Stick Or Carrot Approach Summary

Improved Essays
Information Security Policy Compliance: Stick or Carrot Approach?
Yan Chen K. Ramamurthy and Kuang-Wei Wen collaborated to write an article titled Organizations’ Information Security Policy Compliance: Stick or Carrot Approach? The article suggests internal security threats are most commonly seen in the forms of insider security breaches or employee negligence. The authors discuss results from research and surveys conducted by external control groups and through their own control groups used to determine what control methodology best motivates employees to follow an organizations security policies.
During their analysis of the data the authors discovered with each set of results in favor of punishment or reward there were opposing results
…show more content…
The authors reviewed information from government agencies, universities and health care institutions from different studies in both the United States and the United Kingdom. Upon evaluation for the studies concerning information security policies the authors determined Employees do not appear to have motivation to follow an organizations security policies. Which leads to the writings targeted purpose of determining the best methodologies used as control measures for security policy …show more content…
The GDT is a theory used in the area of criminal justice which strives to discourage criminal behavior through publicized display of individual punishments. The authors analyze results for instances where punishment is used and the effect it has on the businesses and employees alike. The analysis also reflected the effects rewards have on the organization and their employees. After these evaluations of the reward and punishment control mechanisms used independently they conduct their own research using both of these elements together.
By using the research from other studies, analyzing the information and determining these studies of the control mechanism used independently are in effective by themselves they use the essence of evaluative essay writing. When attempting to consider the gaps in the theories of punishment verses reward, they look at the alternative of implementing the two control methods together. This leads them to the next step of introducing a third element, certainty of control implementing the use of critical essay construction in their writing.

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Telichia Johnson HIMS 417 March 07, 2015 Summary: Redefining HIM Privacy and Security Role In the article “Redefining Health Information Management Privacy and Security Role,” the authors report on the historical role of the Health Information Management (HIM) professional in privacy and security, several evolutionary changes, and the need to extend access to patient information beyond normal patient care. In a period of constantly changing regulations and continual evolutions in technology, the Health Information Management profession’s roles and responsibilities will have to be extended to meet industry demand, and more reliance on Health Information Technology (HIT) to process and manage data and information. A more increased role…

    • 371 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Robert Hanssen Failure

    • 1219 Words
    • 5 Pages

    Creating and designing policies and procedures geared towards being able to document and look back on security violations that have been reported is going to be a crucial step in this process (Office of the Inspector General Oversight and Review Division, 2007). Until filing this report, there was not a concrete way of doing it. Some tools that are in use today started from this report. An example of such tools is a financial disclosure program where annually FBI employees must disclose their finance records for review. This will give the FBI the opportunity to look for any discrepancies or sudden influxes of…

    • 1219 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    SANS (Sysadmin, Audit, Network and Security) Institute is a privatized company by the United States, which is specialized in 400 training courses including cybersecurity training and information security for security professionals providing proper certification. SANS was established in 1989. The SANS 11 supported programs in the security program publication of 2003 “The many facets of an information security program” by Robert L Behm Jr. Will be discussed below. The information security program is a task for the ISSO.…

    • 935 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Since earlier times, deviance has been prominent in society. Overtime offenses have gradually been taken more seriously due to a better understanding on the reasoning of crime. Although criminologists theorize the origin of crime, it is still a blurry line on whether the perpetrator should physically be held accountable for his or her life. This ideology can date back to the Code of Hammurabi, where corporate punishment was a form of discipline. Corporate punishment consisted of inflicting any physical pain onto the perpetrator that was measured to the offense.…

    • 1202 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Frequent exonerations of innocent parties affect the entire legal system in a myriad of ways. Perhaps no challenge is greater to the integrity of the American criminal justice system than that of the conviction of innocent individuals. Since the1990’s when DNA evidence became more widely known and accepted, a great deal of attention has been focused on wrongly condemned individuals and their post-conviction exonerations. In many of these cases, defendants had been sentenced to death and were awaiting execution.…

    • 1776 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Crime is an issue that has plagued many societies. Once individuals have agreed, may that be conscious or not, to live under the laws of their land, laws have been broken. Continually, as humans progress in a never-ending quest for knowledge, we would like to know why people choose to commit crimes. Criminologist invest their time to grasp the concept on what is going on that causes deviant behavior in individuals, and once in a while they develop theories. So, why are these theories so important for our knowledge about criminals?…

    • 319 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Fine And Probation

    • 386 Words
    • 2 Pages

    Punishment such as fine and probation were part of criminal justice system in preventing crime. Fines can be used in crime prevention and was more effective for less serious offenses committed by the first-time offenders as well as even for all age groups of recidivists (Feldman, 1993). Coldwell (1965) has listed the advantages of fines as a punishment in crime prevention which include of no stigmatization or upset of family life in term of relationship, the offender has no longer need to attempt prison life which may maintain their jobs and the population of prison will be in stable or low, the fines can give to victims as compensation and can threaten individual’s finances. In addition, Walker and Farrigton (1981) found that fines can help to decrease the rates of re-offending when compared with probation or suspended prison sentences (Feldman,…

    • 386 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Curtin University is an educational provider, which has attracted students from around the world to come to Australia and study at Curtin University, implementing the right security procedure is a key aspect for Curtin University to encourage students to choose Curtin University and the deployment of the right procedures will help Curtin achieve it’s financial objectives “an effective security strategy helps to ensure good security management throughout the organisation and indeed is an important part of its corporate governance. A security strategy that is directly related to the wider organisational strategy is necessary in order to give a sense of direction to the security functions (including, for example, physical and personnel security),…

    • 1476 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Punishment Vs Rewarding

    • 1820 Words
    • 8 Pages

    The biggest problem of educators and families have been disciplining their children for centuries. In order to solve this problem, numerous methods were developed. The most effective of these is reward/punishment system. However, it is also controversial whether punishment or rewarding is more powerful. It is proven that punishment results in psychological damage of a child, triggers rebellion and makes the child blaming the authority for picking on them.…

    • 1820 Words
    • 8 Pages
    Improved Essays