IT Security Culture Transition Process
|
|
|
- Isabella Norris
- 10 years ago
- Views:
Transcription
1 319 T Security Culture Transition Process Leanne Ngo Deakin University, Australia NTRODUCTON The information superhighway is here and stretching further than the eye can see. Our working environment is becoming ever more hectic and demanding, computers and information technology are more pervasive, and limitations are perishing. The once solo dimension of information and technology is now multifaceted and convoluted in disposition (Ngo & Zhou, 2005). As a result, organizations need to be more vigilant than ever in actively responding to new information and technology challenges and to ensure survivability in this new age. Over the years many information technology (T) approaches technical, managerial, and inst itutionalization have surfaced. Also safeguards and countermeasures have been developed, practiced, and learned within organizations. Despite all these attempts to reduce and/or eradicate T threats and vulnerabilities, the issue still continues to be problematic for organizations. Solutions are needed that will reach the core of the problem safeguarding and controlling humans the human aspect of T. Humans are a pervasive element in our businesses and critical infrastructures, the element which interacts with systems, services, information, and information technology. Furthermore, humans are responsible for the design, development, operation, administration, and maintenance of our information systems and resources. Therefore the ultimate success of any effort to secure information resources depends largely on the behavior and attitudes of the humans involved. While technological solutions can solve some information problems, even the finest technology cannot succeed without the cooperation of humans. T is not just a technical problem that can be solved with technical solutions, but also a human problem that requires human solutions. This article reviews the current literature on the human aspect of T within an organizational context. Human-related T concerns are summarized, and current human-related T solutions are examined and discussed. n this article, we consider T culture as a plausible solution to improving T -related behavior and attitudes of humans. We present our T culture transition model that is currently being trialed in three organizations to assist with increasing T awareness and hence improve the T culture of the individuals (managers and employees) and overall organization. Further, we discuss the potential individual psychological experiences of managers and employees during the transitional change towards T culture change. BACKGROUND Human-related T problems relate to how people associate themselves and interact with. Here, human-related T problems are presented as well as current human-related solutions regarding the controlling and management of the human-side to T. Human-Related T Security Problems Human factors impeding T within an organizational context with examples include: 1. How humans perceive risk people: People do not know to analyze risk properly and therefore this leads to improper actions. 2. Ability to make decisions: Organizations cannot expect general employees to be T experts on top of their daily work. 3. Human memory limitations: This is a result of our inability to remember numerous and complex passwords. 4. Trust: We must have faith and confidence in the of our computers. 5. Usability: This includes individuals trading off between and practicality. Copyright 2008, G Global, distributing in print or electronic forms without written permission of G Global is prohibited.
2 6. Social engineering: This means being manipulated to do things we would not normally do. These human factors stem from the norms of natural human tendencies. Natural human tendencies suggest that humans are emotional, manipulative, and fallible. For example, humans want to get their job done and want to be helpful. People are helpful and therefore as a consequence are easily deceived, as exemplified by the success of social engineering attacks (Mitnick & Simon, 2002). Furthermore, humans are irrational and unpredictable. Unlike computers that can be programmed to process instructions in some logical order, humans on the other hand are irrational and complex and do unpredictable things. Barrett (2003) states for all the cleverness that organizations put into formulating creative, innovative, and secure efforts, they all can be breached if the users are reckless, therefore insinuating that recklessness and carelessness are common natural human tendencies. Natural human tendencies put an organization at risk of many -related threats. A better understanding of these predispositions will provide organizations and the greater community with a better chance of protecting and securing the human aspect of information. Current Human-Related T Security Solutions Current human-related T solutions encompass understanding the human aspects and enforcing compliant behaviors and attitudes towards T. These current solutions include: Behavioral Auditing for Compliance: Current auditing () methods do not cover effectively the behavior of the employees. Vroom and von-solms (2004) proposes the concept of behavior auditing for compliance as a way of understanding, identifying, and resolving T -related human behavior concerns. However, auditing human behavior is very difficult to attain reliable and valid results due to humans being unpredictable by nature. T Security Policy: T policy has the potential to enforce compliant behavior and attitudes of employees (Wood, 2004). T policies are a set of rules that outline how information and technology is to be protected to achieve the organization s goals. This allows humans to understand what is expected from them and be accountable for their actions. Simply telling people to behave in a certain way can be one option, but managers should not expect human to always act as prescribed. Also, reiterated by Dekker (2003), procedures do not rule human behavior and suggest that procedures should be seen as resources for action instead of an expectation about human behavior. Security Training and Education Programs: A good training program helps improve a user s decision-making skills by providing them with the necessary knowledge about threats and the consequences of their actions (Leach, 2003). With the growing numbers of mobile employees, enterprises are at greater risks due to their employees with inadequate understanding of current threats and risks to their computers. This simply illustrates the need for better education on current threats and best practices for humans. Ethical Standards of Behavior: Eloff and Eloff (2003) and Jones (2004) researched ethical standards of behavior related to and asserted that in order to change a user s behavior, there needs to be some form of guidelines on which to base such behavior. The authors maintained that following such established guides like the EEE professional code can promote good behavior and influence others to do so. Leveraging off technology to reduce human error: T systems have become increasingly complex. Consequently, human errors resulting from operating these systems has increased. Experts have highlighted how T has now gone beyond legitimate users control to use information systems honestly and appropriately without causing a breach. Legitimate users such as employees are more likely to put a priority on getting their work tasks completed rather than think about (Besnard & Arief, 2004). These authors suggest better software design with built-in, that is, invisible to the user. Any approach to human information should aim to achieve transparent that is, built-in either in technology or defused into the daily lives of humans, whereby is not seen as an 0
3 afterthought. t should be easy-to-understand that is, consider usability issues and facilitate decision making. t should be least-effort that is, only ask humans to do as little as possible, as humans do not act or behave as prescribed. t should be continuous and constant that is, whatever the effort, it needs to be persistent to act as a recurring reminder of the importance of. And it must aim to be personal that is, must be taken on board by humans on a private and individual basis in order for humans to take seriously. T Security Culture Culture relates to the way in which things are done in an organization, and thus relates to the behavior and attitude of its members. An ethical culture of is a culture whereby organizational members have strong ethical values that are exhibited in their attitudes and behaviors within the organization s operational environment. A culture whereby organizational members have strong ethical values and beliefs towards their organization s operational environment will have better prospects of successful culture change. Creating a culture means to change the current culture to a more -conscious one. This requires an examination of the current culture. An examination of the current culture will allow an organization to highlight areas that require greatest attention for change. Fostering a culture of means to instill as a way of life. This means integrating into the behavior and attitudes of people towards a -conscious state. The main limitations of creating a culture are that it requires understanding and communication, it is slow and uncertain and difficult to measure whether culture change has taken place (Vroom & von-solms, 2003). Security training, awareness, and education programs are critical in fostering culture within individuals and organizations. These programs will help make employees understand, be responsive, and appreciate the need to act in a responsible mindful way. However, education may not solve all problems, but will at least let users know of the consequences of their actions. Humans should see as a personal gain and benefit to themselves and the overall organization. There are several different methods in which an organization can foster a strong culture. Vroom and von-solms (2004) argue the presence of three cultures within an organization that require change: (1) organization as a whole, (2) groups or departmental, and (3) individual culture. The authors articulate that once group behavior begins to alter, this would influence the individual employees and likewise have an eventual affect on the formal organization (Vroom & von-solms, 2003). This suggests that any organizations attempting to change culture should do so in small incremental steps (Kabay, 1993), and hence should be gradual and voluntary (Vroom & von-solms, 2003). n a short amount of time, the and management literature has produced several key ideas regarding how organizations can foster and instill a culture of within organizations. However, very little has been done to address the transition towards T culture improvement from both an organizational and individual point of view. Noting the key points suggested by the literature, we propose our T culture transition model. T Security Culture Transition (TSeCT) model The TSeCT model proposed by Ngo, Zhou, and Warren (2005) aimed at assisting participating organizations in their research to better meet the organization s desired level of T awareness and culture. Employees needed to understand their roles and responsibilities in order to make informative and morally correct judgments and actions. Our T transition model proposes to detail the roles and responsibilities of managers and employees in the transition process to improve T culture in the workplace. The model places importance on raising awareness of T threats and risks, and associated consequences of T -related behavior and actions towards T and information systems interactivity in the workplace. Our TSeCT model proposes a culture that would see individuals behave in an expected manner when faced with new challenges. We know that technology will always advance. Therefore, giving individuals knowledge of T basics such as threats, risks, and consequences of their actions will allow individuals to gradually adapt to constant change and hence allow us to predict expected behavior.
4 Figure 1. T culture transition model Phase 1: Ending Communicate what has to be changed and reasons for change Phase 2: Neutral Zone Define & steer new requirements and what to do Phase 3: New Beginning Reinforce & commit to new status quo Phase 1: Ending Understand & recognize what has to be changed and reasons for change Management Leaders Employees Followers Phase 2: Neutral Zone Adjust to new requirements and take action Time Phase 3: New Beginning Accept & embrace new status quo The transition model is intended to assist organizations in transitioning towards T culture improvement. The model consists of two main players leaders (managers) and followers (general employees). The model is shown in Figure 1. The model highlights the respective roles and responsibilities of managers and employees. The former has the role of overseeing and managing the process, and the latter adapts and accepts the transition. There are three phases within the model. Phase 1, Ending, requires an understanding of letting something go. n this article s case, it is letting go of the current behavior and apathetical attitude towards T. Management communicates this change, and employees understand and recognize the reasons for change. Phase 2, Neutral Zone, is the fertile ground opened for new requirements and actions to flourish, steered by management, and adjusted and learned by employees. Phase 3, New Beginning, looks towards the improved T culture. Management reinforces and commits to the new status quo, and employees accept and embrace it. The transition process needs to have the commitment and support from management and the understanding and acceptance from employees to have any chance of success. Furthermore, any new ventures intended in any organization require planning and dedication. Transition is the adjustment, development, and change experienced by people within organizations when progressing towards achieving a particular change (Bridges, 2003). Understanding the transition process is crucial for successful organizational information culture change. Furthermore, identifying the key roles of management and employees in the transition process will allow for better understanding of their respective responsibilities. For more explanation and discussion of the model, please refer to Ngo et al. (2005). The TSeCT model is easy to follow with a stepby-step process. Only two major parties are involved: managers and employees. There is no need for technology spending, as it solely focuses on improving the attitudes and behavior of individuals. T Security Culture Transition model: ndividual Context Bridges (2003) asserts that there are two transition processes running concurrently. The first has been discussed, and the second is the individual psychological transition process. When there are changes happening within an organization, the people that are affected by it are also going through their own psychological transitions (acovini, 1993; St-Armour, 2002; Harvard Business School, 2003). Ngo et al. (2005) show in Figure 2 an adaptation of an individual transition process and the psychological experiences as suggested by St- Amour (2001) during each transition phase. n Table 1 we present the personal experiences during each phase of the transition process that managers
5 Table 1. ndividual transitions:managers vs. employees ndividual Transitions Managers Endings Neutral Zone Beginnings ignoring the potential impact of T threats taking a reactive approach to having a false sense of How, when, and what information should communicate to my employees? Will my employees care enough to participate? Do trust my employees enough with extra responsibility? Proactive approach to Supporting and commitment to T culture Understanding of potential T threats and risk Employees ignoring potential impact of T threats not caring about seeing as solely the T team s and manager s responsibility Responsible for organizational Realizing that am part of the team How will change my behavior and attitude to be t T is conscious? How do adjust to the new requirements? am part of the organizational strategy am a conscious employee My interactions with T and conforms to organization s policies and procedures and employees may experience during transitioning towards T culture change. Our example is based on applying Bridges (2003) framework of transition and St-Amour s (2001) individual transition process. Table 1 shows this example. FUTURE TRENDS Human T research will give us a better understanding of human factors associated with T which is fundamental to the understanding of how humans interact and behave towards T. This knowledge can aid in providing the basis for proposals of possible approaches and measures to manage the human aspect of T. Human T research will help to raise awareness among those who are unacquainted with the potential detrimental threats and risks that humans can cause. Therefore, it is anticipated that this research will generate a great deal of interest, not only by corporations and governments, but to the general public. Our future research project will focus on this research gap to promote T awareness and establish an T culture within organizations. Furthermore, an T awareness and culture assessment tool will be a direct outcome of this research, which will be available to participating Australian organizations. CONCLUSON Human-related problems should be addressed with human solutions. Technical solutions, although important, cannot be the only means for solving human
6 problems, and any approach should focus on solutions tailored to solving the human problem. Understanding and having a well-planned transition process is crucial for successful organizational information culture change. Furthermore, identifying the key roles of management and employees in the transition process will allow for better understanding of their respective responsibilities. This article addressed the key roles and responsibilities for managers and general staff in improving the T culture in an organization s operational environment. The model highlighted the importance of understanding the transition process required for T culture change. We reviewed the key developments with T culture research. Our model was developed based on key T culture research and Bridges (2003) transition process framework. Furthermore, we highlighted that individuals such as employees and managers go through their own psychological transition concurrent to the organization. We provided an example of the psychological transition process that managers and employees may go through when transitioning towards T culture improvement. We based our example on Bridges (2003) transition process and St-Amour s (2001) individual transition framework. REFERENCES Barrett, N. (2003). Penetration testing and social engineering: Hacking the weakest link. nformation Security Technical Report, 8(4), Besnard, D., & Arief, B. (2004). Computer impaired by legitimate users. Computers & Security, 23, Bridges, W. (2003). Managing transitions: Making the most of change. New York: Perseus. Dekker, S. (2003). Failure to adapt or adaptations that fail: Contrasting models on procedures and safety. Applied Ergonomics 2003, 34, Eloff, J., & Eloff, M. (2003). nformation management: A new paradigm. Proceedings of the 2003 South African nstitute for Computer Scientists and nformation Technologists Conference, South Africa. Harvard Business School. (2003). Managing change and transition. Boston: Harvard Business School Press. acovini, J. (1993). The human side of organization change. Training & Development, 47(1), Jones, A. (2004). Technology: llegal, immoral, or fattening? Proceedings of the 32nd Annual ACM SGUCCS Conference on User Services, Baltimore, MD. Kabay, M.E. (1993). Social psychology and infosec: Psycho-social factors in the implementation of information policy. Proceedings of the 16th U.S. National Computer Security Conference. Leach, J. (2003). mproving user behavior. Computers & Security, 22(8), Mitnick, K.D., & Simon, W.L. (2002). The art of deception: Controlling the human element of. ndianapolis: Wiley. Ngo, L., & Zhou, W. (2005). The multifaceted and everchanging directions of information Australia get ready! Proceedings of the 3rd nternational Conference on nformation Technology and Applications (CTA 2005), Sydney, Australia. Ngo, L., Zhou, W., & Warren, M. (2005). Understanding transition towards information culture change. Proceedings of the 3rd Australian nformation Security Management Conference, Perth, Australia. St-Amour, D. (2001). Successful organizational change. Canadian Manager, 26(2), Vroom, C., & von-solms, R. (2004). Towards information behavioral compliance. Computers & Security, 23, Wood, C.C. (2004). Developing a policy your company can adhere to. Retrieved February 6, 2006, from KEY TERmS ndividual Transition Process: The individual transitional and psychological process individuals go through in when transitioning towards change. T Security Awareness: Familiarity of T literacy concepts by either an individual or organization as a whole.
7 T Security Culture: Relates to the way in which things are done in an organization, thus relating to the T behavior and attitude of its members. T Security Management: Refers to the policies, processes, procedures, and guidelines regarding how to manage and control information and technology for achieving goals. T Security Policy: Formally written T statements similar to that of laws aimed at representing T rules within an organization context. TSeCT (T Security Culture Transition) Model: A role- and process-based model aimed at assisting individuals and organizations to increase T awareness and in transitioning towards T culture improvement. Transition: The adjustment, development, and change experienced by people within organizations when progressing towards achieving a particular change
Basic principles of Accounting
Unit 1 Basic principles of Accounting Glossary COMPLEMENTARY each activity depends on the other INTEGRATED treated as a combined whole What is accounting? Accounting is concerned with two separate but
Code of Ethics December 2013
Code of Ethics December 2013 Ethical Principles The following ethical principles form the basis of the Audiology Australia Code of Conduct: Respect the rights, needs, well-being and autonomy of people
Crosswalk of the New Colorado Principal Standards (proposed by State Council on Educator Effectiveness) with the
Crosswalk of the New Colorado Principal Standards (proposed by State Council on Educator Effectiveness) with the Equivalent in the Performance Based Principal Licensure Standards (current principal standards)
Compliance Policy ALCO recommended standard
1. PURPOSE In accordance with CSSF Circular 2004/155, the board of directors of [NAME OF COMPANY] (hereafter the Company ) has adopted the following Compliance Policy. The Company s Compliance function
Code of Professional Conduct & Ethics Association of Accounting Technicians of Sri Lanka
Code of Professional Conduct & Ethics Association of Accounting Technicians of Sri Lanka (Incorporated under the Companies Act No: 17 of 1982) Contents 1. Purpose of the Code of Ethics 2. Fundamental Principles
Integrated Risk Management:
Integrated Risk Management: A Framework for Fraser Health For further information contact: Integrated Risk Management Fraser Health Corporate Office 300, 10334 152A Street Surrey, BC V3R 8T4 Phone: (604)
EDS Innovation Research Programme DISCUSSION PAPER SERIES. No.005 Media, Connectivity, Literacies and Ethics
EDS Innovation Research Programme DISCUSSION PAPER SERIES No.005 Media, Connectivity, Literacies and Ethics Security Challenges of Networks: Cyber Trust and Cyber Crime Robin Mansell March 2006 EDS Innovation
The Value of Organizational Change Management
The Value of Organizational Change Management Bridging the Gap : Quantifying the ROI of Organizational Change Management Larry Powers & Ketil Been The Value of Organizational Change Management 1 Table
EXHIBIT CC. Identifying Management Level Knowledge, Skills and Abilities. Executive Core Competencies (ECCs)
EXHIBIT CC Identifying Management Level Knowledge, Skills and Abilities Executive Core Competencies (ECCs) ECC One: Leading Change ECC Two: Leading People ECC Three: Results Driven ECC Four: Business Acumen
Kotters Eight Steps of Change
We are often asked the question, What should I do to improve our staff engagement? Culture change is a difficult task to achieve for any leader. Leaders we work with to help transform their organizational
Competency Requirements for Assurance Practitioners of Second Tier Companies Limited by Guarantee
Joint Accounting Bodies CPA Australia Ltd, The Institute of Chartered Accountants in Australia & the National Institute of Accountants Competency Requirements for Assurance Practitioners of Second Tier
Organizational Culture Why Does It Matter?
Organizational Culture Why Does It Matter? Presented to the Symposium on International Safeguards International Atomic Energy Agency Vienna, Austria November 3, 2010 IAEA-CN-184/315 Kenneth Desson Pentor
Public Health Competency Based Employee Performance Management Self Assessment Tool - Manager/Supervisor
Public Health Competency Based Employee Performance Management Self Assessment Tool - Manager/Supervisor Public Health Competency Based Employee Performance Management Toolkit OPHA & Partners, Version
LEARNING OUTCOMES FOR THE PSYCHOLOGY MAJOR
LEARNING OUTCOMES FOR THE PSYCHOLOGY MAJOR Goal 1. Knowledge Base of Psychology Demonstrate familiarity with the major concepts, theoretical perspectives, empirical findings, and historical trends in psychology.
CHAPTER 1: The Preceptor Role in Health Systems Management
CHAPTER 1: The Preceptor Role in Health Systems Management Throughout the nursing literature, the preceptor is described as a nurse who teaches, supports, counsels, coaches, evaluates, serves as role model
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
OUT-OF-COURT RESTRUCTURING GUIDELINES FOR MAURITIUS
These Guidelines have been issued by the Insolvency Service and endorsed by the Bank of Mauritius. OUT-OF-COURT RESTRUCTURING GUIDELINES FOR MAURITIUS 1. INTRODUCTION It is a generally accepted global
Undergraduate Psychology Major Learning Goals and Outcomes i
Undergraduate Psychology Major Learning Goals and Outcomes i Goal 1: Knowledge Base of Psychology Demonstrate familiarity with the major concepts, theoretical perspectives, empirical findings, and historical
Clive W Pack Managing Principal Louis A Allen Associates (Aust) Pty Ltd. March 1990.
DESIGNING A PERFORMANCE APPRAISAL SYSTEM THAT WORKS Clive W Pack Managing Principal Louis A Allen Associates (Aust) Pty Ltd. March 1990. INTRODUCTION: People are our most important asset. One of the best
Education Module for Health Record Practice. Module 7 - Administration and Management of the Health Record Department
Education Module for Health Record Practice Module 7 - Administration and Management of the Health Record Department The health record officer must meet the leadership challenge in his/her quest to develop
ORGANIZATIONAL FRAMEWORK
ORGANIZATIONAL FRAMEWORK The organizing framework of the associate degree in nursing program is derived from the Philosophy of the Division of Nursing. It supports the Values of the College, which include
PERFORMANCE STANDARDS FOR ADVANCED MASTERS PROGRAMS CURRICULUM STUDIES
1 PERFORMANCE STANDARDS FOR ADVANCED MASTERS PROGRAMS CURRICULUM STUDIES 2 PREAMBLE VINCENTIAN SPIRIT AND URBAN MISSION Given that the School of Education subscribes to the Vincentian spirit and urban
A Relative Gap Moving from Gap to Strength A Relative Strength Organizational Readiness
A Relative Gap Moving from Gap to Strength A Relative Strength Organizational Readiness Performance history Implementation of new programs historically has not been well planned, and has not had intended
Integrity Continuity: Avoiding and Surviving (Un)Ethical Disasters. Robert C. Chandler, Ph.D., Pepperdine University Malibu, California USA
Integrity Continuity: Avoiding and Surviving (Un)Ethical Disasters Robert C. Chandler, Ph.D., Pepperdine University Malibu, California USA Changing our Minds It couldn t happen to us a false sense of security,
DoD CIVILIAN LEADER DEVELOPMENT FRAMEWORK COMPETENCY DEFINITIONS. Leading Change
DoD CIVILIAN LEADER DEVELOPMENT FRAMEWORK COMPETENCY DEFINITIONS Leading Change Definition: This core competency involves the ability to bring about strategic change, both within and outside the organization,
CORPORATE GOVERNANCE
CORPORATE GOVERNANCE Ethics are vital to Brown Strauss, Inc. (Brown Strauss) and each of its and employees. Brown Strauss is committed to the highest ethical standards and to conducting its business with
Code of Ethics and Professional Responsibilities for Healthcare Ethics Consultants
Code of Ethics and Professional Responsibilities for Healthcare Ethics Consultants Preface The statements in this code set out the core ethical responsibilities of individuals performing healthcare ethics
Professional Development for Engagement Partners Responsible for Audits of Financial Statements (Revised)
IFAC Board Exposure Draft August 2012 Comments due: December 11, 2012 Proposed International Education Standard (IES) 8 Professional Development for Engagement Partners Responsible for Audits of Financial
BPMJ 7,3. The current issue and full text archive of this journal is available at http://www.emerald-library.com/ft
The research register for this journal is available at http://wwwmcbupcom/research_registers The current issue and full text archive of this journal is available at http://wwwemerald-librarycom/ft BPMJ
LIFESTYLE INTERNATIONAL PRIVATE LIMITED WHISTLE BLOWER POLICY (VIGIL MECHANISM)
LIFESTYLE INTERNATIONAL PRIVATE LIMITED WHISTLE BLOWER POLICY (VIGIL MECHANISM) A. POLICY This Policy is formulated to: (a) provide opportunity to Employees and Directors to report genuine concerns or
APES 320 Quality Control for Firms
APES 320 Quality Control for Firms APES 320 Quality Control for Firms is based on International Standard on Quality Control (ISQC 1) (as published in the Handbook of International Auditing, Assurance,
Using Leading Indicators to Drive Sustainability Performance. Responding to changing circumstances and improving future performance
QUALITY TOOLBOX Using Leading Indicators to Drive Sustainability Performance Companies tend to report their sustainability results (both internally and externally) with the idea that these measurements
VIGIL MECHANISM CUM WHISTLE BLOWER POLICY
VIGIL MECHANISM CUM WHISTLE BLOWER POLICY VIGIL MECHANISM CUM WHISTLE BLOWER POLICY I. PREAMBLE This policy is formulated to provide opportunity to Director(s) and employee(s) to access in good faith to
The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Purpose: This document provides
5 Steps To Healthcare Change Management: A Roadmap For Success
Optimizing the business of healthcare 5 Steps To Healthcare Change Management: Table of Contents Overview 1 1. Establishing Change Goals 2 The Change Driver 2 The Importance of Clear Goals and Objectives
Adding Value to Public Organizations: Labor Relations in a Changing Environment
Adding Value to Public Organizations: Labor Relations in a Changing Environment Photograph by Michael Rock, Alameda County Submitted by Aracelia G. Esparza Labor Relations Analyst Alameda County Human
Management Performance Appraisal
Management Performance Appraisal Name of Manager: Position: Department: Years in present position: Start date: Review Period: From: To: Revised June 2012 1 PERFORMANCE FACTORS: A. Integrity is the ability
Ten Essential Leadership Skills for Managers. T. Hampton Hopkins
1 Ten Essential Leadership Skills for Managers T. Hampton Hopkins Managers, in most organizations, have a dual responsibility. They are responsible both to the organization and to the people in the organization.
Key Considerations for Information Technology Governance. 900 Monroe NW Grand Rapids, MI 49503 (616) 632-8000
Key Considerations for Information Technology Governance What is IT Governance? Big Picture approach to information and data management Sets priorities: Managing performance Delivering value Managing risk
Universal Declaration on Bioethics and Human Rights
Universal Declaration on Bioethics and Human Rights Adopted by the UNESCO General Conference, 19 October 2005 The General Conference, Conscious of the unique capacity of human beings to reflect upon their
Business Case. for an. Information Security Awareness Program
Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security
Environmental Negotiation Primer
June 2002 Page 1 of 6 Naval School, Civil Engineer Corps Officer (CECOS) Issue Discussion Whether you are negotiating the subtle, yet important, specific input and results of a human health risk assessment
MISSION VALUES. The guide has been printed by:
www.cudgc.sk.ca MISSION We instill public confidence in Saskatchewan credit unions by guaranteeing deposits. As the primary prudential and solvency regulator, we promote responsible governance by credit
Critical Analysis o Understanding Ethical Failures in Leadership
Terry Price focus on the ethical theories and practices of the cognitive account. The author argues that leaders that even put their own interests aside may not be ethically successful. Thus, volitional
CAPABILITY STATEMENT CONTROL RISKS MEXICO
CAPABILITY STATEMENT CONTROL RISKS MEXICO GENERAL 15 AUGUST 2012 Control Risks Mexico, S.A. de C.V. Cottons Centre Cottons Lane London SE1 2QG United Kingdom T: +5255 5000 1700 www.controlrisks.com TABLE
PROFESSIONAL CONSERVATION EMPLOYEES PROGRAM TRAINING PLAN ADMINISTRATIVE PROFESSIONALS
PROFESSIONAL CONSERVATION EMPLOYEES PROGRAM TRAINING PLAN ADMINISTRATIVE PROFESSIONALS Name: Location: Position: Work Unit: Period: Supervisor: List here the employee s technical/admin resource advisors
WHO GLOBAL COMPETENCY MODEL
1. Core Competencies WHO GLOBAL COMPETENCY MODEL 1) COMMUNICATING IN A CREDIBLE AND EFFECTIVE WAY Definition: Expresses oneself clearly in conversations and interactions with others; listens actively.
Internal Audit Standards
Internal Audit Standards Department of Public Expenditure & Reform November 2012 Copyright in material supplied by third parties remains with the authors. This includes: - the Definition of Internal Auditing
GAO. Government Auditing Standards. 2011 Revision. By the Comptroller General of the United States. United States Government Accountability Office
GAO United States Government Accountability Office By the Comptroller General of the United States December 2011 Government Auditing Standards 2011 Revision GAO-12-331G GAO United States Government Accountability
Improving Performance by Breaking Down Organizational Silos. Understanding Organizational Barriers
Select Strategy www.selectstrategy.com 1 877 HR ASSET 1 877 472 7738 Improving Performance by Breaking Down Organizational Silos Understanding Organizational Barriers Restructuring initiatives have become
Guide to Preventing Social Engineering Fraud
Guide to Preventing Social Engineering Fraud GUIDE TO PREVENTING SOCIAL ENGINEERING FRAUD CONTENTS Social Engineering Fraud Fundamentals and Fraud Strategies... 4 The Psychology of Social Engineering (And
Elements Of An Effective Export Compliance Program
Elements Of An Effective Export Compliance Program Renee Osborne Export Management & Compliance Division Office of Exporter Services Bureau of Industry and Security U.S. Department of Commerce Effective
ETHICS CHARTER. GDF SUEZ Ethics Charter 1
ETHICS CHARTER GDF SUEZ Ethics Charter 1 Introduction by Gérard Mestrallet 4 Ethics principles and the circle of stakeholders Fundamental Principles 8 A Strict Ethical Code 12 ETHICS GOVERNANCE Scope
An Executive Overview of GAPP. Generally Accepted Privacy Principles
An Executive Overview of GAPP Generally Accepted Privacy Principles Current Environment One of today s key business imperatives is maintaining the privacy of your customers personal information. As business
New Zealand Institute of Chartered Accountants
New Zealand Institute of Chartered Accountants FAES Issued 11/09 Amended 07/13 ENGAGEMENT STANDARD FINANCIAL ADVISORY ENGAGEMENTS Issued by the Board of the New Zealand Institute of Chartered Accountants
Response to Complaints of Harassment, Violence and Discrimination
Response to Complaints of Harassment, Violence and Discrimination To limit potential liability, employers should immediately respond to complaints of harassment, violence or threats of violence, and discrimination.
Nursing Framework and Program Outcomes
Nursing Framework and Program Outcomes The program's conceptual framework is based on the National League for Nursing (NLN) Educational Competencies Model and the components within it. The model consists
COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT
COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT 1. Introduction The Company is committed to maintaining ethical standards in the conduct of its business activities. The Company's reputation as an ethical
International Federation of. June 2005. Accountants. Ethics Committee. Code of Ethics for Professional. Accountants
International Federation of Accountants Ethics Committee June 2005 Code of Ethics for Professional Accountants Mission of the International Federation of Accountants (IFAC) To serve the public interest,
IC Performance Standards
IC Performance Standards Final Version 1 23 April 2009 1 TABLE OF CONTENTS BACKGROUND... 3 OCCUPATIONAL STRUCTURE... 4 PERFORMANCE ELEMENT CONTENT MODELS... 7 Professional and Technician/Administrative
APPENDIX A NCUA S CAMEL RATING SYSTEM (CAMEL) 1
APPENDIX A NCUA S CAMEL RATING SYSTEM (CAMEL) 1 The CAMEL rating system is based upon an evaluation of five critical elements of a credit union's operations: Capital Adequacy, Asset Quality, Management,
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
THE HR GUIDE TO IDENTIFYING HIGH-POTENTIALS
THE HR GUIDE TO IDENTIFYING HIGH-POTENTIALS What makes a high-potential? Quite possibly not what you think. The HR Guide to Identifying High-Potentials 1 Chapter 1 - Introduction If you agree people are
Approaches to Developing and Maintaining Professional Values, Ethics, and Attitudes
International Accounting Education Standards Board IEPS 1 October 2007 International Education Practice Statement 1 Approaches to Developing and Maintaining Professional Values, Ethics, and Attitudes International
Revised 05/22/14 P a g e 1
Corporate Office 107 W. Franklin Street P.O. Box 638 Elkhart, IN 46515-0638 Phone (574) 294-7511 Fax (574) 522-5213 INTRODUCTION PATRICK INDUSTRIES, INC. CODE OF ETHICS AND BUSINESS CONDUCT As a leader
Communicating change People-focused communication drives M&A integration success
Communicating change People-focused communication drives M&A integration success April 2012 At a glance Cultural integration and communication issues are top factors that challenge M&A success. Understanding
CD(SA) Director Competency Framework
CD(SA) Director Competency Framework This framework identifies the knowledge, skills and experience you will be required to evidence for the Chartered Director Evaluation. The Institute of Directors in
Prepared by. August 2009. 2009 RUSSELL HERDER and ETHOS BUSINESS LAW
embracing the opportunities, averting the risks. Prepared by August 2009 INTRODUCTION There is little question that social media is high on the agenda of corporate and nonprofit decision-makers across
White Paper February 2009. Organizational Development and Training: Strategies for Managing Planned Change. Authors:
White Paper February 2009 Authors: Kylie Hurvitz, B.A.* Rising Sun Associate Richard A. Pierce, Ph.D. Co-Founder & Executive Director Rising Sun Consultants *Ms. Hurvitz is currently enrolled as a Masters
Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience
Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Mike O Neill Managing Director Graeme McGowan Associate Director of Cyber Security
ASSE On-Site Seminar Course Selections
ASSE On-Site Seminar Course Selections - SAFETY & HEALTH MANAGEMENT - Safety Management Part I: Fundamental Concepts An excellent basic seminar. This seminar suggests fundamental elements that form an
Solution Overview Better manage environmental, occupational safety, and community health hazards by turning risk into opportunity
Environment, Health and Safety We make it happen. Better. Solution Overview Better manage environmental, occupational safety, and community health hazards by turning risk into opportunity April 2014 A
Public Health Competency Based Employee Performance Management Self Assessment Tool - Master Templates (For HR Administration purposes only)
Public Health Competency Based Employee Performance Management Self Assessment Tool - Master Templates (For HR Administration purposes only) Public Health Competency Based Employee Performance Management
Human Services Quality Framework. User Guide
Human Services Quality Framework User Guide Purpose The purpose of the user guide is to assist in interpreting and applying the Human Services Quality Standards and associated indicators across all service
APES 110 Code of Ethics for Professional Accountants
APES 110 Code of Ethics for Professional Accountants [Supersedes APES 110 Code of Ethics for Professional Accountants (Issued in June 2006 and subsequently amended in February 2008)] ISSUED: December 2010
The World Bank Group Policy on Eradicating Harassment Guidelines for Implementation
1.0 Introduction The World Bank Group Policy on Eradicating Harassment Guidelines for Implementation The World Bank Group is committed to fostering a workplace free of harassment and intimidation, where
Performance Management is Killing your Business
Performance Management is Killing your Business The rapidly changing environment in which organizations operate has profound implications across all sectors, requiring a fundamental reappraisal of many
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices
Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner, Ontario, Canada Purpose: This document
Precision Coaching and Development with the CPI 260
W H I T E P A P E R / P A G E 1 Precision Coaching and Development with the CPI 260 Assessment Martin Boult, BBSc, D.Psych Two weeks after successfully graduating from the CPI 260 Certification Program,
PHILIPPINE LONG DISTANCE TELEPHONE COMPANY CODE OF BUSINESS CONDUCT AND ETHICS
PHILIPPINE LONG DISTANCE TELEPHONE COMPANY CODE OF BUSINESS CONDUCT AND ETHICS Philippine Long Distance Telephone Company ( PLDT or the Company ) is dedicated to doing business in accordance with the highest
Risk Management in the HSE; An Information Handbook
Risk Management in the HSE; An Information Handbook Document reference number Revision number OQR011 Revision date October 2011 Review date Document developed by 5 Document approved by October 2013 Responsibility
Three Theories of Individual Behavioral Decision-Making
Three Theories of Individual Decision-Making Be precise and explicit about what you want to understand. It is critical to successful research that you are very explicit and precise about the general class
*Performance Expectations, Elements and Indicators
C o m m o n C o r e o f L e a d i n g : Connecticut School Leadership Standards *Performance Expectations, Elements and Indicators *For further information, visit: http://www.sde.ct.gov/sde/cwp/view.asp?a=2641&q=333900
AT&T s Code of Business Conduct
August 2015 AT&T s Code of Business Conduct To All AT&T Employees Worldwide: The most basic commitment we make to our customers, our shareholders, and each other is to always conduct ourselves in an ethical
Social Security Disability Resources For Self Advocacy
Social Security Disability Resources For Self Advocacy Introduction This guide is intended to help people with multiple sclerosis (MS) advocate effectively to obtain the Social Security Disability Insurance
2016 OCR AUDIT E-BOOK
!! 2016 OCR AUDIT E-BOOK About BlueOrange Compliance: We specialize in healthcare information privacy and security solutions. We understand that each organization is busy running its business and that
WHAT IS GRC AND WHERE IS IT HEADING? A BRIEFING PAPER. www.claytonutz.com
WHAT IS GRC AND WHERE IS IT HEADING? A BRIEFING PAPER www.claytonutz.com BACKGROUND Well established governance, risk and compliance functions have for many years formed a key part of management practice
A Framework for Business Sustainability
Environmental Quality Management, 17 (2), 81-88, 2007 A Framework for Business Sustainability Robert B. Pojasek, Ph.D Business sustainability seeks to create long-term shareholder value by embracing the
