100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
Summary IT 335 Module 4 Short Paper.docx Running head: SHORT PAPER “ CONSIDERATION OF POLICY IMPLEMENTATION IT 335: Short Paper “ Consideration of Policy Implementation Southern New Hampshire University Kotters Eight-Step Change Model will be used to imple$7.49
Add to cart
Summary IT 335 Module 4 Short Paper.docx Running head: SHORT PAPER “ CONSIDERATION OF POLICY IMPLEMENTATION IT 335: Short Paper “ Consideration of Policy Implementation Southern New Hampshire University Kotters Eight-Step Change Model will be used to imple
11 views 0 purchase
Course
Snhu
Institution
Southern New Hampshire University
IT 335 Module 4 Short P Running head: SHORT PAPER “ CONSIDERATION OF POLICY IMPLEMENTATION IT 335: Short Paper “ Consideration of Policy Implementation Southern New Hampshire University Kotters Eight-Step Change Model will be used to implement the policy changes at Wilburs Widgets. This ...
it 335 module 4 short paperdocx running head short paper “ consideration of policy implementation it 335 short paper “ consideration of policy implementation southern new hampshire university
Written for
Southern New Hampshire University
Snhu
All documents for this subject (348)
Seller
Follow
helperatsof1
Reviews received
Content preview
Running head: SHORT PAPER – CONSIDERATION OF POLICY IMPLEMENTATION
IT 335:
Short Paper – Consideration of Policy Implementation
Southern New Hampshire University
Kotter’s Eight-Step Change Model will be used to implement the policy changes at
Wilbur’s Widgets. This model focuses on implementing changes from the top down. Gaining
buy in from the CEO and Board of Directors will be important to the successful
implementation of the new policies.
Step 1: Create Urgency
It is essential for the information security team to be able to effectively communicate
the risk that the policy is intended to address to the CEO and Board of Directors. Getting their
buy in from the beginning will help in the development of the policies and to change the
overall culture of the organization regarding information security.
Step 2: Create a Powerful Coalition
In this step, key stake holders throughout the organization are polled on the policy
change. The policy will be explained, and concerns will be listened to. By soliciting
feedback from throughout the organization, the policies will be developed in a way that
makes sense for the organization. This will also help with getting the employees to buy in to
the new policies. Step 3: Create a Vision for Change
The information security team will, “After compiling everyone’s input, create a
coherent security message and policy.” (Johnson, 2014). This message should explain the
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller helperatsof1. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.49. You're not tied to anything after your purchase.