SlideShare a Scribd company logo
1 of 16
Pg. 01
Special Instructions
(
Project
Deadline: Tuesday 31/03/2020 @ 23:59
[Total Mark for this
Project
is
9
]
) (
IT Security and Policies
IT409
)
(
Instructions:
You must submit two separate copies
(one Word file and one PDF file)
using this Template
on Blackboard via the allocated folder. These files
must not be in compressed format
.
It is your responsibility to check and make sure that you have
uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign
(e.g. misspell words, remove spaces between words, hide
characters, use different character sets or languages other than
English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented.
This includes filling your information on the cover page.
You must use this template, failing which will result in zero
mark.
You MUST show all your work, and text
must not
be converted into an image, unless specified otherwise by the
question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other
resources will result in ZERO mark.
Use
Times New Roman
font for all your answers.
) (
Student Details:
Name:
###
CRN
:
###
ID:
###
Group : ###
)
College of Computing and Informatics
Special Instructions
To answer the questions effectively, please follow the below
instructions:
· Each team might contain three students. Each student must
conduct an interview with cybersecurity employee in the chosen
company as individual, which mean each group should have
three filled questionnaires.
· Use your analysis skills to analyze all data collected by your
team.
· It is possible to measure the significance of collected data by
countering the frequency of each item (i.e. if the item frequent
three times, this mean it is very significant)
· You should answer the questions in this research activity as
group.
_____________________________________________________
_________________
(
Learning Outcome(s):
LO
1, LO2, LO3, LO4, LO5, LO6
) (
4
Marks
)Questionnaire Section 1.0: Introduction
In this era, the revolution of information technology is changing
several aspects of enterprises’ practices. One of these changes
is many enterprises make their systems available online. This
most likely is encouraging cyber criminals to hack these
systems. One of the approaches that help to mitigate
cybersecurity risks is adopting of Information Security Policy
(ISP). However, it is not known to what extent the enterprises in
Saudi Arabia are adopting Information Security Policy in
general, and in small and medium enterprises’ (SMEs) in
particular. This research project aims to discover the success
factors for the adoption of Information Security Policy in Saudi
SMEs.
Section 2.0: Profile of Responding Manager or Owner
Please indicate
1. Your job role:
Owner
Chief Executiveofficer (CEO)
Manager
Other (Please specify):
2. Your gender:
Male
Female
3. How many years have you been working for the organization?
< 1 year
1 – 5 years
6 – 10 years
Over 10 years
Section 3.0: Profile of Responding Enterprise
1. Please indicate the sector of business area of your
organization
Food & Drink
Entertainment/Culture
Retail/wholesale
Restaurants
Cleaning
Commercial & Creative Arts
Financial Broker Services
Information Technology
Furnishings/Home Products
Real Estate Services
Telecommunication
Automotive
Health & Caring Services
Education/Training
Clothing, Fashion & Beauty
Professional Services
Retail/wholesale
Other: (Please specify)
Entertainment/Culture
Employment Agency
2. Please indicate your organization’s approximate revenue
<SAR3 million
SAR3 million - $40 million
SAR40 million - SAR200 million
3. Number of employees
0 – 5
6 – 49
50 - 249
Section 4.0: Information Security Policy (ISP)
1. Please indicate when did your enterprise adopt ISP
2. Please indicate how your enterprise developed the ISP
By internal team
By third party
By hiring a consultant
Other:(Please indicate
……………………………………………………………….………
……..)
3. Please indicate which framework was used to develop your
ISP
ISO 27002:2013
NIST 800-53
COBIT
PCI-DSS
National Cybersecurity Authority(NCA-KSA)
Other:
4. How often do your enterprise review the ISP?
Every three months
Every six months
Every year
Other:(Please indicate
……………………………………………………………….………
……..)
5. Who Authorizes Information Security Policy at your
organization?
Board of directors
Information Security leader
Information security committee
Other: (Please indicate
…………………………………………………………..……………
……..)
6.
Please indicate your enterprise adoption level based on the
Capability Maturity Model Scale
Level
State
Description
0
Non-Existent
The organization is unaware of need for policies and processes
1
Ad-hoc
There are no documented policies or processes; there is sporadic
activity.
2
Repeatable
Policies and processes are not fully documented; however, the
activities occur on a regular basis.
3
Defined Process
Policies and processes are documented and standardized; there
is an active commitment to implementation
4
Managed
Policies and processes are well defined, implemented,
measured, and tested.
5
Optimized
Policies and process are well understood and have been fully
integrated into the organizational culture.
Section 5.0: Success Factors of ISP Adoption in Saudi SMEs
1
2
3
4
5
Strongly Agee
Agree
Neutral
Disagree
Strongly disagree
Please use the following scale to rate your answer:
Technological (T) Factors
1. Availability of technical Expertise
· Availability of cybersecurity consultant facilities the adoption
of ISP in our enterprise
1
2
3
4
5
· Availability of IT staff trained in cybersecurity facilities the
adoption of ISP in our enterprise
1
2
3
4
5
2. Complexity
· Perceived low level of complexity in cybersecurity systems
facilities the adoption of ISP in our enterprise
1
2
3
4
5
· Ease of using cybersecurity systems facilities the adoption of
ISP in our enterprise
1
2
3
4
5
3. Cybersecurity systems Cost
· Low cost of cybersecurity systems facilities the adoption of
ISP in our enterprise
1
2
3
4
5
· Availability of cybersecurity systems vendors help to reduce
the cost which in turn facilities the adoption of ISP in our
enterprise
1
2
3
4
5
Organizational (O) Factors
1. Security Concerns
· The powerful of cybersecurity systems facilities the adoption
of ISP in our enterprise
1
2
3
4
5
· Perceived cybersecurity risks encourage our enterprise to
adopt ISP
1
2
3
4
5
· Presence of trust in enterprise’s cybersecurity systems help to
adopt ISP
1
2
3
4
5
2. Training
· Availability of periodical cybersecurity training help to adopt
ISP
1
2
3
4
5
· Encourage our employees to get professional certificates in
cybersecurity that facilitates the adoption of ISP
1
2
3
4
5
· Conducting cybersecurity training courses for non-IT
employee that facilitates the adoption of ISP
1
2
3
4
5
3. Top management support
· Top management committed to support cybersecurity adoption
in our company (enterprise)
1
2
3
4
5
· Top management in our company(enterprise) is fully aware
about the importance of cybersecurity advantages which in turn
facilitatesthe adoption of ISP
1
2
3
4
5
· Availability of technical background for the top management
in our company help the adoption of ISP
1
2
3
4
5
· The willingness of top management to develop our
companyhelp the adoption of ISP
1
2
3
4
5
4. Organizational Awareness
· The high level of cybersecurity awareness of our
employeeshelpsto adopt ISP easily
1
2
3
4
5
5. Organizational Culture
· Emphasis growth through developing new ideasthat facilitates
the adoption of ISP
1
2
3
4
5
· Employee’s loyalty for our company(enterprise)that facilitates
the adoption of ISP
1
2
3
4
5
· Willingness of our company (enterprise)to achieve its
goalsthat facilitates the adoption of ISP
1
2
3
4
5
Environmental (E) Factors
1. Cybersecurity Law
· The presence of cybersecurity law in Saudi
Arabiafacilitatesthe adoption of ISP
1
2
3
4
5
· Our company(enterprise) awareness about the cybersecurity
lawfacilitates the adoption of ISP
1
2
3
4
5
2. External Pressure
· Competitors’ pressure encourages our company to adopt ISP
1
2
3
4
5
· Customers’ pressure encourages our company to adopt ISP
1
2
3
4
5
· Suppliers’ pressure encourages our company to adopt ISP
1
2
3
4
5
· Government’s pressure encourages our company to adopt ISP
1
2
3
4
5
Other: Please indicate ….
(
1
Marks
)Q (
Learning Outcome(s):
LO
2
)uestion One
Write down in more details, how did each member of your team
select the participating company? (
2
Marks
) (
Learning Outcome(s):
LO
4
)Question Two
Based on your analysis for section 2, 3, and 4 of all
questionnaires that were collected by your team, what are the
significant items? Support your answer by providing an example
from your collected data. (
2
Marks
) (
Learning Outcome(s):
LO 5
)Question Three
Identify the significant factors in section 5 of the questionnaires
collected by your team? Discuss the findings from your point of
view?
ITS 832
Chapter 16
Analysis of Five Policy Cases in the Field of Energy Policy
Information Technology in a Global Economy
Professor Michael Solomon
1
Overview
Introduction
Theoretical grounds of policy implementation
Approaches to policy implementation
Five case studies
Lessons learned
Conclusion
Introduction
Population and burning fossil fuels
Factors of high pollution
Environmental policy is high priority
Most nations initiated projects to improve climate
Focus
Sustainable energy management
Renewable energy sources
Five case studies on climate change and energy use
Comparative investigation
What approaches are used?
How can implications be measured?
How easily can approaches be applied to other domains?
Theoretical Grounds of Policy Implementation
Policy implementation
Turning theory into practice
Gaps often occur / Formulated versus implemented policy
Instruments for climate change policy
Financial measures
Legal / regulatory instruments
Organizational measures
Certificates or marketable permits / quotas
Policy instruments for renewable energy
Regulations and standards
Quantity instruments
Price instruments
Public procurement
Auction
Approaches to Policy Implementation
Top-down
Policies are communicated from policy-makers
Bottom-up
Focus is on policy implementers
Macro- and micro-implementation
Macro - Government -> local authorities
Micro – Local government -> local polices
Principal-agent theory
Policy makers (principals) delegate responsibility to officials
(agents)
Investigating Five Case Studies
Assessing the EU Policy Package in Climate Change and
Renewables
German Nuclear Phase-Out and Energy Transition Policy
KNOWBRIDGE: Cross-Border Knowledge Bridge in the RES
Cluster in East Slovakia and North Hungary
KSR’s Strategy for the Use of Renewable Energy Sources
MODEL: Management of Domains Related to Energy in Local
Authorities
Lessons Learned
Main common focus
Renewable energy sources
Some projects defined clear goals
Dates
Quantifiable targets
Others focused on long-term strategies
Precise targets versus investigating issues
Biggest takeaway
Involving consumers in policy making increases implementation
success
Conclusion
Climate change and transition to RES is a serious issue
Awareness is growing
But not fast enough
Public policy is necessary to move away from fossil fuels
Projects show how RES can be possible and sustainable
However
Transition to RES is expensive
One reason for slow adoption

More Related Content

Similar to Pg. 01Special Instructions (ProjectDeadline Tue.docx

Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
katherncarlyle
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
daniahendric
 
UHealth is a health insurance provider based in Australia F.pdf
UHealth is a health insurance provider based in Australia F.pdfUHealth is a health insurance provider based in Australia F.pdf
UHealth is a health insurance provider based in Australia F.pdf
info824030
 
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docxPart 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
danhaley45372
 
You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems
walthamcoretta
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
eleanorabarrington
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
davieec5f
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
dewhirstichabod
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
manningchassidy
 
Project Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docxProject Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docx
wkyra78
 
Class,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docxClass,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docx
clarebernice
 

Similar to Pg. 01Special Instructions (ProjectDeadline Tue.docx (20)

Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
 
UHealth is a health insurance provider based in Australia F.pdf
UHealth is a health insurance provider based in Australia F.pdfUHealth is a health insurance provider based in Australia F.pdf
UHealth is a health insurance provider based in Australia F.pdf
 
CMGT 431 Education Specialist |tutorialrank.com
CMGT 431 Education Specialist |tutorialrank.comCMGT 431 Education Specialist |tutorialrank.com
CMGT 431 Education Specialist |tutorialrank.com
 
CMGT 431 Education Specialist |tutorialrank.com
CMGT 431 Education Specialist |tutorialrank.comCMGT 431 Education Specialist |tutorialrank.com
CMGT 431 Education Specialist |tutorialrank.com
 
Cis 333 Education Redefined - snaptutorial.com
Cis 333     Education Redefined - snaptutorial.comCis 333     Education Redefined - snaptutorial.com
Cis 333 Education Redefined - snaptutorial.com
 
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docxPart 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
 
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
INTERNAL Assign no   207( JAIPUR NATIONAL UNI)INTERNAL Assign no   207( JAIPUR NATIONAL UNI)
INTERNAL Assign no 207( JAIPUR NATIONAL UNI)
 
You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems You need to analyze the features of three videoconferencing systems
You need to analyze the features of three videoconferencing systems
 
How to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofitHow to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofit
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Project 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This cheProject 1CST630 Project ChecklistStudent Name DateNote This che
Project 1CST630 Project ChecklistStudent Name DateNote This che
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]Sample Cloud Application Security and Operations Policy [release]
Sample Cloud Application Security and Operations Policy [release]
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
Project Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docxProject Deliverable 2 Business Requirements1Project Deliverab.docx
Project Deliverable 2 Business Requirements1Project Deliverab.docx
 
Class,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docxClass,Im providing a recently example of a critical analysis wr.docx
Class,Im providing a recently example of a critical analysis wr.docx
 

More from karlhennesey

More from karlhennesey (20)

Resources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docxResources Assigned readings, ERRs, the Internet,and other resources.docx
Resources Assigned readings, ERRs, the Internet,and other resources.docx
 
Resource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docxResource Review Documenting the Face of America Roy Stryker and.docx
Resource Review Documenting the Face of America Roy Stryker and.docx
 
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docxResource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
Resource Review Thelma Golden--How Art Gives Shape to Cultural C.docx
 
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docxResource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
Resource Review Representational Cityscape, and Ch. 3 of Oxfo.docx
 
Resource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docxResource Part 2 of Terrorism TodayYou work on a national se.docx
Resource Part 2 of Terrorism TodayYou work on a national se.docx
 
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docxResources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
Resources Appendix A, The Home Depot, Inc. Annual Report in Fun.docx
 
Resources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docxResources Annotated Bibliography document. Research five websites t.docx
Resources Annotated Bibliography document. Research five websites t.docx
 
Resources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docxResources American History, Primary Source Investigator;Cente.docx
Resources American History, Primary Source Investigator;Cente.docx
 
Resource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docxResource University of Phoenix Material Data SetDownload the.docx
Resource University of Phoenix Material Data SetDownload the.docx
 
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docxResource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
Resource Ch. 6 & 7 of Financial AccountingComplete Brief Ex.docx
 
Resource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docxResource Films on DemandCrime and Punishment”Experiment Res.docx
Resource Films on DemandCrime and Punishment”Experiment Res.docx
 
Resource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docxResource Managing Environmental Issues Simulation(or research a.docx
Resource Managing Environmental Issues Simulation(or research a.docx
 
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docxResource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
Resource Ch. 9 of Introduction to Business Create a 5-to-7 slide .docx
 
Resource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docxResource Ch. 9 of Introduction to Business Complete the table in .docx
Resource Ch. 9 of Introduction to Business Complete the table in .docx
 
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docxResource Ch. 3 of ManagementIdentify a time in your life wh.docx
Resource Ch. 3 of ManagementIdentify a time in your life wh.docx
 
Resource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docxResource Significant Health Care Event Paper Grading Criteria.docx
Resource Significant Health Care Event Paper Grading Criteria.docx
 
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docxResource Ch. 3 of Financial AccountingComplete Exercises E3.docx
Resource Ch. 3 of Financial AccountingComplete Exercises E3.docx
 
Resource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docxResource University of Phoenix Material Appendix AIdentify.docx
Resource University of Phoenix Material Appendix AIdentify.docx
 
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docxResource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
Resource The Threat of Bioterrorism VideoWrite a 700 to 850-w.docx
 
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docxResource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
Resource Ch. 14 of Introduction to Psychology Create an 8 to 12 s.docx
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 

Pg. 01Special Instructions (ProjectDeadline Tue.docx

  • 1. Pg. 01 Special Instructions ( Project Deadline: Tuesday 31/03/2020 @ 23:59 [Total Mark for this Project is 9 ] ) ( IT Security and Policies IT409 ) ( Instructions: You must submit two separate copies (one Word file and one PDF file) using this Template on Blackboard via the allocated folder. These files must not be in compressed format . It is your responsibility to check and make sure that you have uploaded both the correct files. Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets or languages other than English or any kind of manipulation).
  • 2. Email submission will not be accepted. You are advised to make your work clear and well-presented. This includes filling your information on the cover page. You must use this template, failing which will result in zero mark. You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question. Late submission will result in ZERO mark. The work should be your own, copying from students or other resources will result in ZERO mark. Use Times New Roman font for all your answers. ) ( Student Details: Name: ### CRN : ### ID: ### Group : ### ) College of Computing and Informatics
  • 3. Special Instructions To answer the questions effectively, please follow the below instructions: · Each team might contain three students. Each student must conduct an interview with cybersecurity employee in the chosen company as individual, which mean each group should have three filled questionnaires. · Use your analysis skills to analyze all data collected by your team. · It is possible to measure the significance of collected data by countering the frequency of each item (i.e. if the item frequent three times, this mean it is very significant) · You should answer the questions in this research activity as group. _____________________________________________________ _________________ ( Learning Outcome(s): LO 1, LO2, LO3, LO4, LO5, LO6 ) ( 4 Marks )Questionnaire Section 1.0: Introduction In this era, the revolution of information technology is changing several aspects of enterprises’ practices. One of these changes is many enterprises make their systems available online. This most likely is encouraging cyber criminals to hack these systems. One of the approaches that help to mitigate cybersecurity risks is adopting of Information Security Policy (ISP). However, it is not known to what extent the enterprises in Saudi Arabia are adopting Information Security Policy in general, and in small and medium enterprises’ (SMEs) in particular. This research project aims to discover the success factors for the adoption of Information Security Policy in Saudi SMEs.
  • 4. Section 2.0: Profile of Responding Manager or Owner Please indicate 1. Your job role: Owner Chief Executiveofficer (CEO) Manager Other (Please specify): 2. Your gender: Male Female 3. How many years have you been working for the organization? < 1 year 1 – 5 years 6 – 10 years Over 10 years Section 3.0: Profile of Responding Enterprise 1. Please indicate the sector of business area of your organization Food & Drink Entertainment/Culture Retail/wholesale Restaurants Cleaning Commercial & Creative Arts Financial Broker Services Information Technology Furnishings/Home Products Real Estate Services Telecommunication Automotive Health & Caring Services Education/Training Clothing, Fashion & Beauty Professional Services Retail/wholesale
  • 5. Other: (Please specify) Entertainment/Culture Employment Agency 2. Please indicate your organization’s approximate revenue <SAR3 million SAR3 million - $40 million SAR40 million - SAR200 million 3. Number of employees 0 – 5 6 – 49 50 - 249 Section 4.0: Information Security Policy (ISP) 1. Please indicate when did your enterprise adopt ISP 2. Please indicate how your enterprise developed the ISP By internal team By third party By hiring a consultant Other:(Please indicate ……………………………………………………………….……… ……..) 3. Please indicate which framework was used to develop your ISP ISO 27002:2013 NIST 800-53 COBIT PCI-DSS National Cybersecurity Authority(NCA-KSA) Other: 4. How often do your enterprise review the ISP? Every three months Every six months Every year Other:(Please indicate
  • 6. ……………………………………………………………….……… ……..) 5. Who Authorizes Information Security Policy at your organization? Board of directors Information Security leader Information security committee Other: (Please indicate …………………………………………………………..…………… ……..) 6. Please indicate your enterprise adoption level based on the Capability Maturity Model Scale Level State Description 0 Non-Existent The organization is unaware of need for policies and processes 1 Ad-hoc There are no documented policies or processes; there is sporadic activity. 2 Repeatable Policies and processes are not fully documented; however, the activities occur on a regular basis. 3 Defined Process Policies and processes are documented and standardized; there is an active commitment to implementation 4 Managed Policies and processes are well defined, implemented, measured, and tested. 5
  • 7. Optimized Policies and process are well understood and have been fully integrated into the organizational culture. Section 5.0: Success Factors of ISP Adoption in Saudi SMEs 1 2 3 4 5 Strongly Agee Agree Neutral Disagree Strongly disagree Please use the following scale to rate your answer: Technological (T) Factors 1. Availability of technical Expertise · Availability of cybersecurity consultant facilities the adoption of ISP in our enterprise 1 2 3 4 5 · Availability of IT staff trained in cybersecurity facilities the adoption of ISP in our enterprise 1 2 3 4 5 2. Complexity · Perceived low level of complexity in cybersecurity systems facilities the adoption of ISP in our enterprise 1 2
  • 8. 3 4 5 · Ease of using cybersecurity systems facilities the adoption of ISP in our enterprise 1 2 3 4 5 3. Cybersecurity systems Cost · Low cost of cybersecurity systems facilities the adoption of ISP in our enterprise 1 2 3 4 5 · Availability of cybersecurity systems vendors help to reduce the cost which in turn facilities the adoption of ISP in our enterprise 1 2 3 4 5 Organizational (O) Factors 1. Security Concerns · The powerful of cybersecurity systems facilities the adoption of ISP in our enterprise 1 2 3
  • 9. 4 5 · Perceived cybersecurity risks encourage our enterprise to adopt ISP 1 2 3 4 5 · Presence of trust in enterprise’s cybersecurity systems help to adopt ISP 1 2 3 4 5 2. Training · Availability of periodical cybersecurity training help to adopt ISP 1 2 3 4 5 · Encourage our employees to get professional certificates in cybersecurity that facilitates the adoption of ISP 1 2 3 4 5 · Conducting cybersecurity training courses for non-IT employee that facilitates the adoption of ISP 1 2 3
  • 10. 4 5 3. Top management support · Top management committed to support cybersecurity adoption in our company (enterprise) 1 2 3 4 5 · Top management in our company(enterprise) is fully aware about the importance of cybersecurity advantages which in turn facilitatesthe adoption of ISP 1 2 3 4 5 · Availability of technical background for the top management in our company help the adoption of ISP 1 2 3 4 5 · The willingness of top management to develop our companyhelp the adoption of ISP 1 2 3 4 5 4. Organizational Awareness · The high level of cybersecurity awareness of our employeeshelpsto adopt ISP easily
  • 11. 1 2 3 4 5 5. Organizational Culture · Emphasis growth through developing new ideasthat facilitates the adoption of ISP 1 2 3 4 5 · Employee’s loyalty for our company(enterprise)that facilitates the adoption of ISP 1 2 3 4 5 · Willingness of our company (enterprise)to achieve its goalsthat facilitates the adoption of ISP 1 2 3 4 5 Environmental (E) Factors 1. Cybersecurity Law · The presence of cybersecurity law in Saudi Arabiafacilitatesthe adoption of ISP 1 2 3 4 5
  • 12. · Our company(enterprise) awareness about the cybersecurity lawfacilitates the adoption of ISP 1 2 3 4 5 2. External Pressure · Competitors’ pressure encourages our company to adopt ISP 1 2 3 4 5 · Customers’ pressure encourages our company to adopt ISP 1 2 3 4 5 · Suppliers’ pressure encourages our company to adopt ISP 1 2 3 4 5 · Government’s pressure encourages our company to adopt ISP 1 2 3 4 5 Other: Please indicate ….
  • 13. ( 1 Marks )Q ( Learning Outcome(s): LO 2 )uestion One Write down in more details, how did each member of your team select the participating company? ( 2 Marks ) ( Learning Outcome(s): LO 4 )Question Two Based on your analysis for section 2, 3, and 4 of all questionnaires that were collected by your team, what are the significant items? Support your answer by providing an example from your collected data. ( 2 Marks ) ( Learning Outcome(s): LO 5 )Question Three Identify the significant factors in section 5 of the questionnaires collected by your team? Discuss the findings from your point of view? ITS 832
  • 14. Chapter 16 Analysis of Five Policy Cases in the Field of Energy Policy Information Technology in a Global Economy Professor Michael Solomon 1 Overview Introduction Theoretical grounds of policy implementation Approaches to policy implementation Five case studies Lessons learned Conclusion Introduction Population and burning fossil fuels Factors of high pollution Environmental policy is high priority Most nations initiated projects to improve climate Focus Sustainable energy management Renewable energy sources Five case studies on climate change and energy use Comparative investigation What approaches are used? How can implications be measured? How easily can approaches be applied to other domains? Theoretical Grounds of Policy Implementation
  • 15. Policy implementation Turning theory into practice Gaps often occur / Formulated versus implemented policy Instruments for climate change policy Financial measures Legal / regulatory instruments Organizational measures Certificates or marketable permits / quotas Policy instruments for renewable energy Regulations and standards Quantity instruments Price instruments Public procurement Auction Approaches to Policy Implementation Top-down Policies are communicated from policy-makers Bottom-up Focus is on policy implementers Macro- and micro-implementation Macro - Government -> local authorities Micro – Local government -> local polices Principal-agent theory Policy makers (principals) delegate responsibility to officials (agents) Investigating Five Case Studies Assessing the EU Policy Package in Climate Change and Renewables German Nuclear Phase-Out and Energy Transition Policy KNOWBRIDGE: Cross-Border Knowledge Bridge in the RES Cluster in East Slovakia and North Hungary
  • 16. KSR’s Strategy for the Use of Renewable Energy Sources MODEL: Management of Domains Related to Energy in Local Authorities Lessons Learned Main common focus Renewable energy sources Some projects defined clear goals Dates Quantifiable targets Others focused on long-term strategies Precise targets versus investigating issues Biggest takeaway Involving consumers in policy making increases implementation success Conclusion Climate change and transition to RES is a serious issue Awareness is growing But not fast enough Public policy is necessary to move away from fossil fuels Projects show how RES can be possible and sustainable However Transition to RES is expensive One reason for slow adoption