Information Security and Virtual Teams

2017 ◽  
Vol 4 (2) ◽  
pp. 1-7
Author(s):  
Penny Hart

This article contends that there are two increasingly important phenomena for organisations: the existence of virtual teams and the realisation that information needs to be protected more effectively. On-line communication methods expose organisations to issues regarding security of their ICT infrastructure, systems and data. At the same time, making possible virtual teams able to be unconstrained in purpose, time or location. While security measures are built into the teams' communication channels and processes, the perceptions, practices and organizational background of team members are equally important to the security of information being exchanged. A socio-technical approach is called for when investigating different perceptions of information security by individual team members, how they negotiate a common understanding for the team and what complexities and practices are introduced in multi-organisation teams. The article sets out issues which may need to be considered and proposes a course of research to increase understanding of the situation.

Author(s):  
Jill E. Nemiro

This chapter describes an exploratory, qualitative research project that investigated the work environment necessary for virtual teams to be creative. Nine different virtual teams, with a total of 36 virtual team members (33 of which completed the full study), participated in this study. Three teams were organizational consulting firms, two teams were educational consortiums, three teams were on-line service provider teams, and one team was a product design engineering team. One semi-structured, telephone interview was conducted with each participant. Team members also completed a background survey. Grounded theorizing was used to generate an in-depth understanding of the phenomena under investigation. Connection, defined as the elements that need to be in place for a team to develop and maintain identity and a sense of community, emerged as a key category important to the realization of creativity in virtual teams. Connection was further subdivided into task connection (made up of dedication/commitment, and goal clarity); and interpersonal connection (made up of information sharing, trust, and personal bond). Suggestions for how team designers, team leaders, or managers can establish and develop connection in their own virtual teams are offered.


Author(s):  
Hryhoriy Hnatienko ◽  
Natalia Tmenova

High-quality functioning of the information security system and solving problems that arise in the information protection, is currently a topical trend in various areas of human life. Successful cyber protection consist in creating and implementing a multi-level system of measures that cover various aspects with complex interact and complement each other. These measures have a different nature, and their priorities may differ significantly in terms of different services of the organization, so it is logical to formalize the sequence of cybersecurity implementation in a class of group choice tasks. The paper proposes a flexible mathematical apparatus for modeling information security problems and adequate application of the opinion analysis of experts’ team in practice. The approach to finding the resultant ranking of measures priority is described as a solution to the problem of multicriteria optimization, where the sequence of measures implementation may involve the interaction of performers and require regulation of the actions sequence of all elements and subsystems of the organizational system. This approach allows to combine different information security measures proposed by the experts of various departments; to find a compromise solution for a diverse group of experts; not to violate any expert's preferences under calculating the compromise ranking of cyber security measures. The proposed approach can be useful in developing appropriate cybersecurity measures and favorable in developing and implementing of rapid response procedures to threats, as well as it can be indispensable in the overall building or improving organization security system and it can contain elements of training, coordination, and complexity of expert team members, who are the heads of units of a single organizational system.


2013 ◽  
Vol 8 (1-2) ◽  
pp. 5-11
Author(s):  
Kinga Dancsházy ◽  
György Hampel

The goal of the project developed under the Leonardo da Vinci programme, "SME's e-learning to e-work efficiently" was to provide a practical and useful support for the preparation of e-managers and e-workers of small and medium-sized enterprises working in a virtual environment and to be able to be useful e-team members of virtual teams. To achieve the goals the following tasks were carried out: (1) Specification of needs; (2) Development of the on-line toolkit; (3) Development of the training material; (4) Training the e-tutors; (5) Development of the testing methodology; (6) Pilot testing on the target group; (7) Accreditation of the modules; (8) Continuous dissemination and promotion activities. The three main products of the project are the sectoral survey report, the on-line toolkit and twelve e-learning modules. All products arc developed to support e-work in a virtual environment.


2014 ◽  
pp. 307-325
Author(s):  
Robyn A. Berkley ◽  
Roxanne Beard ◽  
David M. Kaplan

In this chapter, the authors present a model for understanding the context and determinants of aggression within an on-line environment, known as cyber-aggression. They propose that the heterogeneity of global virtual teams along with other key individual characteristics such as Social Dominance Orientation, Identification Threat, and past experience with aggression/harassment will lead to greater likelihood of cyber-aggression occurring or being perceived by group members. Additionally, the use of lean communication media, as well as the distance between team members and the social and professional isolation that goes along with global virtual team work also contributes to greater likelihood of cyber-aggression occurring. Lastly, without any way to build meaningful trust in a virtual setting and a lack of cross-cultural competence, members of global virtual teams are more likely to engage in behaviors that do not demonstrate cultural sensitivity or cohesion on the team, resulting in poor communication which can lead to more aggressive behaviors. The authors conclude their chapter with recommendations on how to best combat these pitfalls of working in a virtual environment.


Author(s):  
Robyn A. Berkley ◽  
Roxanne Beard ◽  
David M. Kaplan

In this chapter, the authors present a model for understanding the context and determinants of aggression within an on-line environment, known as cyber-aggression. They propose that the heterogeneity of global virtual teams along with other key individual characteristics such as Social Dominance Orientation, Identification Threat, and past experience with aggression/harassment will lead to greater likelihood of cyber-aggression occurring or being perceived by group members. Additionally, the use of lean communication media, as well as the distance between team members and the social and professional isolation that goes along with global virtual team work also contributes to greater likelihood of cyber-aggression occurring. Lastly, without any way to build meaningful trust in a virtual setting and a lack of cross-cultural competence, members of global virtual teams are more likely to engage in behaviors that do not demonstrate cultural sensitivity or cohesion on the team, resulting in poor communication which can lead to more aggressive behaviors. The authors conclude their chapter with recommendations on how to best combat these pitfalls of working in a virtual environment.


2021 ◽  
pp. 104649642199789
Author(s):  
Patrícia L. Costa ◽  
Lisa Handke ◽  
Thomas A. O’Neill

Team virtuality has been mostly conceptualized as structural features, such as the percentage of time team members communicate via technology. However, the perception of distance and of information deficits (team perceived virtuality, TPV) may be an indispensable construct to understand virtual teams’ functioning. The lockdowns imposed on most countries due to COVID-19 created virtual teams with high degrees of structural virtuality. With structural virtuality held constant among teams, we explore configurations of work characteristics (autonomy, interdependence, and organizational support) that influence TPV. With a sample of 296 multinational workers, a Latent Profile Analysis identified four distinct profiles of those work characteristics. Those profiles related differently to TPV. Contrary to previous findings, interdependence seems to play an important role in these teams high in structural virtuality when their autonomy is also high, highlighting the pivotal role of frequent interaction among team members, under conditions of high structural virtuality.


2017 ◽  
Vol 28 (3) ◽  
pp. 48-69 ◽  
Author(s):  
Keng Siau ◽  
Min Ling

Organizations increasingly depend on virtual teams in which geographically distributed individuals use sophisticated technology to interact and collaborate. With the advancement of mobile and wireless technology, mobile support for collaboration among virtual team members is becoming increasingly important and popular. In this research, we study the values of mobile support for virtual team members. Using the qualitative technique, Value-Focused Thinking approach, proposed by Keeney, we interviewed 30 subjects who were involved in information systems development teams and asked them the values of mobile support for virtual collaboration. This study uses Alter's Work Systems Theory as the conceptual foundation.


2012 ◽  
Vol 12 (2) ◽  
pp. 193-210 ◽  
Author(s):  
Audra I. Mockaitis ◽  
Elizabeth L. Rose ◽  
Peter Zettinig

This paper investigates the perceptions of members of 43 culturally diverse global virtual teams, with respect to team processes and outcomes. Despite widespread acknowledgement of the challenges presented by cultural differences in the context of global teams, little is known about the effect of these differences on team dynamics in the absence of face-to-face interaction. Using a student-based sample, we study the relationship between global virtual team members’ individualistic and collectivistic orientations and their evaluations of trust, interdependence, communication and information sharing, and conflict during the team task. Our results suggest that a collectivist orientation is associated with more favorable impressions regarding global virtual team processes and that cultural differences are not concealed by virtual means of communication.


2009 ◽  
Vol 1 (2) ◽  
pp. 45-60 ◽  
Author(s):  
Janusz Zawiła-Niedźwiecki ◽  
Maciej Byczkowski

Information Security Aspect of Operational Risk ManagementImproving organization means on the one hand searching for adequate product (service) matched to the market, on the other hand shaping the ability to react on risks caused by that activity. The second should consist of identifying and estimating types of risk, and consequently creating solutions securing from possible forms of it's realization (disturbances), following rules of rational choice of security measures as seen in their relation to costs and effectiveness. Activities of creating the security measures should be organized as constantly developing and perfecting and as such they need formal place in organizational structure and rules of management


Author(s):  
Loveleen Kaur ◽  
Sukhjeet Kaur ◽  
Preeti Sharma

Information is a source of power and is important for individual growth and survival. Information about health and hygiene is crucial because it influences an individual’s quality of life. As far as health and hygiene practices are concerned, women play an active role in getting information about these; hence there is a need to study their information needs regarding health and hygiene. After finding out the needs of women regarding these aspects, accordingly information can be made accessible to them. Keeping this into account, the present study was conducted in Ludhiana district of Punjab. Data was taken from 200 rural and urban women of 25-50 years, by the help of an interview schedule. Health and hygiene practices were studied under three categories as personal, food related and household health and hygiene practices. Information needs were studied on a three point continuum i.e. highly needed, somewhat needed and not needed. Results of the study showed that under personal health and hygiene practice, information on hair care and obesity was most needed. The most needed information regarding food related health and hygiene was on low cost nutritious recipes. The major information need reported by the respondents was related to control of insects and pests in case of household health and hygiene practices and majority of the respondents had low level of information need for all health and hygiene practices. Information needs of the women were positively related with their education and mass media exposure, whereas age was negatively correlated with the information needs of women. Consequently, there is a need to educate women regarding health and hygiene practices through effective communication methods, so that they can realize the importance and need for information on these topics.


Sign in / Sign up

Export Citation Format

Share Document