Identify the nine principles it have adopted for is security

Assignment Help Management Information Sys
Reference no: EM132272075

The Organisation for Economic Co-operation and Development (OECD) has created a list of principles to aid organizations in dealing with people and organizations in different countries with different cultures. Just because speaking to a colleague in a certain manner is acceptable in one culture does not mean it is acceptable in other cultures.

Conduct an Internet search for the OECD to identify the nine principles it have adopted for IS security. Looking at those principles, create a table that documents where those nine principles fit into a company's financial department.

In other words, what would a company's financial department have to do for each of the principles to ensure IS security by OECD's standards?

Make sure to include at least the following financial department responsibilities in the table:

Payroll

Paid time off

Retirement plans

Medical plans

Accounts payable

Accounts receivable

Investments

Loans

Interacting with financial departments of other companies

Reference no: EM132272075

Questions Cloud

Write a one-page position in favor of the policy : This is a continuation of the first and second assignments and uses your accumulated research. Imagine you are two different lobbyists, supporting two different
Calculate the companys major financial ratios : Discuss the main categories that can be used to assess the financial performance of a company's performance vertically and horizontally
How people are socialized about politics : What do our course book, content, and other library sources say about how people are socialized about politics and the process of government in our nation?
Purchasing power parity computer cost : Purchasing power parity computer cost $630 Cost in france 580 euros spot exchange rate $1.09
Identify the nine principles it have adopted for is security : what would a company's financial department have to do for each of the principles to ensure IS security by OECD's standards?
Describe the difference between ips and ids : Describe the components of an ICS and a SCADA system. Provide examples of how each are configured and used in the industry.
What are some of the objectives of the nations : Why was it formed? In addition, what are some of the objectives of the nations that are joining the EU? why some countries have wanted to get out of the EU.
Discuss two media events that influence public opinion : Discuss two (2) media events (past or curent) that has positively and negatively influenced public opinion of one government agency.
Why the functional role of it is important to the business : Three New things you learned Two reasons why the functional role of IT is important to the business One Question you have about the presentation.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Evaluate the need for denormalization within an organization

Evaluate the need for denormalization within an organization. Provide at least three examples that prove denormalization is useful to data consumers.

  How does it affect the way employees behave

What is the organizational culture of Southwest like?How does it affect the way employees behave?What are some potential sources of intrinsic motivation for Southwest employees?

  Data warehousesas a business intelligence consultant you

data warehousesas a business intelligence consultant you have been tasked with submitting a proposal for creating an

  Analysing hostile code

Computer Forensics - Analysing hostile code - To deeply understand it, you may also try to figure out why it uses which resources. Write a report on your findings and submit it by the end of this week in the assignment folder.

  Describe the various integrative functions and processes

You have been made the Chief Information Officer and Chief Technology Officer (CIO / CTO) of an innovative e-Commerce start-up company that a venture capital group has funded. The CEO has given you sixty (60) days to deliver an information technol..

  Calculate the cost of quality according to the pmbok guide

Create the Quality Process Improvement Tools and Techniques section. ?Identify which process improvement tool or technique you will included in your overall project plan. Explain in detail how this will be implemented and what benefits or improveme..

  What was the companys problem

he write up will be one page that answers three questions:What was the company's problem,how did you solve the problem and what did you learn.

  Inhibitors to the vision of full interconnectivity1 what

inhibitors to the vision of full interconnectivity1. what might be some of the major inhibitors to the vision of full

  What are the best and worst traits of leaders

What are the best and worst traits of leaders you have worked with? How did these traits affect your productivity and engagement

  Evaluation of security technologies and methodologies

Write a 3- to 5-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards

  Write a review article for vpn security issues

Assignment - VPN Technologies and Issues. Write a review article for the following topics - VPN Replacement Technologies and VPN Security Issues

  Can you suggest some better ways to take card payments

What are the steps the affected people can take to help protect their information from being misused after such a massive data breach of Equifax?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd