage Learning.
Dhillon, G. (2001). Information security management: Global challenges in the new millennium. Hershey, Pa. [u.a.: Idea Group Pub.
Fugini, M., & Bellettini, C. (2004). Information security policies and actions in modern integrated systems. Hershey, PA: Idea Group Pub.
Rittinghouse, J. W., & Ransome, J. F. (2004). Wireless operational security. Burlington, MA: Digital Press.
SIN 2007, Preneel, B., Elçi, A., & Ors, S. B. (2008). Security of information and networks. Victoria, BC: Trafford.
Whitman, M. E., & Mattord, H. J. (2012). Principles of information security. Boston, MA: Course Technology.
Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology, Cengage Learning.
Pfleeger, C. P., & Pfleeger, S. L. (2003). Security in computing. Upper Saddle River, NJ: Prentice Hall PTR.