Thursday, October 10, 2019
Case Study You Are Your Own Worst Enemy Essay
Gen Y are shown to be a substantial security risk to organizations because Gen Yââ¬â¢s download and use non-sanctioned IT Tools while at work or using company technology and often compromising software like instant messaging software and open-source technologies. Whatââ¬â¢s happening is quite simple, but very dangerous. Having/using them on company technology opens a door for hackers and data thieves to enter unnoticed into your organizationââ¬â¢s information assets. But Gen Y are not even aware that they are causing potential compromises. Question and Answer( Legend:Q=Question,A=Answer) Q1. Think of yourself as a business manager. You have employees you supervise and you are responsible for ensuring that they meet daily work quotas. But, you find they are spending a couple of hours per day shopping online, chatting with friends through instant messaging, and so on. How do you motivate your employees to perform their work? How do you restrict them from non-work-related activities without creating a stifling, boring, and dull workplace? A1. As a manager, I am responsible and takes charge of all the activities that involve in my company and it is very necessary for me to have an employee which has a knowledge to perform and listen to their task properly and willing to abide the rules and regulation of my company. Discipline is a must. They should focus to their job assignment and use their time properly especially during working hours. And as a Manager I must know what the different types of Managerial functions . And one of it is directing that refers to motivation, communication and leadership. I am the Manager so I will be the one to motivate my employees by communicating them with the power of leadership. To motivate them to perform their work I will give them incentives or rewards to make them productive. I may increase their wages to encourage them to perform their task well. By restricting them I think will not work because their life are attach to the technology ââ¬â that most of the time of their work they are in front of the computer that maybe will tempt to open a social networking site or shopping site that is not related to their work. I will not totally restrict them but instead I will allow them to do their non-work-related activities during breaktime. They deserve a little break that will make them calm and not so stressful. I will take a survey from them that deals with knowing what they would suggest in order to have a pleasant workplace that will affect them in a good way. In that, my employees will be encourage to work well. Q2. The case study mentioned the need for employee education. What elements would you include in an education program for helping employees better understand the dangers in which they place the organizationââ¬â¢s IT infrastructure by using technology the wrong way while at work? A2. It is better to conduct an orientation the moment that they are employed in the company. This will help them to have a better understanding regarding to their task such as the general rules and regulations and the proper using of the IT infrastructure of the company. Using technology in the wrong way while at work will cause a great damage and failure to do their task in the company. Sometimes it will be lost of the company and their reputation will destroy. And also I can include short cases of organizations that have been compromised because of unsafe software, having a fellow Gen Y person make the presentation, showing safe computing habits.I will alsoinclude the things that can happen in the organization if the employees are continuous in doing things online that are not related in their work, also the harmful effects on it not just on organization but on them also that they will no longer focused on their work responsibilities and they taking their work at risk that they can be fired and out of the company.. Q3.Beyond the compromises caused to IT infrastructure, what do you see wrong with shopping online while at work? Is this illegal or unethical, perhaps both, or neither? A3.Nothing is wrong about the shopping online because itââ¬â¢s your money that you spending with but during your work it is both illegal and at the same time unethical.It is said to be illegal because before working at the company, there is a certain contract that they should sign stated that they should abide the rules and regulations of the company, including: the proper used of their time for their work and do their task without doing unnecessary actions such as chatting with the others. Also, it is unethical because it could be unfair to the others who were doing their task properly while the others are just wasting their time, having their salary doing wrong things. You employed in the organization to work, you are subjected to work with all of your knowledge, skill and focused because your being paid by the company and doing something not related to your work is not good. Itââ¬â¢s definitely grounds for dismissal from employment.But then, people may or may not see it as u nethical, because so many people do it. Q4.Read the acceptable use policy (AUP) for your school. Are you doing anything with your schoolââ¬â¢s technology that violates the AUP? If so, what is it? How prevalent among other students is the violation? Does widespread violation somehow or another make it okay? A4.(Since our school have no AUP, answers are based on computer laboratory ordinance,rules and regulations).Yes, sometimes I play games installed in the computer which is strictly prohibited based on the ordinance issued by th President.It is very common since students have saved games on their flash drives and through this they can install and play games they want anytime but they make sure that they do this in the absence of their teachers.No, because even violation is widespreaded after the next day they will do it again and again. Q5.Why do you think Gen Y is being singled out? Wouldnââ¬â¢t it make sense that people in other age groups also put a company at risk by misusing technology? What is so different and unique about Gen Y? A5.Generation Y grew up with technology and rely on it to perform their jobs better. Gen Y is the digital generation, and thus uses technology more, especially those types of tools that can compromise security. Yes, other age groups misuse technology but not to the extent of Gen Y. As law firms compete for available talent, employers cannot ignore the needs, desires and attitudes of this vast generation. Millennials grew up with easy access to computers, constant connection to the internet, and smart phones in-hand. Theyââ¬â¢re accustomed to using technology in every part of their lives and fully believe in its power to make their lives easier. This generation dreams without limits. Theyââ¬â¢re in search of two things ââ¬â money and happiness. Q6.Would you consider working for a company that prohibited access to social networking sites, gaming, blogs, and online shopping while at work? Why or why not? How about in the defense industry? In certain places within defense organizations, youââ¬â¢re not allowed to carry cell phones and the like because you can take photos and videos with them. Do you want to work there? Why or why not? A6.Yes. Working in the company that prohibited access to social networking sites, gaming, and online shopping is something gives discipline to the employee regarding doing something not related to their work and also these things must be done not in your workplace but in your own place like in your house and in your own computer. In the company that cell phones and other similar to it that can take pictures and videos are not allowed, why or why not work in this kind if organization? For me itââ¬â¢s alright ,we all know that cell phone is convenience way to communicate to others most of the time in emergency, so not carrying cell phone is hard for me to follow but if the company is great and thereââ¬â¢s a lot of benefits or good salary for their employees I will, they just do it for their own safety.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.