Sunday, March 3, 2019
Case Study You Are Your Own Worst Enemy Essay
Gen Y are shown to be a substantial security risk to presidencys beca drug abuse Gen Ys download and use non-sanctioned IT Tools enchantment at acidify or use guild technology and often compromising software same(p) instant messaging software and open-source technologies. Whats happening is quite simple, but real dangerous. Having/using them on social club technology opens a door for hackers and data thieves to enter un noniced into your organizations information assets. But Gen Y are non even aware that they are causing capability compromises.Question and Answer( LegendQ=Question,A=Answer)Q1. Think of yourself as a business manager. You wee employees you supervise and you are responsible for ensuring that they meet daily solve quotas. But, you incur they are spending a couple of hours per day shopping online, chatting with friends done instant messaging, and so on. How do you cue your employees to fulfill their unravel? How do you restrict them from non- devise- related activities with unwrap creating a stifling, boring, and dull representplace? A1. As a manager, I am responsible and takes charge of all the activities that involve in my corporation and it is very necessary for me to have an employee which has a hunchledge to perform and beware to their task properly and volitioning to abide the rules and regulation of my company.Discipline is a must. They should focus to their job assignment and use their time properly particularly during working hours. And as a Manager I must know what the different types of Managerial functions . And one of it is directing that refers to motivation, communication and leadership. I am the Manager so I will be the one to motivate my employees by communicating them with the power of leadership. To motivate them to perform their work I will give them incentives or rewards to institute them productive.I may profit their wages to encourage them to perform their task well. By restricting them I think wil l not work because their life are assume to the technology that most of the time of their work they are in depend of the electronic computer that maybe will tempt to open a social networking site or shopping site that is not related to their work. I will not totally restrict them but instead I will allow them to do their non-work-related activities during worktime. They deserve a little break that will make them calm and not so stressful. I will take a survey from them that deals with knowing what they would suggest in inn to have a pleasant workplace that will affect them in a good way. In that, my employees will be encourage to work well.Q2. The case study mentioned the need for employee education. What elements would you include in an education schedule for helping employees go against understand the dangers in which they place the organizations IT infrastructure by using technology the wrong way spell at work? A2. It is better to conduct an orientation the moment that they are employed in the company. This will help them to have a better understanding regarding to their task such as the general rules and regulations and the proper using of the IT infrastructure of the company. Using technology in the wrong way while at work will cause a long defile and failure to do their task in the company. Sometimes it will be lost of the company and their reputation will destroy.And overly I keister include short cases of organizations that have been compromised because of unsafe software, having a fellow Gen Y person make the presentation, showing safe computing habits.I will alsoinclude the things that stub happen in the organization if the employees are continuous in doing things online that are not related in their work, also the harmful effects on it not just on organization but on them also that they will no longer focused on their work responsibilities and they winning their work at risk that they can be fired and out of the company..Q3.Beyond th e compromises caused to IT infrastructure, what do you tick off wrong with shopping online while at work? Is this under-the-counter or unethical, perhaps both, or neither?A3.Nothing is wrong rough(predicate) the shopping online because its your money that you spending with but during your work it is both illegal and at the same time unethical.It is said to be illegal because before working at the company, there is a certain make out that they should sign stated that they should abide the rules and regulations of the company, including the proper used of their time for their work and do their task without doing unnecessary actions such as chatting with the other(a)s. Also, it is unethical because it could be unfair to the others who were doing their task properly while the others are just squander their time, having their profits doing wrong things. You employed in the organization to work, you are subjected to work with all of your knowledge, skill and focused because your b eing paid by the company and doing something not related to your work is not good. Its definitely thousand for dismissal from employment.But then, people may or may not see it as unethical, because so many people do it.Q4.Read the acceptable use policy (AUP) for your school. Are you doing anything with your schools technology that violates the AUP? If so, what is it? How prevalent among other students is the violation? Does widespread violation somehow or another make it okay?A4.(Since our school have no AUP, answers are based on computer laboratory ordinance,rules and regulations).Yes, sometimes I play games installed in the computer which is strictly command based on the ordinance issued by th President.It is very common since students have saved games on their flash drives and finished this they can install and play games they want anytime but they make trusted that they do this in the absence of their teachers.No, because even violation is widespreaded after the beside day they will do it again and again.Q5. wherefore do you think Gen Y is being singled out? Wouldnt it make sense that people in other age groups also put a company at risk by misusing technology? What is so different and unique about Gen Y?A5.Generation Y grew up with technology and rely on it to perform their jobs better. Gen Y is the digital generation, and thus uses technology more, especially those types of tools that can compromise security. Yes, other age groups misuse technology but not to the outcome of Gen Y. As law firms compete for available talent, employers cannot ignore the needs, desires and attitudes of this vast generation. Millennials grew up with easy access to computers, constant connection to the internet, and smart phones in-hand. Theyre abandoned to using technology in every part of their lives and fully commit in its power to make their lives easier. This generation dreams without limits. Theyre in search of two things money and happiness.Q6.Would you conside r working for a company that prohibited access to social networking sites, gaming, blogs, and online shopping while at work? Why or wherefore not? How about in the defense application? In certain places within defense organizations, youre not allowed to channelize kiosk phones and the like because you can take photos and videos with them. Do you want to work there? Why or why not?A6.Yes. Working in the company that prohibited access to social networking sites, gaming, and online shopping is something gives discipline to the employee regarding doing something not related to their work and also these things must be done not in your workplace but in your own place like in your house and in your own computer. In the company that cell phones and other similar to it that can take pictures and videos are not allowed, why or why not work in this kind if organization? For me its alright ,we all know that cell phone is gimmick way to communicate to others most of the time in emergency, s o not carrying cell phone is hard for me to follow but if the company is great and theres a lot of benefits or good salary for their employees I will, they just do it for their own safety.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.