Studyspark Study Document

Cybersecurity and Organizational Change Concept Map Research Paper

Pages:6 (1519 words)

Sources:6

Subject:Business

Topic:Organizational Change

Document Type:Research Paper

Document:#88291276


Modernization Theory

Support managers, involve stakeholders, address resistance, celebrate victories and define the objective

Give focus and support to individuals involved in the change

Know the needs of all stakeholders

Start at the top

Change has to be implemented correctly and follow a process so as not to stall or be met with resistance (Schantz, 2018)

Change is required

Organizational Change

IT workers have to be more involved in making computers and networks safer for users

Anyone who uses the Internet is at risk of being hacked

Health care providers, IT workers, administrators, patients and all stakeholders have to be more aware of the cybersecurity risks attendant the use of multiple

medical devices (Shindell, 2018)

Medical devices can be hacked

(Anderson & Williams, 2018)Part I: Concept Map

Cybersecurity

Part II: Explaining the Concept Map

The Relationship of Parts

Cybersecurity, Organizational Change and Modernization Theory

As the concept map shows, cybersecurity, organizational change and Rostow’s modernization theory are all interrelated and flow into and out of one another. In fact, each depends on the other to make sense. Cybersecurity explains the goal of organizational change and yet without the concept of cybersecurity there would be no reason for organizational change: the relationship between the two is thus symbiotic. Modernization theory likewise informs both because it supplies the rationale for both cybersecurity and organizational change, while both simultaneously inform modernization theory as they are what make it possible for the strategies to be discovered to make modernization possible in the first place.

Cybersecurity. Cybersecurity is further developed into parts based on what computers can do and why cybersecurity is needed. The concept map defines these parts as four:

1) people use the Internet with the aid of computers,

2) medical personnel use devices that communicate with one another (Anderson and Williams, 2018),

3) medical personnel and computer users (including IT workers) have to be aware of the threats to cybersecurity and be informed on ways to make users safer (Shindell, 2018), and

4) cybersecurity protects users against hacking.

These parts are defined so as to explain what cybersecurity is in relation to what is expected of computers and digital machines today—i.e., in other words, the more integrated our machines become, the more important it is that we become familiar with the concept of cybersecurity and what it can do (Ten, Manimaran & Liu, 2010).

Organizational change. The concept of organizational change is explained in the concept map as indicating that (a) change is required in organizations for a reason, and (b) that change has to implemented in certain manner so that it can be effectively conducted (Schantz, 2018).

Following from these points are the steps that are to be adhered to when conducting organizational change:

1) Change has to start at the top—i.e., with the executives running the organization so that they are aware of what’s needed, why and how to support the change process

2) Change cannot take place without first knowing the needs and viewpoints of all stakeholders—otherwise they might throw up an obstacle to change in the form of resistance that change managers did foresee

3) Individuals within the change process have to be the focus, as they are the ones who will be implementing the change—therefore, it is critical that they receive the necessary support from those above them

4) Managers have to be supported from above as well—i.e., the executives at the top—so that they can lead effectively

5) The change management plan should have procedures in place for dealing with the potential of resistance

6) Victories should be celebrated, no matter how small, so as to ensure that morale is boosted along the way

7) Stakeholders have to be involved in on-going discussions and dialogues so that that process is not hindered by surprise objections from stakeholders who do not like what is going on

8) The ultimate objective has to be defined for all so that everyone knows what the point and purpose of the change is

This last point in the…


Sample Source(s) Used

References

Anderson, S., & Williams, T. (2018). Cybersecurity and medical devices: Are the ISO/IEC 80001-2-2 technical controls up to the challenge?. Computer Standards & Interfaces, 56, 134-143.

Bass, B. M. (1999). Two decades of research and development in transformational leadership. European journal of work and organizational psychology, 8(1), 9-32.

Dooley, K. J. (1997). A complex adaptive systems model of organization change. Nonlinear Dynamics, Psychology, and Life Sciences, 1(1), 69-97.

Schantz, J. (2018). How can leaders manage change successfully? HR.com, 8-9.

Shindell, R. (2018). Wearable devices: The next wave of cybercrime. Journal of AHIMA, 24-27.

Ten, C. W., Manimaran, G., & Liu, C. C. (2010). Cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 40(4), 853-865.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Southwest Airlines Strategy

Pages: 25 (7450 words) Sources: 15 Subject: Business Document: #53850658

Southwest AirlinesTable of ContentsAbstract 1Introduction 1Organizational Setting 2Integration of Chapter Concepts to the Organizational Setting 3Controlling Service Quality 3Biblical Justification 3Customer Value 3Biblical Justification 4Lean Management 4Biblical Justification 4Supplier Management 5Biblical Justification 5Customer Relationship Management (CRM) 5Biblical Justification 6Balanced Scorecard 6Biblical Justification 6Strategy Map 6Biblical Justification 7Process Control 7Biblical Justification 7Conclusion 7References 8Appendices 9Strategic Analysis Data 9Environmental Scan 9SWOT Analysis 9Strategic Issues 9Operating Plan 9Communication of Plan 10AbstractThis paper provides

Studyspark Study Document

Genetic Algorithms Parallel Genetic Algorithms 1d Bin Packing Supercomputers...

Pages: 20 (9676 words) Sources: 8 Subject: Physics Document: #92159820

Solving the 1D Bin Packing Problem Using a Parallel Genetic Algorithm: A Benchmark Test The past few decades have witnessed the introduction in a wide range of technological innovations that have had an enormous impact on consumers, businesses and governmental agencies. Computer-based applications in particular have been key in facilitating the delivery of a wide range of services and information, and computer processing speeds have consistently increased incrementally. Computer processing speeds,

Studyspark Study Document

Risk Minimization and Loss Prevention

Pages: 59 (16256 words) Sources: 1+ Subject: Business Document: #44399316

Small Business' Need for a CPA One of the critical investments a small business can make to mitigate loss and risk is hiring a CPA and putting that CPA on the 'management team.' As Wells notes in his groundbreaking research, "Denise, a bookkeeper for a small trucking firm in Birmingham, Alabama, wishes she had never heard of Ralph Summerford, CPA. Because of his thoroughness, Denise is facing several years in prison

Studyspark Study Document

Analyzing Social Networks and Computer Ethics

Pages: 8 (2515 words) Sources: 6 Subject: Law - Constitutional Law Document: #91571369

Social Networks and Computer Ethics For the past 20 years, there have been many changes caused by the internet on many aspects of the contemporary life. The internet is growing rapidly. As of 2006, it was recorded that the number of internet users was about four million. For a long time, there have been promises made on how internet changes will positively impact people worldwide. These promises have reached many people

Studyspark Study Document

Big Data for Tracking Criminal Activity

Pages: 6 (1658 words) Sources: 6 Subject: Government Document: #73134368

Big Data and the GovernmentIntroductionIn recent years, there has been an explosion of data generated by disparate sources, including social media, financial transactions, and sensor networks. This so-called Big Data has the potential to transform the way in which governmental agencies operate. For example, the Department of Homeland Security (DHS) has used Big Data to thwart terrorist attacks, by mining social media for suspicious activity. The Department of Health and

Join thousands of other students and

"spark your studies".