Security Policies and Dangers of Executive Override

Introduction

Information security is one of the highest priorities in many organizations, especially those operating in different countries and regions. Information leakage can make companies vulnerable as they can lose their competitive advantage and even experience reputational losses (Li et al. 358). It has been acknowledged that executives may override information security policies and let other employees do the same (Jeon et al. 54). Such factors as trust, cost-benefit calculus, self-control, and the low level of liability contribute to top managers’ decisions regarding information management.

We will write a
custom essay
specifically for you

for only $16.05 $11/page
308 certified writers online
Learn More

Disclosure of the Issue

Cost-benefit calculus often leads to executives override of data security policies. Top managers tend to focus on the completion of tasks and projects, so they prioritize performance rather than information security (Jeon et al. 54). In many cases, top managers share sensitive information with employees they trust (Gill and Crane 734). It is noteworthy that this trust can be displaced, which can lead to numerous negative effects on the organization. Top managers also violate the existing standards due to the lack of self-control and insufficient liability or personal responsibility (Jeon et al. 54). The leakage of data can result in financial and reputational losses. The breaches related to personal information losses are specifically dangerous as they may avert customers and make them unwilling to maintain their relationship with the company. The loss of advanced technologies and strategies can also lead to a company’s inability to maintain or retail its position in the market.

Conclusion

In conclusion, it is necessary to note that executives often violate data security policies and guidelines, which can result in adverse effects for organizations or even industries. The major factors contributing to information security override by executives include insufficient self-control and liability, cost-benefit calculus, and trust. The leakage of sensitive information can lead to financial and reputational losses for companies, as well as their low competitiveness.

Works Cited

Gill, Martin, and Stephen Crane. “The Role and Importance of Trust: A Study of the Conditions that Generate and Undermine Sensitive Information Sharing.” Security Journal, vol 30, no. 3, 2017, pp. 734-748.

Jeon, Soohyun, et al. “Rethinking the Prevailing Security Paradigm.” ACM SIGMIS Database: The DATABASE for Advances in Information Systems, vol 49, no. 3, 2018, pp. 54-77.

Li, Han, et al. “Self-Control, Organizational Context, and Rational Choice in Internet Abuses at Work”. Information & Management, vol 55, no. 3, 2018, pp. 358-367.

Print Сite this

Cite this paper

Select style

Reference

StudyCorgi. (2021, August 27). Security Policies and Dangers of Executive Override. Retrieved from https://studycorgi.com/security-policies-and-dangers-of-executive-override/

Work Cited

"Security Policies and Dangers of Executive Override." StudyCorgi, 27 Aug. 2021, studycorgi.com/security-policies-and-dangers-of-executive-override/.

1. StudyCorgi. "Security Policies and Dangers of Executive Override." August 27, 2021. https://studycorgi.com/security-policies-and-dangers-of-executive-override/.


Bibliography


StudyCorgi. "Security Policies and Dangers of Executive Override." August 27, 2021. https://studycorgi.com/security-policies-and-dangers-of-executive-override/.

References

StudyCorgi. 2021. "Security Policies and Dangers of Executive Override." August 27, 2021. https://studycorgi.com/security-policies-and-dangers-of-executive-override/.

References

StudyCorgi. (2021) 'Security Policies and Dangers of Executive Override'. 27 August.

This paper was written and submitted to our database by a student to assist your with your own studies. You are free to use it to write your own assignment, however you must reference it properly.

If you are the original creator of this paper and no longer wish to have it published on StudyCorgi, request the removal.