Monday, February 24, 2020

The Impact of (items choose from the requirement) on the culture of an Essay

The Impact of (items choose from the requirement) on the culture of an organisation 2232 - Essay Example The current paper analyses the importance of power, politics, conflicts and negotiations and how they impact organizational culture and the employees. Power can be essentially described as the ability to make someone do something as per ones will. It is the ability to make things happen as one desires and as they direct others. Power can essentially be described as the influential mechanism one has over others. If an organization lets employees work as they wish without exercising power, they might escape from responsibilities and remain less serious about work. In order to make employees work, it becomes essential to exercise a certain degree of power. It is generally observed that power implemented legitimately is most beneficial. Frequent and over exercising of power may lead to employees feeling over dominated and pressurized (Lawrence, et al., 2005). This might negatively impact performance (Mumby, 2001). Power in an organization should always be directed towards enhancing organizational productivity. Mangers must ensure that while exercising power, they must not display rudeness, anger or ego. Power should be exhibited in a motivating and directive manner. Managers must ensure that power does not induce fear and resentment amongst employees. This would prevent them from sharing their problems and issues with the superiors. The power to direct and guide employees must be vested in the hands of able leaders who understand the needs of both the organization and the employees (Mumby, 2001). Threatening employees, with job loss or severe actions to make them to do their work is not an effective way to exercise power (Lawrence, et al., 2005). Organizational politics can be described as the act of giving more importance to one’s own interest without giving much consideration to the needs of others. Political influences are common in

Friday, February 7, 2020

Cis333 week 6 case study 2 Example | Topics and Well Written Essays - 1000 words

Cis333 week 6 2 - Case Study Example The increase in information related crimes is responsible for presence of enhanced information security in organizations today (Lindsey, 2014). Technically, motivations for information related crimes are attributed to the economic importance of private information in technology platforms. For example, cyber attackers seek secret and valuable information either for economic benefits or for terrorism related causes. Whatever the motivating factors, organizations handling private information have a duty to protect and prevent valuable information from ending up into wrong hands. Consequently, organizations typically utilize information security systems like Microsoft Server Active Directory domains, and Public Key Infrastructure to foster information security. Undeniably, some information security systems are better than others. As the Information Security Director for a software company, I would prefer the use of Public Key Infrastructure to Microsoft Server domain in safeguarding vital information inside the organization. Technically, Public Key Infrastructure, commonly abbreviated as PKI, is a system of standardized policies and sequenced procedures meant to secure the sharing of information (Kim & Michael, 2014). In the past, hackers have successfully penetrated network infrastructures by employing tactics like sniffing, man-in-the-middle attack, and denial-of-service among others. These hacking tactics are usually easy to apply when attacking non encrypted networks. In this context, information security developers have learned the benefits of encryption, and distribution of authentication components through independent digital certificates. In essence, Public Key Infrastructure combines the concepts of digital certificates and key en cryption in maintaining network security (Carlisle & Lloyd, 2013). Digital certificates are essentially digitized signatures of the certificate’s holder. In conventional platforms, digital certificates would be