Introduction
Information security is one of the highest priorities in many organizations, especially those operating in different countries and regions. Information leakage can make companies vulnerable as they can lose their competitive advantage and even experience reputational losses (Li et al. 358). It has been acknowledged that executives may override information security policies and let other employees do the same (Jeon et al. 54). Such factors as trust, cost-benefit calculus, self-control, and the low level of liability contribute to top managers’ decisions regarding information management.
Disclosure of the Issue
Cost-benefit calculus often leads to executives override of data security policies. Top managers tend to focus on the completion of tasks and projects, so they prioritize performance rather than information security (Jeon et al. 54). In many cases, top managers share sensitive information with employees they trust (Gill and Crane 734). It is noteworthy that this trust can be displaced, which can lead to numerous negative effects on the organization. Top managers also violate the existing standards due to the lack of self-control and insufficient liability or personal responsibility (Jeon et al. 54). The leakage of data can result in financial and reputational losses. The breaches related to personal information losses are specifically dangerous as they may avert customers and make them unwilling to maintain their relationship with the company. The loss of advanced technologies and strategies can also lead to a company’s inability to maintain or retail its position in the market.
Conclusion
In conclusion, it is necessary to note that executives often violate data security policies and guidelines, which can result in adverse effects for organizations or even industries. The major factors contributing to information security override by executives include insufficient self-control and liability, cost-benefit calculus, and trust. The leakage of sensitive information can lead to financial and reputational losses for companies, as well as their low competitiveness.
Works Cited
Gill, Martin, and Stephen Crane. “The Role and Importance of Trust: A Study of the Conditions that Generate and Undermine Sensitive Information Sharing.” Security Journal, vol 30, no. 3, 2017, pp. 734-748.
Jeon, Soohyun, et al. “Rethinking the Prevailing Security Paradigm.” ACM SIGMIS Database: The DATABASE for Advances in Information Systems, vol 49, no. 3, 2018, pp. 54-77.
Li, Han, et al. “Self-Control, Organizational Context, and Rational Choice in Internet Abuses at Work”. Information & Management, vol 55, no. 3, 2018, pp. 358-367.