Pg. 01 |
Special Instructions Don't use plagiarized sources. Get Your Custom Essay on
IT Security and Policies
Just from $13/Page
|
(
Project
Deadline: Tuesday 31/03/2020 @ 23:59
[Total Mark for this
Project
is
9
]
) (
IT Security and Policies
IT409
)
(
Instructions:
You must submit two separate copies
(one Word file and one PDF file)
using this Template
on Blackboard via the allocated folder. These files
must not be in compressed format
.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text
must not
be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use
Times New Roman
font for all your answers.
) (
Student Details:
Name:
###
CRN
:
###
ID:
###
Group : ###
)
College of Computing and Informatics
To answer the questions effectively, please follow the below instructions:
· Each team might contain three students. Each student must conduct an interview with cybersecurity employee in the chosen company as individual, which mean each group should have
three filled questionnaires
.
· Use your analysis skills to analyze all data collected by your team.
· It is possible to measure the significance of collected data by countering the frequency of each item (i.e. if the item frequent three times, this mean it is very significant)
· You should answer the questions in this research activity as group.
______________________________________________________________________
(
Learning Outcome(s):
LO
1, LO2, LO3, LO4, LO5, LO6
) (
4
Marks
)Questionnaire
Section 1.0: Introduction
In this era, the revolution of information technology is changing several aspects of enterprises’ practices. One of these changes is many enterprises make their systems available online. This most likely is encouraging cyber criminals to hack these systems. One of the approaches that help to mitigate cybersecurity risks is adopting of Information Security Policy (ISP). However, it is not known to what extent the enterprises in Saudi Arabia are adopting Information Security Policy in general, and in small and medium enterprises’ (SMEs) in particular. This research project aims to discover the success factors for the adoption of Information Security Policy in Saudi SMEs.
Section 2.0: Profile of Responding Manager or Owner
Please indicate
1. Your job role:
Owner
Chief Executiveofficer (CEO)
Manager
Other (Please specify):
2. Your gender:
Male
Female
3. How many years have you been working for the organization?
< 1 year
1 – 5 years
6 – 10 years
Over 10 years
Section 3.0: Profile of Responding Enterprise
1. Please indicate the sector of business area of your organization
Food & Drink
Entertainment/Culture
Retail/wholesale
Restaurants
Cleaning
Commercial & Creative Arts
Financial Broker Services
Information Technology
Furnishings/Home Products
Real Estate Services
Telecommunication
Automotive
Health & Caring Services
Education/Training
Clothing, Fashion & Beauty
Professional Services
Retail/wholesale
Other: (Please specify)
Entertainment/Culture
Employment Agency
2. Please indicate your organization’s approximate revenue
Technological (T) Factors
1. Availability of technical Expertise
· Availability of cybersecurity consultant facilities the adoption of ISP in our enterprise
1
2
3
4
5
· Availability of IT staff trained in cybersecurity facilities the adoption of ISP in our enterprise
1
2
3
4
5
2. Complexity
· Perceived low level of complexity in cybersecurity systems facilities the adoption of ISP in our enterprise
1
2
3
4
5
· Ease of using cybersecurity systems facilities the adoption of ISP in our enterprise
1
2
3
4
5
3. Cybersecurity systems Cost
· Low cost of cybersecurity systems facilities the adoption of ISP in our enterprise
1
2
3
4
5
· Availability of cybersecurity systems vendors help to reduce the cost which in turn facilities the adoption of ISP in our enterprise
1
2
3
4
5
Organizational (O) Factors
1. Security Concerns
· The powerful of cybersecurity systems facilities the adoption of ISP in our enterprise
1
2
3
4
5
· Perceived cybersecurity risks encourage our enterprise to adopt ISP
1
2
3
4
5
· Presence of trust in enterprise’s cybersecurity systems help to adopt ISP
1
2
3
4
5
2. Training
· Availability of periodical cybersecurity training help to adopt ISP
1
2
3
4
5
· Encourage our employees to get professional certificates in cybersecurity that facilitates the adoption of ISP
1
2
3
4
5
· Conducting cybersecurity training courses for non-IT employee that facilitates the adoption of ISP
1
2
3
4
5
3. Top management support
· Top management committed to support cybersecurity adoption in our company (enterprise)
1
2
3
4
5
· Top management in our company(enterprise) is fully aware about the importance of cybersecurity advantages which in turn facilitatesthe adoption of ISP
1
2
3
4
5
· Availability of technical background for the top management in our company help the adoption of ISP
1
2
3
4
5
· The willingness of top management to develop our companyhelp the adoption of ISP
1
2
3
4
5
4. Organizational Awareness
· The high level of cybersecurity awareness of our employeeshelpsto adopt ISP easily
1
2
3
4
5
5. Organizational Culture
· Emphasis growth through developing new ideasthat facilitates the adoption of ISP
1
2
3
4
5
· Employee’s loyalty for our company(enterprise)that facilitates the adoption of ISP
1
2
3
4
5
· Willingness of our company (enterprise)to achieve its goalsthat facilitates the adoption of ISP
1
2
3
4
5
Environmental (E) Factors
1. Cybersecurity Law
· The presence of cybersecurity law in Saudi Arabiafacilitatesthe adoption of ISP
1
2
3
4
5
· Our company(enterprise) awareness about the cybersecurity lawfacilitates the adoption of ISP
1
2
3
4
5
2. External Pressure
· Competitors’ pressure encourages our company to adopt ISP
1
2
3
4
5
· Customers’ pressure encourages our company to adopt ISP
1
2
3
4
5
· Suppliers’ pressure encourages our company to adopt ISP
1
2
3
4
5
· Government’s pressure encourages our company to adopt ISP
1
2
3
4
5
Other: Please indicate ….
(
1
Marks
)Q (
Learning Outcome(s):
LO
2
)uestion One
Write down in more details, how did each member of your team select the participating company?
Based on your analysis for section 2, 3, and 4 of all questionnaires that were collected by your team, what are the significant items? Support your answer by providing an example from your collected data.
(
2
Marks
) (
Learning Outcome(s):
LO 5
)Question Three
Identify the significant factors in section 5 of the questionnaires collected by your team? Discuss the findings from your point of view?
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.