SOLUTION: CU Information Systems for Business & Beyond Book Ch 9 to 12 Discussions

Hi, find attachedRunning Head: INFORMATION TECHNOLOGYInformation TechnologyStudent’s NameInstitutionDate1INFORMATION TECHNOLOGYInformation TechnologyEstablishing a Security CultureA security culture is a policy that encourages employees to accomplish their day-to-dayactivities in conjunction with the organization’s security policies. Establishing a securityculture means creating and evolving new security cultures in an organization. The exposureto cyber-attacks in many organizations comes from the negligent behavior of employees.Leaders should educate employees regularly on the best practices to protect the business toreduce the employees’ negligent conduct. Establishing a security culture could also beachieved through relationship building, which entails building the right workingenvironment to help employees work in the organization’s interest.Moreover, the executive leadership team should be interested in upholding cybersecurity and communicating with the employees. Similarly, middle managers should play amore significant role in enhancing security culture since they work directly with them. Theyshould teach employees how to behave in a security-centric way to protect the businessfrom security risks. Establishing a security culture also involves documenting the securitypolicies to help guide employee behavior when it comes to security attacks. Trainingemployees is the most efficient component of establishing a security culture, it may cost anorganization to train, but this helps strengthen a security culture.Finally, individual leadership is the best way of transforming the behavior and practicesof any organization. Methods that help reduce cyber threats within an organization includeplacing aggressive organization structures that review existing gaps in the system. Secondly,the organization can research new threats that require collaborations with a third party. Itcan develop new progressions that might be required to combat new cyber threats, creating2INFORMATION TECHNOLOGYsystems that can counter any cyber breach. Lastly, monitoring data leakage which issensitive and could affect the business if accessed by outsiders. Reducing data transfers,keeping data on external devices may expose it to hackers. This can be prevented byinvolving an expert in cyber security to help know how to secure the devices. The use ofstrong and unpredictable passwords is the best security against cyber-attacks. Softwareupdates are also essential since their companies continually update them to make theproducts more secure from cyber-attacks (Langer, 2017).Digital TransformationIt can be explained as the use of digital technology to change services being deliveredto consumers. As a result, IT leader needs to interrelate with the user more openly inpartnership with their business employees. The consumer needs change in this perspective,and the IT team needs to come up with something that suits them. Digital leaders have anessential role in helping their organizations navigate the change to the digital era.Developing the digital sets to elevate the business stream requires a dynamic leader in therapidly changing world. A cohesive leader can develop ways of transforming the businessby seeing opportunities through the use of IT. However, digital leaders are not required tobe technology experts. Their capability to produce the business value of digital changes iswhat makes them different from other leaders. Business change is a long-term strategy, andleaders should view it as an investment, not in terms of the costs involved.The IT leader should become more creative; the leaders have to develop solutions tobusiness problems. The answers may keep changing since the climate changes rapidly, sothe leader should be more aggressive. Quality requirements become more complex; this isimportant as customer needs are an essential part of any organization. IT leaders shouldcontinuously be able to deliver this to their organization. Interaction with the consumers to3INFORMATION TECHNOLOGYdetermine their needs is critical since the necessities keep changing from time to time. ITleaders must make the change process continuous in the organization until it becomes aculture not to lag. They accept that change can occur and develop mechanisms to cope withchange whenever it happens (Langer, 2017).Methods leaders can utilize to enhance their change of attitude. They are embracing thechange more positively before expecting the employees to adapt. When they see their leaderdoing the right thing, then they will quickly follow. Ensuring the transition is necessary andcan readily be accepted and recognized that evolution is a norm that is expected to happenevery other time in the digital world.4INFORMATION TECHNOLOGY5Referencehttps://drive.google.com/file/d/1IOPKpGGbay8LGDEAklDq2oAGC6hR8xn4/view?usp=sharinghttps://drive.google.com/file/d/1OejvUWLHQ-Hw78mSb6hYy8BOea1JIpNX/view?usp=sharingLanger, A. M. (2017). Information technology and organizational learning: Managingbehavioral change in the digital age. CRC Press.OUTLINEInformation TechnologyThesis statement: Establishing a security culture means creating and evolving new securitycultures in an organization.•Establishing a Security Culture•Digital TransformationHi, find attachedRunning Head: INFORMATION TECHNOLOGYInformation TechnologyStudent’s NameInstitutionDate1INFORMATION TECHNOLOGYInformation TechnologyEstablishing a Security CultureA security culture is a policy that encourages employees to accomplish their day-to-dayactivities in conjunction with the organization’s security policies. Establishing a securityculture means creating and evolving new security cultures in an organization. The exposureto cyber-attacks in many organizations comes from the negligent behavior of employees.Leaders should educate employees regularly on the best practices to protect the business toreduce the employees’ negligent conduct. Establishing a security culture could also beachieved through relationship building, which entails building the right workingenvironment to help employees work in the organization’s interest.Moreover, the executive leadership team should be interested in upholding cybersecurity and communicating with the employees. Similarly, middle managers should play amore significant role in enhancing security culture since they work directly with them. Theyshould teach employees how to behave in a security-centric way to protect the businessfrom security risks. Establishing a security culture also involves documenting the securitypolicies to help guide employee behavior when it comes to security attacks. Trainingemployees is the most efficient component of establishing a security culture, it may cost anorganization to train, but this helps strengthen a security culture.Finally, individual leadership is the best way of transforming the behavior and practicesof any organization. Methods that help reduce cyber threats within an organization includeplacing aggressive organization structures that review existing gaps in the system. Secondly,the organization can research new threats that require collaborations with a third party. Itcan develop new progressions that might be required to combat new cyber threats, creating2INFORMATION TECHNOLOGYsystems that can counter any cyber breach. Lastly, monitoring data leakage which issensitive and could affect the business if accessed by outsiders. Reducing data transfers,keeping data on external devices may expose it to hackers. This can be prevented byinvolving an expert in cyber security to help know how to secure the devices. The use ofstrong and unpredictable passwords is the best security against cyber-attacks. Softwareupdates are also essential since their companies continually update them to make theproducts more secure from cyber-attacks (Langer, 2017).Digital TransformationIt can be explained as the use of digital technology to change services being deliveredto consumers. As a result, IT leader needs to interrelate with the user more openly inpartnership with their business employees. The consumer needs change in this perspective,and the IT team needs to come up with something that suits them. Digital leaders have anessential role in helping their organizations navigate the change to the digital era.Developing the digital sets to elevate the business stream requires a dynamic leader in therapidly changing world. A cohesive leader can develop ways of transforming the businessby seeing opportunities through the use of IT. However, digital leaders are not required tobe technology experts. Their capability to produce the business value of digital changes iswhat makes them different from other leaders. Business change is a long-term strategy, andleaders should view it as an investment, not in terms of the costs involved.The IT leader should become more creative; the leaders have to develop solutions tobusiness problems. The answers may keep changing since the climate changes rapidly, sothe leader should be more aggressive. Quality requirements become more complex; this isimportant as customer needs are an essential part of any organization. IT leaders shouldcontinuously be able to deliver this to their organization. Interaction with the consumers to3INFORMATION TECHNOLOGYdetermine their needs is critical since the necessities keep changing from time to time. ITleaders must make the change process continuous in the organization until it becomes aculture not to lag. They accept that change can occur and develop mechanisms to cope withchange whenever it happens (Langer, 2017).Methods leaders can utilize to enhance their change of attitude. They are embracing thechange more positively before expecting the employees to adapt. When they see their leaderdoing the right thing, then they will quickly follow. Ensuring the transition is necessary andc…

Order a unique copy of this paper
(550 words)

Approximate price: $22

Our Basic features
  • Free title page and bibliography
  • Plagiarism-free guarantee
  • Unlimited revisions
  • Money-back guarantee
  • 24/7 support
Our Options
  • Writer’s samples
  • Expert Proofreading
  • Overnight delivery
  • Part-by-part delivery
  • Copies of used sources
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

AcademicWritingCompany guarantees

Our customer is the center of what we do and thus we offer 100% original essays..
By ordering our essays, you are guaranteed the best quality through our qualified experts.All your information and everything that you do on our website is kept completely confidential.

Money-back guarantee

Academicwritingcompany.com always strives to give you the best of its services. As a custom essay writing service, we are 100% sure of our services. That is why we ensure that our guarantee of money-back stands, always

Read more

Zero-plagiarism tolerance guarantee

The paper that you order at academicwritingcompany.com is 100% original. We ensure that regardless of the position you are, be it with urgent deadlines or hard essays, we give you a paper that is free of plagiarism. We even check our orders with the most advanced anti-plagiarism software in the industry.

Read more

Free-revision guarantee

The Academicwritingcompany.com thrives on excellence and thus we help ensure the Customer’s total satisfaction with the completed Order.To do so, we provide a Free Revision policy as a courtesy service. To receive free revision the Academic writing Company requires that the you provide the request within Fifteen (14) days since the completion date and within a period of thirty (30) days for dissertations and research papers.

Read more

Privacy and Security policy

With Academicwritingcompan.com, your privacy is the most important aspect. First, the academic writing company will never resell your personal information, which include credit cards, to any third party. Not even your lecturer on institution will know that you bought an essay from our academic writing company.

Read more

Adherence to requirements guarantee

The academic writing company writers know that following essay instructions is the most important part of academic writing. The expert writers will, therefore, work extra hard to ensure that they cooperate with all the requirements without fail. We also count on you to help us provide a better academic paper.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2020 at 10:52 AM
Total price:
$26
The price is based on these factors:
Customer Academic level
Number of pages required
Urgency of paper