Chat with us, powered by LiveChat Overall, what have you learned from this group activity? It can have theoretical or practical (or both) implications for this activity. For example, explain the take-awa - Wridemy

Overall, what have you learned from this group activity? It can have theoretical or practical (or both) implications for this activity. For example, explain the take-awa

Instructions are attached!  

1. Overall, what have you learned from this group activity? It can have theoretical or practical (or both) implications for this activity. For example, explain the take-away points from this topic, and describe how you would use what you have learned from this group activity in real similar scenarios. How can you put these points into practice? 

2. If you were a manager or leader (with power and financial resources) of a large multicultural company (for example, with different branches around the world), what change(s) would you pursue as your most important priority to improve the security safeguards and reduce privacy concerns in your company? 

3. Compose a tweet about this activity or write about what you have found very exciting (or informative) in this activity on Instagram. A real post (i.e., a screenshot of your post) is recommended if you have a Twitter or Instagram account. Please use three hashtags in your post. Please share your tweet or Instagram post in this report. 

1

4

Simulation scenario 

The organization IS simulation is about using technology in performance management and issues regarding information security management. In a multinational trade company (IT-based solutions, network consultancy, and programming) with three branches in Asia (Hong Kong), Africa (Nigeria), and Europe (Sweden), the CEO and upper-level executives (in HQ and branches) have utilized an  electronic tracking and  monitoring system and software to ensure that employees (service providers, IT staff, programmers,…) are working when and how they should be and to block access to visiting certain websites. They intended to use this system to improve their employees'  productivity, measure work  quality, beat deadlines, and make sure that their employees do not share  sensitive data and codes with other competitors. They believed electronic tracking and monitoring systems could provide real-time data and insights to help the company optimize its operations, reduce costs, and improve safety.

The technology for Performance and Security Management:

· The system includes hand and fingerprint recognition systems, global positioning systems (GPS) installed in the companies’ vehicles,  surveillance cameras in each branch, and systems that track employees using the company's  cell phones and handheld computers.

· Asset tracking can be used to monitor the location and status of company assets, such as vehicles, equipment, and inventory.

· Moreover, electronic monitoring systems can  monitor employee activities, such as time and attendance, productivity, and safety. This can help companies identify areas for improvement, reduce labor costs, and improve workplace safety. The systems can also monitor and secure company facilities, reducing the risk of theft, vandalism, or other  security threats.

· For example,  Keyloggers were used to record every keystroke made by an employee on their computer, helping employers monitor data entry, email correspondence, and more. While effective, they raise significant privacy concerns.

· They also used  content Filtering Solutions, specialized software, or cloud services designed to block website access based on content categories (such as social media, adult content, gaming, etc.), specific URLs, or keywords.

The company's headquarters is located in Australia (Melbourne), and the CEO and the branch managers have access to the monitoring system.

The management team believed they could improve the branches' productivity using the monitoring system, which was very costly for the company to implement across the branches. The company deployed the monitoring system in all the branches in  2 months after sending a brief notification to each branch manager. In the first month of applying the system, everything was OK!… After that, the problems have just begun as follows:

1. The behavior of employees working in the African branch changed. Their  absenteeism rate decreased, and their productivity declined too. They were in front of their computers all the time, but the results got worse eventually. They became very stressed and scared in the workplace. It seems something went wrong there!

 

2. The monitoring system was hacked in the Asian branch. The virus, which was called “ stare” was produced and destroyed the system. The HQ and top managers working in Hong Kong couldn’t even check the employees in the Hong Kong branch, and all they could see was: “Don’t stare at me like this!” that was displayed by the virus on their monitoring system’s screen … They also doubted whether the other branches could be monitored from Hong Kong. They were not entirely sure who hacked the system and why. The employees in Hong Kong didn’t take the blame for generating the virus.

 

 

3. In Sweden’s branch, everything seemed all right! The employees of the European branch were still working as before. They were very relaxed, and they worked as if there was no monitoring system at all. Most of them were also very interested in  watching live sports events, movies, and talk shows, even in the morning and evening times when they were in the workplace. Whenever possible, they watched live basketball, tennis, or other matches at work. The results showed that their  absenteeism rate increased more than before, and they made use of corporate computers or vehicles, even for their personal purposes. Nevertheless, their productivity level didn’t decline, and it was still high.

 

What to do?

· The CEO has invited representatives (some managers and employees) from each branch to Australia to solve the problems. In the meeting, the management team should support the system adoption, explain the primary rationale behind the implementation, describe the benefits of using the system for the company and employees, and emphasize the monitoring system's usage to manage security and improve productivity.

· Each branch should thoroughly explain the issue and elaborate on the  risks they experienced with the system in the meeting.

· Each branch also needs to offer some possible  solutions/suggestions on how to manage the system.

· HQ managers should listen to each group’s explanations and feedback to analyze the overall situation.

· After the meeting, the company should reach an agreement and decide if they want to continue the system as before or if they want to make some adjustments or modifications.

· For instance, a further training program may be required. Or they may want to modify the system use-policy statement…

· In the simulation, we have a group of observers that serve as a judge, and they can interrupt the discussions and give their comments on the things happening among the other groups  whenever required.

Each student needs to submit an individual report with (at least) three paragraphs for the individual grades. In your individual report, please include the following items: 

1. Overall, what have you learned from this group activity? It can have theoretical or practical (or both) implications for this activity. For example, explain the take-away points from this topic, and describe how you would use what you have learned from this group activity in real similar scenarios. How can you put these points into practice?

2. If you were a manager or leader (with power and financial resources) of a large multicultural company (for example, with different branches around the world), what change(s) would you pursue as your most important priority to improve the security safeguards and reduce privacy concerns in your company?

3. Compose a tweet about this activity or write about what you have found very exciting (or informative) in this activity on Instagram. A real post (i.e., a screenshot of your post) is recommended if you have a Twitter or Instagram account. Please use three hashtags in your post. Please share your tweet or Instagram post in this report.

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Place Order” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order