Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The organizational IS simulation is about using technology in performance management and issues regarding information security management. In a multinational trade company (IT-based solutions, network

The organizational IS simulation is about using technology in performance management and issues regarding information security management. In a multinational trade company (IT-based solutions, network consultancy, and programming) with three branches in Asia (Hong Kong), Africa (Nigeria), and Europe (Sweden), the CEO and upper-level executives (in HQ and branches) have utilized an electronic tracking and monitoring system and software to ensure that employees (service providers, IT staff, programmers,...) are working when and how they should be and to block access to visiting certain websites. They intended to use this system to improve their employees' productivity, measure work quality, beat deadlines, and ensure that they do not share sensitive data and codes with competitors. They believed electronic tracking and monitoring systems could provide real-time data and insights to help the company optimize its operations, reduce costs, and improve safety.

The technology for Performance and Security Management:

  • The system includes hand and fingerprint recognition systems, global positioning systems (GPS) installed in the companies' vehicles, surveillance cameras in each branch, and systems that track employees using the company's cell phones and handheld computers.
  • Asset tracking can be used to monitor the location and status of company assets, such as vehicles, equipment, and inventory.
  • Moreover, electronic monitoring systems can monitor employee activities, such as time and attendance, productivity, and safety. This can help companies identify areas for improvement, reduce labor costs, and improve safety in the workplace. The systems can also monitor and secure company facilities, reducing the risk of theft, vandalism, or other security threats.
  • For example, Keyloggers were used to record every keystroke made by an employee on their computer, helping employers monitor data entry, email correspondence, and more. While effective, they raise significant privacy concerns.
  • They also used content Filtering Solutions, specialized software, or cloud services designed to block website accessbased on content categories (such as social media, adult content, gaming, etc.), specific URLs, or keywords.

The company's HQ is located in Australia (Melbourne), and the CEO and the branch managers have access to the monitoring system.

The management team believed they could improve the branches' productivity using the monitoring system, which was very costly for the company to implement across the branches. The company deployed the monitoring system in all the branches in 2 months after sending a brief notification to each branch manager. In the first month of applying the system, everything was OK!... After that, the problems have just begun as follows:

1. The behavior of employees working in the African branch changed. Their absenteeism rate decreased, and their productivity declined, too. They were constantly in front of their computers, but the results got worse eventually. They became verystressed and scared in the workplace. This evidence suggested that employees were not working as efficiently or effectively as they could be. So, somethingwent wrong there!

2. The monitoring system was hacked in the Asian branch. The virus, which was called "stare," was produced and destroyed the system. The HQ and top managers working in Hong Kong couldn't even check the employees in the Hong Kong branch, and all they could see was: "Don't stare at me like this!" the virus displayed on their monitoring system's screen ... They also doubted whether the other branches could be monitored from Hong Kong. They were not entirely sure who hacked the system and why. The employees in Hong Kong didn't take the blame for generating the virus.

3. In Sweden's branch, everything seemed all right! The employees of the European branch were still working as before. They were very relaxed, and they worked as if there was no monitoring system at all. Most of them were also very interested in watching live sports events, movies, and talk shows, even in the morning and evening times when they were in the workplace. They watched live basketball, tennis, or other matches at work whenever possible. The results showed that their absenteeism rate increased more than before, and they used corporate computers or vehicles, even for personal purposes. Nevertheless, their productivity level didn't decline, and it was still high.

Scenario

  • The CEO and top executives have invited some representatives (some supervisors and employees) from each branch to Australia to solve the problems. In the meeting, the management team (in the headquarters) first tries to support the system adoption, explains the primary rationale behind the implementation, describes the benefits of using the system for the company and employees, and emphasizes the monitoring system's usage to manage security and improve productivity.
  • However, all branches insist that the identified issues and risks they have experienced with the system are critical and should be addressed.
  • HQ managers listen to each branch's observations to analyze the overall situation.
  • After listening to the explanations in the meeting, the company wants to reach an agreement and decide if they want to continue the system as is or want to have some adjustments or modifications.
  • For instance, a further training program may be required, or they may want to modify the system use policy statement, etc...

Deliverables in the role-play:

Imagine you were in the management team of the company in this situation:

(as a representative of the management team) a report, including the following:

  1. Brief explanations and thoughts on the scenario (as a whole):
  2. Criticize the current electronic tracking and monitoring system that you have implemented (e.g., what is wrong with the system? What is missing? What are the key errors in the system?): Self-critique
  3. Your final decision to solve the issue (e.g., what modifications you will make to improve the situations for each branch? Explain possible changes you would like to do.): Contribution
  4. The key advantages and possible risks associated with your new decision: Analysis
  5. Compose a tweet about this activity or write about what you have found very exciting (or informative) in this activity on Instagram. write hypothetical tweet or an Instagram post. Please use three hashtags in your post.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Project Management A Systems Approach To Planning Scheduling And Controlling

Authors: Harold Kerzner

13th Edition

1119805376, 978-1119805373

More Books

Students also viewed these General Management questions

Question

=+b) What might you consider doing next?

Answered: 1 week ago

Question

Describe various competitive compensation policies.

Answered: 1 week ago