This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Monitoring in the organization- rationale, extent and potential issues

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Monitoring in the organization- rationale, extent and potential issues

An organization installs a range of monitoring equipment to ensure that workers are committed to their work. Monitoring systems can provide evidence, and employees get the chance to correct their mistakes in case they have committed something wrong. Monitoring can be regarded as a safety measure. Particularly in a hazardous work environment where safety issues might occur regularly, it is vital to install monitoring systems.

The need for monitoring activities of workers

In an organization, security is a vital force because organizations deal with huge information. The information is valuable, and it is necessary to combine internal controls and systems to protect that information. Breaches occur mostly due to the error of employees. Hence, monitoring is necessary to track their activities and manage their actions. Again, the physical security of the firm can be enhanced by installing networks and systems that prevent data loss or data breaches. The activities of employees can be monitored using CCTV, intrusion detector, Guards, Intrusion alarm, and Motion detectors (CISM, 2009). These systems would keep track of the activities of employees, and they are not likely to commit activities that go against the organization.

Don't use plagiarised sources.Get your custom essay just from $11/page

Degree and rationale behind monitoring

Monitoring often seems like a need when managers do not trust employees. It might give a negative impression, and employees might feel controlled or being watched 24/7, which is challenging mentally (Martin & Freeman, 2003). Nevertheless, managers should suppose that monitoring would ensure organizational safety and protection of equipment, digital as well as physical assets. Managers should rationalize the fact that the protection of organizational assets should be one of the primary concerns. Therefore, they can determine the degree to which they will monitor the activities of workers.

The extent to which user actions should be monitored

Traffic and user actions should be monitored after considering an extent. Monitoring activities should not interfere with the privacy of users. Nevertheless, it is vital to know the move of every user by using the activity monitoring software. This is necessary because an organization cannot bear the cost of data loss or data breaches. It is right to monitor their activities with the help of video recordings, kernel monitoring, and log collection (De Souza & Redmiles, 2011). Apart from that, it is wrong to invade their privacy. Insider threat is a severe issue, and malicious attacks can permanently hamper the organizational operations. Therefore, securing the business environment has become a necessity.

Ways of mitigating issues related to monitoring activities of users

Insider threat mainly refers to the harmful activities of users, and therefore, the risks can be mitigated by identifying the critical assets of the firm and present state of those assets. Monitoring decisions must be based on the availability of resources, money, as well as authority. In order to mitigate the risks, it is necessary to develop a proper threat program and indicates the implementation of legal procedures, IT security, HR, and physical security. Participation of everyone should be encouraged, and it is necessary to oversee the effectiveness of the program.

 

 

 

References

CISM, W. (2009). Information security management metrics: a definitive guide to effective security monitoring and measurement. Auerbach Publications.

De Souza, C. R., & Redmiles, D. F. (2011). The awareness network, to whom should i display my actions? and, whose actions should i monitor?. IEEE Transactions on Software Engineering37(3), 325-340.

Martin, K., & Freeman, R. E. (2003). Some problems with employee monitoring. Journal of Business Ethics43(4), 353-361.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask