Managing Information Systems: End-User Application Policy and Security

Verified

Added on  2022/10/18

|3
|394
|13
Report
AI Summary
This report examines the role of end-user applications within a corporate information systems environment. It focuses on the necessity of establishing and enforcing strict internet usage policies to mitigate data security risks stemming from employee actions, such as downloading applications from the internet or using external storage devices. The report emphasizes the importance of a clearly defined internet usage policy, which should be acknowledged by employees, covering rules for computer and internet usage. The policy aims to balance security with usability, and the report highlights the consequences of policy violations. References are provided to support the analysis of the impact of the internet of things self-security on daily business and business continuity, as well as the impact of information security policies, procedures, and standards.
Document Page
Running head: MANAGING INFORMATION SYSTEMS
Managing Information Systems
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1MANAGING INFORMATION SYSTEMS
Explanation of if the end users allowed to install applications on their
company workstations
In the corporate networked setting, the end users are allowed to install the applications
into the workstations of the company but with following strict internet usage policy. From the
corporate statistics, it is noted that 30% of the corporate business organization, the data security
incidents are occurred from inside operations of the business. The employees are threaten the
business data by downloading applications from DVD and downloaded from the internet. The
employees should follow an internet usage policy which provides them with rules as well as
guidelines about the use of the equipments of company, internet access as well as network. The
employees should be aware that browsing of the sites as well as downloading of files from
certain sites is prohibited (Yılmaz, Sirel, & Esen, 2019). This internet policy can stick to the
employees so that it can lessen the security risks for the business organization as result of
negligence from the employees. The policy should require signing by the employees before
starting the work. It is applied to the employees of the business organization those have access to
the computers plus internet to be used for the business performance. In this way, security is
weighted against the usability. When there is violation of the internet policy it could result in
disciplinary as well as legal actions lead to and include termination of the employees. They
should acknowledge the policy and also confirm that they can agree with the company’s rules as
well as regulations (Peltier, 2016).
Document Page
2MANAGING INFORMATION SYSTEMS
References
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for
effective information security management. Auerbach Publications.
Yılmaz, H. E., Sirel, A., & Esen, M. F. (2019). The Impact of Internet of Things Self-Security on
Daily Business and Business Continuity. In Handbook of Research on Cloud Computing
and Big Data Applications in IoT (pp. 481-498). IGI Global.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]