logo

Leadership and Information Security

   

Added on  2022-08-27

4 Pages741 Words12 Views
 | 
 | 
 | 
RUNNING HEAD: LEADERSHIP
Leadership and Information Security
Name of student
Name of University
Author Note:
Leadership and Information Security_1

1LEADERSHIP
The generation, collection and keeping up of information secured is one of the most primary
issues of concern for any organisation. The organisations need to keep the data about their plans,
about their strategies, Artificial Intelligences and the confidential data about the employees as
well. The data adds up to the benefit of the business and are kept secured so that it does not fall
to any wrong hands since leakage of informations are a great loss for any company (Soomro,
Shah & Ahmed, 2016). In today’s area of technological advancement and various means of
access to informations, the risk of cyber crimes has increased rapidly. Yet, for all the expenses
the company have made to keep their systems secure and protect the informations about
customer and employees, the organisations are struggling largely to make the cyber security
more proactive and vibrant.
The security of the informations and the proper usage of it can earn a company
competitive advantage which will lead to profit. If the informations are once leaked out, a
company not only suffers financial loss, but it also has to deal with the insecured employees who
starts getting de motivated that their hardships went into a fiasco. Such is the case of Sullivan
Corporation at present.
The company at present, in order to make their security system more compact and
reliable needs to have a strong leadership in the field. New systems regarding the surveillance
policies need to be undertaken. Generally, people have a tendency of developing negative
perception on the issues of surveillance. In the current situation, the leaders of Sullivan
Corporation have to take Theory Y leadership style initially in order to check the leakage of
informations. The leaders also need to undertake situational leadership strategy where they can
gauge the readiness level of the employees in accepting the surveillance (Odumeru & Ogbonna,
2013).. According to the level of readiness by the employees, the leaders can share the
Leadership and Information Security_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Insider Infiltration in Computer Crime Investigation
|4
|1402
|398

Organizational and Informational Strategy Assignment 2022
|10
|712
|30

Analysis of Information Security Risk
|9
|1109
|486

Motivation and Effective Leadership
|14
|974
|405

Organisational Behaviour and Human Resource Management
|4
|591
|90

Employee-Centric Leadership: Mark Zuckerberg's Innovative Approach
|11
|2540
|155