COIT20263 - Information Security Management: A4A Case Study Analysis

Verified

Added on  2023/06/15

|7
|1504
|162
Case Study
AI Summary
This case study delves into the information security management practices of Academics for Academics (A4A), focusing on unethical considerations within the workplace. It examines the consequences of exposing unethical behavior, including warnings, expulsion, and monetary compensation for affected students. The study emphasizes the development of policies to address unethical approaches, highlighting the importance of strategic planning and evaluation to secure the company's market position. External assistance, particularly from law officials, is deemed crucial for providing justice to students and clients, especially non-natives unfamiliar with the company's operations. The analysis underscores the need for compliance with legislations and workplace standards to avoid customer turnover and maintain the safety, security, and privacy of personal data and information. The document also includes references and a bibliography of relevant sources on information security management.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: INFORMATION SECURITY MANAGEMENT
Information Security management- A Case study of Academics for Academics (A4A)
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
INFORMATION SECURITY MANAGEMENT
Unethical consideration of workplace conditions in A4A
ď‚· Consequences of exposing unethical behavior
If any member is found handling the information of the students very casually, first he
would be given a warning. If he modifies himself, then he would be provided with an external
assistance in forwarding the information posted by the student to the management. This would
include the assurance regarding solving the query of the student in an efficient and effective
manner. On the contrary, if it is found that the member has adopted some wrong means, which
has stalled the transmission of the content of the students to the manager, the member would be
expelled from the job (Pathan 2016). Not only this, he would be compelled to provide the student
with monetary compensation for the loss, damages and lost honor and respect. This would add
meaning to the rationale behind the clients and students’ investments in the company services.
ď‚· Developing policies for unethical approach
These policies would be effective only if the personnel expose rational approach towards
its formation. For the achievement of positive results, the personnel need to make plans. Mere
making plans would not yield positive results. After making the plans, they need to be evaluated
in terms of assuring that the personnel are progressing on the right track. Absence of this
evaluation would prove harmful for A4A personnel in terms of beautifying the future of the
students and clients (Zammani and Razali 2016). This strategic approach would secure the
market position of the company in the competitive ambience. This ambience is needed, as it is a
startup.
Document Page
2
INFORMATION SECURITY MANAGEMENT
ď‚· External assistance
Assistance of the law officials would be crucial in terms of providing justice to the students
and clients, especially the non-natives. This is because they are unacquainted with the system
and operations of the company. Along with this, in terms of handling these matters, skilled and
professional experts are needed. Experimentation with the limited knowledge would be difficult
for the company personnel to tackle the matters in an efficient and effective manner. Along with
this, maintenance of stable relationship with government law officials would be an added
assistance of the company in terms of safeguarding the personnel from the scandals (Nancylia et
al. 2014). Herein lays the importance of legislations, which would help the company to add value
to developed policies. Non-compliance with the legislations and the workplace standards would
compel the personnel to encounter customer turnover, which would take the revenue and profit
margin and revenue of the company to an utter loss. This loss would add vulnerability to the
market position of the company.
The aspects highlighted in the above paragraphs bring the aspect of “unethical
consideration” into the discussion. Along with this, these aspects also contradict the inner
essence of the term “management” as mentioned in the variable of the topic. Attachment of the
concept of security in this context snatches away the assurance from the students and the clients
of A4A in terms of maintaining the safety, security and privacy of their personal data and
information (Ifinedo 2014).
Document Page
3
INFORMATION SECURITY MANAGEMENT
References and bibliography
Agrawal, V., 2017. A Comparative Study on Information Security Risk Analysis
Methods. JCP, 12(1), pp.57-67.
Bamakan, S.M.H. and Dehghanimohammadabadi, M., 2015. A Weighted monte carlo simulation
approach to risk assessment of information security management system. International Journal
of Enterprise Information Systems (IJEIS), 11(4), pp.63-78.
Cavusoglu, H., Cavusoglu, H., Son, J.Y. and Benbasat, I., 2015. Institutional pressures in
security management: Direct and indirect influences on organizational investment in information
security control resources. Information & management, 52(4), pp.385-400.
Choi, M. and Lee, C., 2015. Information security management as a bridge in cloud systems from
private to public organizations. Sustainability, 7(9), pp.12032-12051.
Cholez, H. and Girard, F., 2014. Maturity assessment and process improvement for information
security management in small and medium enterprises. Journal of Software: Evolution and
Process, 26(5), pp.496-503.
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013.
Future directions for behavioral information security research. computers & security, 32, pp.90-
101.
Fenz, S., Heurix, J., Neubauer, T. and Pechstein, F., 2014. Current challenges in information
security risk management. Information Management & Computer Security, 22(5), pp.410-430.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
INFORMATION SECURITY MANAGEMENT
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2014, June. Game theory
meets information security management. In IFIP International Information Security
Conference (pp. 15-29). Springer, Berlin, Heidelberg.
Goo, J., Yim, M.S. and Kim, D.J., 2014. A path to successful management of employee security
compliance: An empirical study of information security climate. IEEE Transactions on
Professional Communication, 57(4), pp.286-308.
Ifinedo, P., 2014. Information systems security policy compliance: An empirical study of the
effects of socialisation, influence, and cognition. Information & Management, 51(1), pp.69-79.
Kang, H.S., 2014. An analysis of information security management system and certification
standard for information security. Journal of Security Engineering, 11(6), pp.445-468.
Lin, G.T., Lin, C.C., Chou, C.J. and Lee, Y.C., 2014. Fuzzy Modeling for Information Security
Management Issues in Cloud Computing. International Journal of Fuzzy Systems, 16(4).
Nancylia, M., Mudjtabar, E.K., Sutikno, S. and Rosmansyah, Y., 2014, October. The
measurement design of information security management system. In Telecommunication Systems
Services and Applications (TSSA), 2014 8th International Conference on (pp. 1-5). IEEE.
Ortmeier, P.J., 2017. Introduction to Security. Pearson.
Park, J.H., Yi, K.J. and Jeong, Y.S., 2014. An enhanced smartphone security model based on
information security management system (ISMS). Electronic Commerce Research, 14(3),
pp.321-348.
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET.
CRC press.
Document Page
5
INFORMATION SECURITY MANAGEMENT
Peltier, T.R., 2013. Information security fundamentals. CRC Press.
Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. CRC Press.
Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information
security policies: An exploratory field study. Information & management, 51(2), pp.217-224.
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, 36(2),
pp.215-225.
Tot, L., Grubor, G. and Marta, T., 2015. Introducing the Information Security Management
System in Cloud Computing Environment. Acta Polytechnica Hungarica, 12(3), pp.147-166.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber
security. computers & security, 38, pp.97-102.
Whitman, M. and Mattord, H., 2013. Management of information security. Nelson Education.
Yang, Y.P.O., Shieh, H.M. and Tzeng, G.H., 2013. A VIKOR technique based on DEMATEL
and ANP for information security risk control assessment. Information Sciences, 232, pp.482-
500.
Zammani, M. and Razali, R., 2016. An empirical study of information security management
success factors. International Journal on Advanced Science, Engineering and Information
Technology, 6(6), pp.904-913.
Document Page
6
INFORMATION SECURITY MANAGEMENT
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]