The chosen role is the IT manager of a government company to maximize the management of the company’s information processes and monitor compliance with information security rules and regulations. Working in the public sector is aimed at improving the lives of citizens and is paramount. The main problem prioritized is the improper use of the company’s IT resources and the threat to the organization’s data confidentiality. Fighting this problem helps to improve my managerial skills and the productivity of my subordinates. The methods of solving the problem were chosen: constant monitoring of the use of resources by the employees, additional training, and creating conditions for correct personal computer usage.
One of the methods of influence on the personnel was defined as a personal organizational quiz. Based on its result, it improves the ability to adequately assess employees’ progress in the implementation of the task. Six Sigma was chosen as the central organizational system and continuous interaction improvement to support the control of all operations. By destroying process deficiencies and setting a goal, Six Sigma helps to achieve the organization’s existence goal.
A division of misconduct into insider and outsider was made. Given the rarity of the outsider, the focus was on the insider. This kind of mise-en-scène is divided into intentional and non-intentional. Although insider tampering is the most dangerous, unspecified misuse is still the most common issue. Some workers don’t follow the rules for using the Internet and even take freelance tasks to their offices.
The choice of approaches and techniques to combat intruders depends on the enterprise’s organizational structure. Potential solutions are defined as constant analytics streaming to determine employee activity and avoid potential threats. The IT manager in a government organization has many tasks and responsibilities related to data security. His attitude and behavior affect the decision-making effectiveness in a given situation. Equally important is the perspective of an ordinary company employee – it provides criteria for assessing the cause of the problem and can suggest a way to solve it. The ability to make timely and correct information security decisions depends on the IT manager. Sometimes the lack of diversity, equity, and inclusion can affect the occurrence of information security problems. To summarize, there are many ways for an organization to show that it cares about its employees, leading to a more responsible attitude towards the rules and regulations in the work and communication process.