Author Question: An organization does not implement countermeasures against information threats; instead it simply ... (Read 48 times)

imanialler

  • Hero Member
  • *****
  • Posts: 539
An organization does not implement countermeasures against information threats; instead it simply absorbs the damages that occur. This approach is called ________.
 
  A) risk acceptance
  B) risk reduction
  C) risk mitigation
  D) risk transference
  E) risk rescheduling

Question 2

Explain the organizational issues associated with implementing an Enterprise 2.0 strategy strictly from the perspective of organizational hierarchies, technological inertia, and security concerns.
 
  What will be an ideal response?



kishoreddi

  • Sr. Member
  • ****
  • Posts: 329
    • Your online Help in Biology and chemistry
Answer to Question 1

A

Answer to Question 2

Often, Enterprise 2.0 initiatives are driven by user departments, and small-scale pilot implementations appear to work quite well. However, organization-wide Enterprise 2.0 implementations typically need changes in terms of organizational culture and processes and often the flattening of organizational hierarchies. Therefore, to be successful, Enterprise 2.0 implementations need the support and active involvement of senior management so as to cope with the large magnitude of changes.

One factor hindering the adoption of many new technologies is technological inertia. In many cases, people are not willing to switch to new applications unless they see real, tangible benefits. This can be especially a hindrance with social media applications, many of which incorporate a variety of other tools.

A final issue is related to security and intellectual property. For organizations, securing their information systems infrastructure is of paramount concern. Any application that allows closer collaboration by increasing data sharing will necessarily incur greater risks of security breaches. Companies thus have to balance their desire for enhancing collaboration with the need to protect intellectual property and comply with rules and regulations such as the Sarbanes-Oxley Act.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Each year in the United States, there are approximately six million pregnancies. This means that at any one time, about 4% of women in the United States are pregnant.

Did you know?

Asthma-like symptoms were first recorded about 3,500 years ago in Egypt. The first manuscript specifically written about asthma was in the year 1190, describing a condition characterized by sudden breathlessness. The treatments listed in this manuscript include chicken soup, herbs, and sexual abstinence.

Did you know?

Though Candida and Aspergillus species are the most common fungal pathogens causing invasive fungal disease in the immunocompromised, infections due to previously uncommon hyaline and dematiaceous filamentous fungi are occurring more often today. Rare fungal infections, once accurately diagnosed, may require surgical debridement, immunotherapy, and newer antifungals used singly or in combination with older antifungals, on a case-by-case basis.

Did you know?

HIV testing reach is still limited. An estimated 40% of people with HIV (more than 14 million) remain undiagnosed and do not know their infection status.

Did you know?

In 1835 it was discovered that a disease of silkworms known as muscardine could be transferred from one silkworm to another, and was caused by a fungus.

For a complete list of videos, visit our video library