Stick Or Carrot Approach Summary

Improved Essays
Information Security Policy Compliance: Stick or Carrot Approach?
Yan Chen K. Ramamurthy and Kuang-Wei Wen collaborated to write an article titled Organizations’ Information Security Policy Compliance: Stick or Carrot Approach? The article suggests internal security threats are most commonly seen in the forms of insider security breaches or employee negligence. The authors discuss results from research and surveys conducted by external control groups and through their own control groups used to determine what control methodology best motivates employees to follow an organizations security policies.
During their analysis of the data the authors discovered with each set of results in favor of punishment or reward there were opposing results
…show more content…
The authors reviewed information from government agencies, universities and health care institutions from different studies in both the United States and the United Kingdom. Upon evaluation for the studies concerning information security policies the authors determined Employees do not appear to have motivation to follow an organizations security policies. Which leads to the writings targeted purpose of determining the best methodologies used as control measures for security policy …show more content…
The GDT is a theory used in the area of criminal justice which strives to discourage criminal behavior through publicized display of individual punishments. The authors analyze results for instances where punishment is used and the effect it has on the businesses and employees alike. The analysis also reflected the effects rewards have on the organization and their employees. After these evaluations of the reward and punishment control mechanisms used independently they conduct their own research using both of these elements together.
By using the research from other studies, analyzing the information and determining these studies of the control mechanism used independently are in effective by themselves they use the essence of evaluative essay writing. When attempting to consider the gaps in the theories of punishment verses reward, they look at the alternative of implementing the two control methods together. This leads them to the next step of introducing a third element, certainty of control implementing the use of critical essay construction in their writing.

Related Documents

  • Improved Essays

    Wasting money, time, effort and resource. If the organization security policy framework does not align with their objectives, the employees may try to find something else to help their security control, not using the current framework. Consequences when the framework doesn’t meet the requirements of organizational needs are they generally invest some money to…

    • 723 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Throughout the semester, we have repeatedly discussed statistics regarding current crime and incarceration rates. In comparison to previous rates, from earlier decades, it is clear that society’s viewpoint on crime has changed significantly. Beginning in the early 1970s, the United States initiated a more punitive criminal justice system (1). In The Punishment Imperative, authors Todd R. Clear and Natasha A. Frost created a concept for the reasoning behind this mass incarceration. Referred to as the “Punishment Imperative,” its basis for reasoning focused on the symbolic image that crime held in society; meaning, as crime rates grew, the societal fear for basic safety began to emerge.…

    • 1005 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Frequent exonerations of innocent parties affect the entire legal system in a myriad of ways. Perhaps no challenge is greater to the integrity of the American criminal justice system than that of the conviction of innocent individuals. Since the1990’s when DNA evidence became more widely known and accepted, a great deal of attention has been focused on wrongly condemned individuals and their post-conviction exonerations. In many of these cases, defendants had been sentenced to death and were awaiting execution.…

    • 1776 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Fine And Probation

    • 386 Words
    • 2 Pages

    Punishment such as fine and probation were part of criminal justice system in preventing crime. Fines can be used in crime prevention and was more effective for less serious offenses committed by the first-time offenders as well as even for all age groups of recidivists (Feldman, 1993). Coldwell (1965) has listed the advantages of fines as a punishment in crime prevention which include of no stigmatization or upset of family life in term of relationship, the offender has no longer need to attempt prison life which may maintain their jobs and the population of prison will be in stable or low, the fines can give to victims as compensation and can threaten individual’s finances. In addition, Walker and Farrigton (1981) found that fines can help to decrease the rates of re-offending when compared with probation or suspended prison sentences (Feldman,…

    • 386 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    SANS (Sysadmin, Audit, Network and Security) Institute is a privatized company by the United States, which is specialized in 400 training courses including cybersecurity training and information security for security professionals providing proper certification. SANS was established in 1989. The SANS 11 supported programs in the security program publication of 2003 “The many facets of an information security program” by Robert L Behm Jr. Will be discussed below. The information security program is a task for the ISSO.…

    • 935 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Crime is an issue that has plagued many societies. Once individuals have agreed, may that be conscious or not, to live under the laws of their land, laws have been broken. Continually, as humans progress in a never-ending quest for knowledge, we would like to know why people choose to commit crimes. Criminologist invest their time to grasp the concept on what is going on that causes deviant behavior in individuals, and once in a while they develop theories. So, why are these theories so important for our knowledge about criminals?…

    • 319 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This paper will start with giving a brief understanding of leader rewards and punishment behavior, also giving an explanation of how these can be used to help lead an organization. Moreover, it will give a review of the three most interesting topics of our reading this week and why I found them to be interesting, where I have seen these three used in the past, and conclude with how I might use them in the future. The three topics that I choose from the reading material are the three most notable models of human motivation: Maslow’s hierarchy of needs, McGregor’s X-Y theory, and Herzberg’s hygiene and motivation factors. Leader reward and punishment behavior were introduced in the 1970s and are critical to leaders as they are determinants…

    • 830 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Punishment Vs Rewarding

    • 1820 Words
    • 8 Pages

    The biggest problem of educators and families have been disciplining their children for centuries. In order to solve this problem, numerous methods were developed. The most effective of these is reward/punishment system. However, it is also controversial whether punishment or rewarding is more powerful. It is proven that punishment results in psychological damage of a child, triggers rebellion and makes the child blaming the authority for picking on them.…

    • 1820 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Half of the group was in favor of it, the other half opposing. The students were told to respond to two studies, one of which supported the deterrence argument, and the other opposing it. Both studies were fake, but the group in support of capital punishment…

    • 885 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Curtin University is an educational provider, which has attracted students from around the world to come to Australia and study at Curtin University, implementing the right security procedure is a key aspect for Curtin University to encourage students to choose Curtin University and the deployment of the right procedures will help Curtin achieve it’s financial objectives “an effective security strategy helps to ensure good security management throughout the organisation and indeed is an important part of its corporate governance. A security strategy that is directly related to the wider organisational strategy is necessary in order to give a sense of direction to the security functions (including, for example, physical and personnel security),…

    • 1476 Words
    • 6 Pages
    Improved Essays