Critical Review Of The Article

Read Complete Research Material

CRITICAL REVIEW OF THE ARTICLE

Critical Review of the Article

Table of Contents

Introduction1

Goal Setting and Managing by Objectives Goal Setting3

The company management of directional levers4

Goal Setting and Managing by Objectives6

Growth through stated goal8

Goal Procedures10

Optimization analysis as estimation method for intangible variables parameters11

Goal commitment in organizational dynamics12

Management through actual policy13

Training and workers' ability14

Limitations of the present research and conclusions14

References16

Appendix 118

Critical Review of the Article

Introduction

The research described in this article is concerned with information systems security in the scope of the Internet Engineering organizations. Engineering organizations are being a highly intensive activity that relies heavily on information technology (IT) to acquire process and deliver the information to all relevant users. To this end, IT provides a way for engineering organizations to differentiate their products and services delivered to their customers. Driven by the challenge to expand and capture a larger market share of the Engineering organizations industry, some Engineering organization invest in bricks and mortar while others have considered an innovative approach to deliver their Engineering organizations services via a new medium: the Internet. While the Internet provides opportunities for businesses to increase their customer base, reduce transactions costs, and sell their products globally, security implications impede the business. As an example, a number of major studies recently conducted in Europe, among this being, indicate a general upward trend in the number of security incidents in organizations (Wright, & McMahan, 1992, pp.295).

These studies further suggest that, organizations expressed less confidence about future security issues, noting that security incidents are increasing both in terms of number and complexity. Although a number, of significant, constructive approaches have been developed for the management of information systems security. They Tend to offer exact, technically oriented solutions and ignore the social aspects of risks and the informal structure of organizations. In this research information, systems security is viewed as the control of risks arising from unauthorized access to and possession of information. In the context, of information systems, the asset under consideration is, data and the principal IS security foundations are the integrity, confidentiality and authenticity of such data.

Source:(Ceresia, 2011)

Thus, the main principle of this research is that even if the information system managers and groups have available a variety of security risk management methods, tools and techniques, they may not make an efficient use of them in the process of risk management. In saying so, this research supports the view that security risks may arise due to a failure to obtain some or all of the goals that are relevant to the integrity, confidentiality and availability of information through the Internet engineering organizations channel. To this end, this research adopts a social and organizational approach to investigate information systems security within the scope of the Internet Engineering organizations by exploring and describing the role and determinants of trust and goal setting procedures in risk management. In the following, the chosen research approach is being discussed as well as its appropriateness for the research objectives. Then, the issue of the Internet Engineering organizations and, the reasons for ...
Related Ads