Security Policies and Dangers of Executive Override

Introduction

Information security is one of the highest priorities in many organizations, especially those operating in different countries and regions. Information leakage can make companies vulnerable as they can lose their competitive advantage and even experience reputational losses (Li et al. 358). It has been acknowledged that executives may override information security policies and let other employees do the same (Jeon et al. 54). Such factors as trust, cost-benefit calculus, self-control, and the low level of liability contribute to top managers’ decisions regarding information management.

Disclosure of the Issue

Cost-benefit calculus often leads to executives override of data security policies. Top managers tend to focus on the completion of tasks and projects, so they prioritize performance rather than information security (Jeon et al. 54). In many cases, top managers share sensitive information with employees they trust (Gill and Crane 734). It is noteworthy that this trust can be displaced, which can lead to numerous negative effects on the organization. Top managers also violate the existing standards due to the lack of self-control and insufficient liability or personal responsibility (Jeon et al. 54). The leakage of data can result in financial and reputational losses. The breaches related to personal information losses are specifically dangerous as they may avert customers and make them unwilling to maintain their relationship with the company. The loss of advanced technologies and strategies can also lead to a company’s inability to maintain or retail its position in the market.

Conclusion

In conclusion, it is necessary to note that executives often violate data security policies and guidelines, which can result in adverse effects for organizations or even industries. The major factors contributing to information security override by executives include insufficient self-control and liability, cost-benefit calculus, and trust. The leakage of sensitive information can lead to financial and reputational losses for companies, as well as their low competitiveness.

Works Cited

Gill, Martin, and Stephen Crane. “The Role and Importance of Trust: A Study of the Conditions that Generate and Undermine Sensitive Information Sharing.” Security Journal, vol 30, no. 3, 2017, pp. 734-748.

Jeon, Soohyun, et al. “Rethinking the Prevailing Security Paradigm.” ACM SIGMIS Database: The DATABASE for Advances in Information Systems, vol 49, no. 3, 2018, pp. 54-77.

Li, Han, et al. “Self-Control, Organizational Context, and Rational Choice in Internet Abuses at Work”. Information & Management, vol 55, no. 3, 2018, pp. 358-367.

Cite this paper

Select style

Reference

StudyCorgi. (2021, August 25). Security Policies and Dangers of Executive Override. https://studycorgi.com/security-policies-and-dangers-of-executive-override/

Work Cited

"Security Policies and Dangers of Executive Override." StudyCorgi, 25 Aug. 2021, studycorgi.com/security-policies-and-dangers-of-executive-override/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2021) 'Security Policies and Dangers of Executive Override'. 25 August.

1. StudyCorgi. "Security Policies and Dangers of Executive Override." August 25, 2021. https://studycorgi.com/security-policies-and-dangers-of-executive-override/.


Bibliography


StudyCorgi. "Security Policies and Dangers of Executive Override." August 25, 2021. https://studycorgi.com/security-policies-and-dangers-of-executive-override/.

References

StudyCorgi. 2021. "Security Policies and Dangers of Executive Override." August 25, 2021. https://studycorgi.com/security-policies-and-dangers-of-executive-override/.

This paper, “Security Policies and Dangers of Executive Override”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.