This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Career

A draft for a project paper

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

 

 

 

A draft for a project paper

Student’s name:

Professor’s name:

Course:

Date:

 

 

Information assurance refers to a set of protective and defense measures used to support maintenance information and information technology elements such as confidentiality, integrity, availability, non-repudiation, and authentication (Soomro, Shah & Ahmed, 2016). This article outlines a compact draft of a research project paper by concentrate on influential factors, organizational dynamics, supportive leadership style, and the change strategy/ change model that can best be utilized for information security changes.

As people continue to implement and adjust to new technology, the vulnerability of exposing the five elements of information also continues to increase, leading to an increase in more demand for data protection and securing of information (Soomro, Shah & Ahmed, 2016). The new environment formed by technology changes is, therefore, one of the primary factors that contribute to more need in changing information assurance. An increase in information management complexity is also another factor that contributes to the need for change in the management of information assurance. On the other hand, the increase in managerial complexity demands more understanding about management roles in the process of information assurance change initiatives.  Looking at this, I feel more compelled to understand in detail about technology trends such as Artificial intelligence, cloud computing, and electronic communication. How these trends influence information assurance changes initiative? In the research paper that I intend to produce, I will focus more on these issues by giving in-depth details that revolve around them.

Moreover, an increase in cybersecurity issues such as data breach, infection with malware, and phishing has led to more urgency in implementing advanced security control and development in a professional approach (Soomro, Shah & Ahmed, 2016). For example, due to the increase in maintenance complexity change, agents such as leaders continue to look for new ways to ensure that their organization stays safe and secure from emerging threats. Growth in engagement and collaboration practices in businesses also demands more accessibility to organization information. Most investors are also looking for better security measures that would protect information and organization IT systems as well as promote inclusive involvement of every stakeholder (Ključnikov¹, Mura & Sklenár, 2019). Maintaining a balance between the two factors is not easy, and most organizations have started to use other strategies such as developing awareness and educating their workforces concerning information assurance. An increase in the need to reduce cost, remove factors that conflict with the mission statement and enforcement in adherence to policy changes also drive for information assurance changes initiative. This is a simple outline for my research proposal, and any reader who will be going through this research will benefit from a rich literature that integrates all these influential factors to the essentials for managing information assurance changes initiatives in any given organization or individual.

From the context above, a keen reader would notice that leadership (investors, leader agent, management) plays a crucial role during the implementation of the information assurance change initiative. Generally, it is also clear that if a user does not have a clear understanding of an information security system, the probability of making the wrong decision is usually high. Therefore my research will also include more detail concerning how different types of leadership, such as transformational leadership and transactional leadership, support the implementation of information assurance changes programs in an organization.

The focus on the two types of leadership will include a specific context of information security awareness. For example, a significant part of the paper will give details on how transformational leadership influences information assurance in terms of understands about severity (Flores & Ekstedt, 2016).  It will also look at how this type of leadership enhances the utilization of countermeasures concept in the implementation process. Additionally, the research will identify that transactional leadership is also a significant part of promoting awareness about information security policies, vulnerability evaluation, and the importance of compliances to regulations. The change-oriented characteristics portrayed by transformational leadership include the ability to take the right initiatives even under challenging situations and adapt according to an emerging situation (Flores & Ekstedt, 2016). These factors will farther apply as supportive factors for the successful implementation of information security changes initiatives.

The research describes a change management strategy that uses Kotter’s multi-level change model. The step by step change strategy will help in giving a detailed evaluation of how change can affect an organization and how organizational/ external factors can influence information change initiative. The Kotter’s either step model will include the following (Tang, 2019):

  1. This stage will involve creating an Urgency that fosters the need to changes and motivates personnel in an organization to do things differently. The variable of discussing under this stage will include revealing new threats and opportunities in the information security system, talking about new demand for an increase in security measures, and how an organization can reveal an increase in competition that needs new strategies on how an individual approaches Information technology.
  2. In the research, this stage will focus on forming teamwork and a coalition dedicated to new changes such as change-oriented leaders, influential personnel, and professional employees.
  3. The research will evaluate this stage as the best for developing a change-oriented vision. The main detail in this stage will include how a vision statement helps personnel to understand why it is essential to promote change and the future benefit that will arise as a result of the change.
  4. At this stage, the research will focus on details concerning the importance of communicating the vision formed in the third stage as well as the importance of ensuring frequent to establish awareness.
  5. In the process of developing a vision and influencing personnel to accept information assurance changes, it is likely to face cultural resistance, organizational structural barriers, and regulatory limitation. The purpose of this stage in the research wills strategies that would help to overcome the obstacles.
  6. At this stage, the models emphasize creating short term goals or achievement strategies that will help to motivate the staff in the process of achieving the long term goals. In the research I the short term goals will be arranged in a continuous sequence that promotes consistent achievement in implementing information assurance changes.
  7. According to Kotter’s perspective, change failure in enforcing change mainly occurs due to declaring success at the wrong time. Thus this stage will help to ensure consistent success in implementing information assurance changes according to advancement in technology.
  8. This is the final stage, and in the research, it will focus on how an organization can merge the transition into the organization culture to transform into a stable part of the core activities of the firm.

 

 

References

Flores, W. R., & Ekstedt, M. (2016). Shaping the intention to resist social engineering through transformational leadership, information security culture, and awareness. computers & security, 59, 26-44.

Ključnikov¹, A., Mura, L., & Sklenár, D. (2019). Information security management in SMEs: Factors of success.

Tang, K. N. (2019). Change management. In Leadership and Change Management (pp. 47-55). Springer, Singapore.

Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs a more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask