Managing Information Resources: Ensuring Data Security
ICMR HOME | Case Studies Collection
» IT & Systems Case Studies Collection
This case study was compiled from published sources, and is intended to be used as a basis for class discussion. It is not intended to illustrate either effective or ineffective handling of a management situation. Nor is it a primary information source.
Chat with us
Experts felt that organizations had to be balanced in their efforts in addressing this problem as too much monitoring or high-handedness on the organization's part might hurt the morale of the employees, breed disloyalty, and lower productivity. Moreover, this threat was expected to intensify in the future as these portable devices were getting more sophisticated and acquiring wireless capabilities.
» Understand the threats posed to data security in organizations by advanced
technology (in this case, the portable data storage devices like MP3 players)
Pod Slurping, Data Theft, Data security, Industrial espionage, Intellectual property, Monitoring , Information technology, HR dilemma, IT security breach, iPods, Gartner, Digital rights management, Information security , Information assurance, Identity theft
Case Studies Links:-
Short Case Studies,
Simplified Case Studies.
Other Case Studies:- Multimedia Case Studies, Cases in Other Languages.
Business Reports Link:- Business Reports.
Books:- Textbooks, Work Books, Case Study Volumes.
|Business Environment||Business Ethics||Business Reports||Business Strategy|
|Corporate Governance||Economics||Enterprise Risk Management||Finance|
|HRM||Innovation||Insurance||IT and Systems|
|Leadership and Entrepreneurship||Marketing||Miscellaneous||Operations|
|Project Management||Short Case Studies||Cases in other Languages||Free Case Studies|