PASS 2024 UTME WITHOUT STRESS:- DOWNLOAD and PRACTICE with 2024 UTME CBT APP πŸ“±πŸ‘ˆ
πŸ˜‚ GUARANTEE|:| STUDY, WORK AND LIVE IN THE UK >>>.:- STUDY IN UK! Here is How to Apply to Study and Work In the United Kingdom in 2024

Need For Security Consciousness Among Office Professionals In An Organizations

Download complete project materials on Need For Security Consciousness Among Office Professionals In An Organizations from chapter one to five

ABSTRACT

Information on security consciousness and unconsciousness has been an increasingly important focus within both academic and commercial communities. Organizations are gradually understanding the importance of their information as assets and developing strategies to improve awareness throughout securing necessary data and information.

This study thus, examined the need for security consciousness among office professionals in four selected organizations in Kaduna metropolis. TheΒ  theoretical basis for the study was done through the review of related literature. The population of the study was 89 and all was used in view of the small size of the population.

Questionnaire was used as the instrument for data collection. 89 questionnaires were administered and only 62 were duly filled and this was used for the analysis using means statistical tool of four point scale. Findings from the study revealed that there is need for security consciousness among office professionals as it avail them with the chances of grabbing business opportunities and reduce loss of data.

The study recommends among others that Security should not be restricted to security professional alone but to all stakeholders i.e everyone who is affected by the business especially the office professionals. Likewise, Employees awareness and alertness should be encourages such that they will be willing to report security indicators to the management

TABLE OF CONTENTS

TITLE PAGE. i

DECLARATION.. ii

APPROVAL PAGE. iii

DEDICATION.. iv

ACKNOWLEDGEMENT. v

TABLE OF CONTENTS. vi

LIST OF TABLES. ix

CHAPTER ONE. 1

INTRODUCTION.. 1

1.1 Background of the study. 1

1.2 Statement of the Problems. 4

1.3 Objectives of the Study. 5

1.4 Research Questions. 6

1.5 Significance of the Study. 6

1.6 Scope of the Study. 8

1.7 Limitations of the Study. 9

1.8 Definition of Terms. 9

CHAPTER TWO.. 11

LITERATURE REVIEW… 11

2.0Β  Introduction. 11

2.1 Concept of Security and Consciousness. 11

2.2Β  Concept of Office Professional 14

2.3Β  Basic Duties and Responsibilities of the Office Professional 17

2.4Β  Information Security Awareness/Consciousness. 19

2.5Β  Importance of Security Consciousness among Office Professionals. 20

2.6Β  Level of Security Consciousness among Office Professionals. 22

2.7 Causes of Security Unconsciousness among Office Professionals. 23

2.9 Need for Office Professionals to be Trained on Security Issues. 27

2.10Β Β  Summary of the Review.. 29

CHAPTER THREE. 30

RESEARCH METHODOLOGY.. 30

3.0Β  Introduction. 30

3.1Β  Research Design. 30

3.2 Area of Study. 31

3.3 Population for the Study. 31

3.4Β  Sample Size and Sampling Technique. 32

3.5 Instrument for Data Collection. 32

3.6Β  Validation of the Instrument 33

3.7 Administration and Collection of the Instrument 33

3.8 Method of Data Analysis. 33

CHAPTER FOUR.. 35

DATA ANALYSIS AND INTERPRETATION.. 35

4.1 Introduction. 35

4.2 Data Presentation and Interpretation. 35

4.3 Major Findings. 42

4.4 Discussion on Findings. 45

CHAPTER FIVE. 49

SUMMARY, CONCLUSION AND RECOMMENDATIONS. 49

5.1Β Β Β  Introduction. 49

5.2Β Β Β  Summary. 49

5.3Β Β Β  Conclusion. 50

5.4Β Β Β Β  Recommendation. 52

5.5Β Β Β  Suggestion of Further Study. 53

REFERENCES. 54

APPENDICES. 56

QUESTIONNAIRE. 57

CHAPTER ONE

INTRODUCTION

1.1 Background of the study

The need for security consciousness has increasingly become an essential and fundamental concept in protecting and assuring the organization’s information assets are secured and always ready to meet mission objectives.

However, with the advent of technology and advancement and its applicability in companies and offices (organizations), the issue of securing vital and cogent information must also taking into account the inherent threats that is associated with it, hence, office staffs duties have extended to consciously adhering to the rules and regulation guiding their work towards operational threats.

Information on security awareness has been given an increasingly important focus within both academic and commercial communities. Organizations are gradually understanding the importance of their inrornuiion assets and developing strategies to improve awareness throughout the company.

Good corporate governance, regulation and legislation: nave also helped in raising the importance and relevance of good information security policies and practices.

According to Kritzinger, and Solms (2010), one of the biggest risks to an organization’s information is often not a weakness in the technology control environment. Rather it is the action or inaction by employees and other personnel that can lead to security incidents.

For example, through disclosure of information that could be used as an attack, not reporting observed unusual activity, accessing sensitive information unrelated to the user’s role without following the proper procedures, and so on.

It is therefore vital that organizations have a security awareness program in place to ensure employees are aware of the importance of protecting sensitive information, what they should do to handle information securely, and the risks of mishandling information. Employees’ understanding of the ‘organizational and personal consequences of mishandling sensitive information is crucial to an organization’s success.

Examples of potential consequences may include penalties levied against the organization, reputational harm to the organization and employees, and impact to an employee’s job.

It is important to put potential organizational harm into perspective for personnel, detailing how such damage to the organization can affect their own roles. Now more than ever, information and technology have become critical to the success of business operations. Organizations are increasingly more dependent on the Internet and other e-business functions for sales,marketing, purchasing, and other manufacturing functions.

Companies rely on the availability and accuracy of data to stay competitive in tight markets (Jakoubi, 2010). Government regulations and controls are increasing and organizations are being held responsible for data privacy and other employee obligations. Companies are primarily answering these challenges by increasing the technologies in place such as firewalls, anti-virus software, server patches, network monitoring, and the like.

However, often overlooked is the human factor which includes the office professionals. Regardless of the quantity or sophistication of the security technologies that have been put into place in an organization, the biggest vulnerability still comes from the people within the company who have access or knowledge about the business and its data.

Mitnick 2009, one of the world’s most famous hacker and fugitive turned security expert, considers the human factor the weakest link in security. In his book, he expands on this to say that as security technologies improve and systems become more difficult to exploit “attackers will turn more and more to exploiting the human element.”

It is against this background that researchers see this trend as an empirical problem worthy of investigation.

1.2 Statement of the Problems

A set of findings from a global security study on data leakage revealed that many companies do not have security policies-and that security policies that are in place are often ineffective(Charles,2015). This analysis provides additional justification for the initial survey findings, which reported that employees around the world are putting corporate and personal data at risk.

Most office professionals believe that employees don’t always adhere to policies because they don’t understand the risks involved with their behavior, because security isn’t a top-of-mind priority or issue, or because the employees just don’t care. Creating, communicating and enforcing sensible a security policy is critical to protecting corporate assets.

The consequences of inadequate security are significant. Loss of customer and sensitive corporate data, theft of capital equipment, business disruption, reduced productivity, and increased operational expenses are common results of security breaches. Despite this fallout and a continuing struggle by office professionals to implement and enforce security policies, effective security remains elusive.

Stumbling blocks include a failure to create security policies, ineffective education that leads to employees misunderstanding or bypassing security procedures, and iir.oructicalprocesses that employees feel they must ignore in order to accomplish goals and objectives.

The prevalence of each type of security breach varies throughout the world, but the data leakage problem is global and measurable. All these, indeed, constitutes critical issues and problems which calls for utmost attention.

1.3 Objectives of the Study

The general objective of the study is to determine the extent to which office professionals need to improve on security consciousness within and outside their business jurisdiction.. While, the specific objectives of the study

are to:

 

SEE >> HOW TO DOWNLOAD THE COMPLETE PROJECT (CHAPTER 1-5) NOW

>GUARANTTEE|:| Score 280 Above in 2024 UTMEπŸ‘‰ DOWNLOAD FREE JAMB CBT APP HERE:.: GURRANTTEE Score 280 Above in 2022 UTMEπŸ‘‰ DOWNLOAD FREE JAMB CBT APP HERE πŸ“±πŸ‘ˆ
WISH TO STUDY & LIVE in UK?:- STUDY, WORK AND LIVE IN the UK Application Form NOW OUT. Call 08030447894

2 Comments

  1. OLAYEMI GABRIEL OLUWAKAYODE
  2. OLAYEMI GABRIEL OLUWAKAYODE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.