Security Practices in IT Businesses: Laptop Repair Analysis

Verified

Added on  2020/06/06

|29
|10514
|149
Report
AI Summary
This report delves into the critical domain of IT security practices within the context of laptop repair, focusing on the operational strategies of Aveva Group plc, Axios system firm, and Atego company. It begins by establishing the importance of security awareness in IT firms and explores the potential issues that may arise during laptop repair, including physical damage to equipment and data breaches. The report then examines socio-cultural and geographical dimensions influencing IT risk. It further analyzes best practices for enhancing security awareness, along with strategies and monitoring processes employed by IT firms to ensure staff adherence to security protocols. The research employs a comprehensive methodology, including a literature review, detailed data analysis, and critical evaluation, to provide actionable recommendations for improving security measures and mitigating risks in IT environments. The report emphasizes the importance of employee training, risk management, and data protection as key components of a robust IT security framework.
Document Page
IT BUSINESSES ENSURE ABOUT SECURITY BASED
PRACTICES WHILE HANDLING LAPTOP REPAIR
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
Background of the study.............................................................................................................1
Rationale of the study..................................................................................................................2
Significance of the study.............................................................................................................2
RESEARCH QUESTIONS AND OBJECTIVES...........................................................................2
Aim..............................................................................................................................................2
Objectives....................................................................................................................................3
Research questions......................................................................................................................3
LITERATURE REVIEW................................................................................................................3
Importance of security awareness...............................................................................................3
Issues that may occur while repairing of laptop or dealing with devices in the organization....5
Socio-cultural and geographical dimensions..............................................................................5
Best practices that enhances awareness about security while handling electronic devices........6
Strategies and monitoring process that IT firm adopts to ensure that staff members are
following security based practices..............................................................................................8
RESEARCH METHODOLOGY ....................................................................................................9
Introduction.................................................................................................................................9
Research philosophy...................................................................................................................9
Research design.........................................................................................................................10
Research Approach...................................................................................................................10
Data collection..........................................................................................................................11
Data Analyses............................................................................................................................11
Ethical considerations...............................................................................................................11
Research limitation....................................................................................................................12
DATA ANALYSES ......................................................................................................................12
Introduction...............................................................................................................................12
Data Analyses............................................................................................................................13
DISCUSSION ...............................................................................................................................17
CONCLUSION .............................................................................................................................21
CRITICAL EVALUATION..........................................................................................................22
Document Page
REFERENCES..............................................................................................................................23
APPENDIX....................................................................................................................................25
Document Page
INTRODUCTION
Background of the study
Security is the main concern of organization in the modern era. Entities ensure that they
take care employee's security so that no accidents occur in the workplace. Companies are
redeveloping policies for safeguarding of workers. In the recent era most of the companies
provide laptop to staff members so that they can perform their functions well and can mange
records properly (Information Supplement: Best Practices for Implementing a Security
Awareness Program, 2014). Such type of electronic devices may get harmed from virus, or any
other factors. In such situation IT companies ensure that employees repair these equipments with
extra care. In order to ensure security they train people and monitor their performance. Most of
the big organizations have made new policies which ensure that all workers follow best practices
while handling laptop repair.
Successfully security awareness program includes assembling of security awareness
team, matrices appropriate training content, proper communication. They make sure that people
are aware with sensitive information and they know how to deal with such equipments.
Employee's also understand consequences of mishandling of laptop, computers in the workplace.
Potential consequence that may occur with mishandling of laptops such as reputation harm,
penalties (Security Threats, 2017). That is why all workers pay attention on companies policies
and follow best practices so that they can repair laptop and other equipment effectively without
any damage.
There are various activities that firms follow to ensure that staff is following security
based practices while handling laptop repair. Mainly operation mangers arrange class room
training for the workers in which they make them aware with risk that may occur while dealing
with technical equipments (Every company needs to have a security program, 2008). It may
create difficulty for employee and organisation as well. Trainer make them aware with the
sensitive information so that they keep secure themselves.
Furthermore, security awareness is being conducted in IT support corporation as an on-
going program in order to ensure that people have adequate knowledge about technical
equipments and they can handle these equipments well. In this respect IT firms assemble a
security awareness team those who have great experience about handling of laptop when it gets
damage. This team monitor performance of the engineers when they repair the laptop and other
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
electrical equipments in the workplace. If they make any mistake then their managers supervise
them and make them aware with their mistakes (Ab Rahman and Choo, 2015).
Current study is based on Aveva Group plc, Axios system firm, Atego company which is
the multinational firm working in field of information technology. These firms provide
information management solutions, technological services to the corporate clients and end users.
The main purpose of the firm is to offer the best technical support to the customers. It ensures
that employees of the company perform their duties well and follow practices properly (Kokilam,
Joshi and Kamath, 2016). The main purpose of this study is to access the manner in which IT
support firms ensue about security based practices while handling technical operations or
repairing of laptops.
Rationale of the study
The main reason of conducting this study is that security issues are increasing in IT
industry. Firms those which are operating in the sector are facing troubles related to increasing
accidents of employees while dealing with electrical devices. In such conditions overall brand
image of the corporations are decreasing. Another reason of carrying out this investigation is to
improve security based practices in IT firms so that operations can be done properly (Skopik,
Settanni and Fiedler, 2016).
Significance of the study
This research is very important for IT firms where employees have to deal with technical
equipments daily. By this way these entities will be able to identify issues while handing with
such devices. This will help in finding solutions through which security can be improved.
Furthermore, this investigation will be beneficial for the workers because they will be aware with
sensitive information related to security (Tøndel, Line and Jaatun, 2014). Companies will be able
to improve their practices so that they can keep their staff members secure all the time. In
addition, this study will help the other scholar in conducting study on the same topic in the
future.
RESEARCH QUESTIONS AND OBJECTIVES
Aim
“To access the manner in which IT businesses ensure about security based practices while
repairing laptop: A study on Aveva Group plc, Axios system firm, Atego company.”
2
Document Page
Objectives
To understand importance of security awareness in Aveva Group plc, Axios system firm,
Atego company.
To analyses issues that may occur while repairing of laptop in the organization.
To Critically evaluate best practices which enhances the awareness about security while
handling electronic devices like Laptop.
To determine strategies and monitoring process that Aveva Group plc, Axios system firm,
Atego company adopt to ensure that staff members are following security based practices
while repairing laptop.
To recommend ways through which security can be enhanced in the organization and risk
can be minimized.
Research questions
What are the importance of security awareness in Aveva Group plc, Axios system firm,
Atego company?
What are the main issues that may occur while repairing of laptop in the organization?
What are the best practices which can enhance awareness about security while repairing
Laptop?
Explain strategies and monitoring process that Aveva Group plc, Axios system firm,
Atego company adopt to ensure that staff members are following security based practices
while handling technical operations?
LITERATURE REVIEW
Importance of security awareness
As per the view of Caputo and et.al, (2016) information technology is become the
essential part of business unit. In the competitive era each firm has to use advance technologies
and hardware so that they can conduct their operations effectively and smoothly. But increasing
IT risk has forced the firms to take step for making people aware with the security and develop
best practices through which risks can be minimized to great extent. IT risk management can be
defined as making balance between cost of development of secure IT infrastructure and potential
3
Document Page
damage in the organization (Information Supplement: Best Practices for Implementing a Security
Awareness Program, 2014). In this respect firms have to ensure that they develop secure
environment in the workplace, make available all necessary things through which risk can be
avoided and ensure adequate control over operations.
According to Epstein and Buhovac, (2014) Security is the most important part of
business. Security issues not only impact on brand image but also affect employees physically
and mentally. If companies maintain security in the system then it supports the organizations in
improving their brand image and in creasing loyalty of the workers towards the corporation.
Security awareness is beneficial in retaining staff members in the workplace for longer duration
and improving the performance level (Security Threats, 2017). It is important and support the
workers in developing understanding level and reacting properly when such type of IT risk arise
in the workplace. Through security awareness people get to know about sensitive information
and they take care of these things repairing laptop, computers or any other electrical deceives.
Kahtan, Bakar and Nordin, (2014) stated that security awareness is not that much
important in the workplace. If companies make effective work based practices and monitor
performance of the workers properly then such type of risks can be minimized so there would not
be requirement of making people separately aware with this sensitivity information. Employees
those who work in IT firms are well aware with the technical devices and they know how to deal
with them. If these people have necessary education about electrical devices and their dealing
ways. So they always perform their work with extra care (Every company needs to have a
security program, 2008). Thus, there is no requirement to arrange additional security awareness
programs in the organizations.
As per the view of Skopik, Settanni and Fiedler, (2016) security awareness is essential for
IT support companies. Through this, companies can detect suspicious activities and can
minimize security incidents to great extent. Apart from this security awareness supports in proper
maintenance of the electrical devices that help in saving cost of the organization significantly.
That is the best way through which entities can control over operations and can monitor
performance of the workers effectively when they handle technical equipments or repair laptops.
Kokilam, Joshi and Kamath, (2016) argued that security awareness programs enhance
reputation of the firms and enhance satisfaction level of consumers. If entity take cares of
security then employees will be satisfied and they will deal with consumers well. It is the best
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
tool through which company can enhance its sales volume and can generate moire revenues in
the workplace (Information Supplement: Best Practices for Implementing a Security Awareness
Program, 2014).
Issues that may occur while repairing of laptop or dealing with devices in the organization
According to Ab Rahman and Choo, (2015) common issue that occur in IT firms is
physical damage to employees. Whenever individual deals with technical devices or repair
laptop or computers then employees are required to have necessary information about sensitive
information. If they do not have knowledge about risk then it may cause physical damage to
them. While repairing of laptop blast of battery, loss to data etc. issues may take place in the
workplace. For that workers have to be attentive so that such type of risk do not take place. If
battery gets blast then it may case serious industry to the staff members which ma increase
disgruntled among employees (Security Threats, 2017). Most of the time staff members do not
concentrate on their work and they handle electric device without any concentration. In such
condition issues like damage, harm of data take place. That not only impact on workers but also
affect brand image of the corporation to great extent.
Kahtan, Bakar and Nordin, (2014) stated that generally important data is being saved into
hard drives. This is considered as sensitive instrument which suffers from sudden blows. This
can turn into big damage. In such condition when life span assigned to the people then there is
high chances of loosing of data. At the same time hackers can attack on laptop and they can hack
confidential information of the organization (Every company needs to have a security program,
2008). It is the biggest IT risk which can harm company to great extent.
According to Ab Rahman and Choo, (2015) wrong use of hardware or software may
impact on laptop or computers. Incorrect installation, formatting of files are such threats which
causes damage to the hardware. In such condition staff members have to repair them with extra
care. Small mistake can break of damage the system completely.
Socio-cultural and geographical dimensions
As per the view of Kahtan, Bakar and Nordin, (2014) Socio-cultural aspects are
considered as main of the main factor that increase IT risk in the information technological
companies. Most of the time people do not care the official material properly because of their
social cultural background. Most of the employees repair laptop with wearing gloves because
they belong to such culture where wearing gloves is not necessary. Such type of aspect increase
5
Document Page
chances of risk and accidents in the corporations. Kahtan, Bakar and Nordin, (2014) argued that
geographical location matters a lot in security issues. People those who belong from rural areas
they are unaware with the latest equipments, in such condition they get trouble and they do not
easily understand how to repair such laptop and other technical devices (Information
Supplement: Best Practices for Implementing a Security Awareness Program, 2014). On other
hand urban area employees are well aware with the handling techniques of technical devices.
They know about standard so if management make them aware with these standards the n they
can easily understand whereas rural area's people find difficulties in understanding such
standards.
Best practices that enhances awareness about security while handling electronic devices
As per the view of Kokilam, Joshi and Kamath, (2016) IT support companies ensure that
staff members follow security based practices in the workplace whenever they have to deal with
technical equipments. In this respect companies always organize training program in the
organization in which they make people aware with the sensitive information about how to deal
with laptop, computers etc. This helps the workers in improving their knowledge about electrical
devices and keeping themselves secure from threats. While handling laptop or repairing them
many times risk such as battery blast, loosing of data type of risk get arise. In such condition
people handle such equipments with extra care and always keep themselves away from risks
(Security Threats, 2017).
Ab Rahman and Choo, (2015) stated that IT firms make strict rules and regulation that
are required to follow by each workers while dealing with technical devices. This practice helps
firms in minimizing security risk and improving performance of the organization. Development
of risk assessment plan is helpful that aids in ensuring that staff members get prevented from
threats and they handle laptop well. Organizations make effective policies give necessary
training to staff members about entity's policy (Every company needs to have a security
program, 2008). It aids organization in enhancing security in the workplace.
As per the view Skopik, Settanni and Fiedler, (2016) assemble of security awareness
team is the best practice which supports in reducing IT risk of the firms. By assembling security
awareness team entity can ensure that electrical devices in the workplace and during their work
physical injury may take place. In such condition security team can monitor performance of
6
Document Page
workers effectively and they recheck their work while repairing of laptop. This supports in
preventing from threats and minimizing accidents in the workplace.
According to Ab Rahman and Choo, (2015) management of IT firms always concentrates
on providing necessary training to the staff members so that they get to know about IT risk and
how they can handle these issues. Management always understand necessity of effective security
policies thus, they make such norms through which individual can perform their work with extra
care and no issues take place in the workplace. In this respect IT companies make people aware
with things that need to be considered while handling technical devices. That enhance
understanding level of workers And they repair equipments with extra care (Security Threats,
2017).
Kokilam, Joshi and Kamath, (2016) stated that IT support corporations generally
communicate through email, e-learning, social media channels about the sensitive information.
They ensure that all employees are aware with electronic security awareness notifications. Apart
from this, companies always coordinate with staff members through non electronic mediums
such as posters, newsletters, instructor led training events etc. In the person security awareness
events most of the organizations involve their employees in this event. This supports in knowing
their views and identifying their perceptions. Managers conduct face to face meeting with their
employees and give presentation over handling technical equipments. As per the view of Skopik,
Settanni and Fiedler, (2016) IT companies time to time send their workers to attend external
training programs and gather material about IT risks (Every company needs to have a security
program, 2008). National institute of standard and technology has introduced information
technology security awareness and training programs. This is completely based on IT risk and
how individual can get prevented while handing technical equipments in the organization.
According to Ab Rahman and Choo, (2015) implementation of tracking mechanism is
considered as best practice to reduce security risk in the workplace. Whenever workers handle or
repair laptop then it is essential to track their working. It helps in identifying their mistakes and
giving them training accordingly. It is the way through which organization ensure that no
employee makes mistake while handling technical or electrical devices.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Strategies and monitoring process that IT firm adopts to ensure that staff members are following
security based practices
As per the view of Kokilam, Joshi and Kamath, (2016) IT asset management is the best
strategy that assists in minimizing risk related to security. Implementation of IT asset
standardization and rationalization for reducing risk related to It security are the best practices
that can be adopted by companies those which are operating in the information technology field.
Implementation of these standards support in managing IT equipments well and improving
security in the workplace. Information technology asset management is considered as set of
business process which is generally designed by the firms to manage inventory of technological
assets. It is the beneficial tool and aid in lowering IT cost and improving productivity of the
business unit (Information Supplement: Best Practices for Implementing a Security Awareness
Program, 2014). This typical and strategic IT asset management tool supports in ensuring
security based practices in the workplace. By this way workers use equipments with extra care
and try to minimize their mistakes.
According to Ab Rahman and Choo, (2015) Monitoring, controlling and managing are
the privileged credentials that are helpful in ensuring the staff are following security based
practices. Implementation of protocols and tracking infrastructure is the best activity or strategy
that assist in ensuring that people are following company's practices effectively. By
implementing protocols in the workplace managers can ensure working performance of the
individuals and they can guide them well. This supports in identifying issues in the workplace
when people have to deal with technical equipments. That helps in taking proper measures to
minimize risk of the organization and improving security of the business unit.
Skopik, Settanni and Fiedler, (2016) stated that reviewing IT security polices is the great
strategy through which company can ensure that people are following practices properly or not.
By comparing the results' entity can get to know issues in the system and can improve its
security polices. Conducting audit time to time is the best practice that ensure working of the
organization. By conducting internal audit companies can get to know how much employees
have knowledge about repairing or handling technical devices. Ab Rahman and Choo, (2015)
argued that time to time meeting with the technical staff is the best monitoring strategy through
which management measure working knowledge of the workers and measure their performance
against standards (Information Supplement: Best Practices for Implementing a Security
8
Document Page
Awareness Program, 2014). Furthermore, whenever new staff come to the office senior staff
monitor their work and make them understand with the effective use of technical devices. It is
the way through which companies ensure that person get to know about practices and repair
laptop well.
According to Kokilam, Joshi and Kamath, (2016) inventory management concentrates on
stock and it equipments that are required to repair technical devices. They maintain records of all
tools and if workers are consuming more assets as it is required or misusing these equipments
then this report circulates to higher departments. By this way management level employees
conduct training programs and make them aware with the effective ways of handling such
electrical equipments.
RESEARCH METHODOLOGY
Introduction
Research methodology is the set of process which assist researcher in answering research
questions and completing dissertation in proper manner. There are many tools and techniques
which suggest scholar in finding answers of unanswered questions (Coiro and et.al, 2014). This
is most important part of investigation which develop understanding of researcher and give
insight detail about the topic. By applying these methods individual get to know cause and effect
relationship between variables and individual get facts about subject matter. Selection of
appropriate research method matters a lot, it assists in meeting with the real objective of
dissertation.
Research philosophy
It is the major tool which generally deals with source and knowledge. It concentrates on
way through which data about the topic is being collected by scholar. There are many research
philosophy tools that are related with wide range of disciplines (Creswell, 2013). It is essential to
chose correct philosophy as per the nature of study. In the absence of this scholar will not be able
to get reliable information about the subject matter.
There are interpretivism, positivism are two main philosophies that are used in different
types of dissertation. Interpretivism tool involves human being into the investigation and try to
find of their opinion about topic. Researcher analyses psychological aspects of the person and get
information by this way. On other hand positivism tool is another type of technique which
concentrates more on social reality and observe the facts. In the current investigation scholar has
9
chevron_up_icon
1 out of 29
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]