We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Information Security Essay

Essay Topic:

Paper type: Essay

Words: 326, Paragraphs: 5, Pages: 2

Sorry, but copying text is forbidden on this website!

or Listen to your own essay

Information Security is a fundamental function of any organization expecting to be competitive in the global market. As more and more developing countries make the leap into capitalism, competiveness will only become more essential. With Asian nations like China, Korea and India stepping up to make their presence noticed taking more of the market share than ever before other organizations must remain competitive which means keeping their piece of the pie safe and secure. Organizations’ proprietary information if left unsecure could mean loss of their competitive edge.

In the IndustryWeek. com article by, “Manufacturers Must Think Virtually to Ensure Data is Protected” Chris Benco contends; “Data is what all manufacturers rely upon, and with the ever-increasing influx of it, companies need to ensure that it is protected in the event of a natural disaster, human error or other problems. With this heavy reliance on data to maintain day-to-day operations, manufacturers cannot afford to overlook data protection as it is the key in maintaining production, optimizing productivity and guaranteeing profit.

Information security though takes on another aspect when you consider an often over looked key element of corporate information. We think of information security in terms of protecting what is on paper and in data bases, but knowledge is much harder to nail down. Knowledge, information that is stored in the minds of the organization’s personnel is just as important as any other data or product information and should be gathered and stored just the same.

As we could see in the reading material for this case assignment there are many methods for obtaining, sharing, and storing knowledge information. Some such methods were discussed by Ann Field in her article “Locking Up What Your Employees Know”. The step according to Ms. Fields are to first Create a knowledge profile, then foster mentoring relationships, encourage communities of practice, ensure that passing knowledge on is rewarded, Protect people’s privacy, and decide whether you’re interested in recorded knowledge as well.

How to cite this page

Choose cite format:

Information Security. (2016, Oct 16). Retrieved from https://studymoose.com/information-security-5-essay

Is Your Deadline Too Short? Let Professionals Help You

Get Help

Our customer support team is available Monday-Friday 9am-5pm EST. If you contact us after hours, we'll get back to you in 24 hours or less.

By clicking "Send Message", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
No results found for “ image
Try Our service

Hi, I am Sara from Studymoose

Hi there, would you like to get such a paper? How about receiving a customized one? Click to learn more https://goo.gl/CYf83b


Hi, I am Sara from Studymoose

Hi there, would you like to get such a paper? How about receiving a customized one? Click to learn more https://goo.gl/CYf83b


Your Answer is very helpful for Us
Thank you a lot!