Information security and privacy in e-HRM

View/ Open
Author(s)
Subramaniyan, Shankar
Thite, Mohan
Sampathkumar, S
Griffith University Author(s)
Year published
2019
Metadata
Show full item recordAbstract
Fast changing technologies and increased sophistication in cyberattacks have heightened the information security and privacy risks for all contemporary organizations. Research shows that security breaches are mainly internal and caused by ignorant and disgruntled employees. As human resource manages employees from recruitment to separation and handles most sensitive personal data of employees in the organization, it plays a critical role in protecting information security and privacy. This chapter provides an overview of the basics of information security and privacy concepts and frameworks. It highlights the major roles ...
View more >Fast changing technologies and increased sophistication in cyberattacks have heightened the information security and privacy risks for all contemporary organizations. Research shows that security breaches are mainly internal and caused by ignorant and disgruntled employees. As human resource manages employees from recruitment to separation and handles most sensitive personal data of employees in the organization, it plays a critical role in protecting information security and privacy. This chapter provides an overview of the basics of information security and privacy concepts and frameworks. It highlights the major roles human resource functionaries can play in designing, applying, and monitoring appropriate controls throughout the employment cycle, that is, before, during, and after employment to protect information security and privacy.
View less >
View more >Fast changing technologies and increased sophistication in cyberattacks have heightened the information security and privacy risks for all contemporary organizations. Research shows that security breaches are mainly internal and caused by ignorant and disgruntled employees. As human resource manages employees from recruitment to separation and handles most sensitive personal data of employees in the organization, it plays a critical role in protecting information security and privacy. This chapter provides an overview of the basics of information security and privacy concepts and frameworks. It highlights the major roles human resource functionaries can play in designing, applying, and monitoring appropriate controls throughout the employment cycle, that is, before, during, and after employment to protect information security and privacy.
View less >
Book Title
e-HRM: Digital Approaches, Directions & Applications
Copyright Statement
© 2019 Taylor & Francis. This is an Accepted Manuscript of a book chapter published by Routledge in e-HRM: Digital Approaches, Directions & Applications on 6 August 2018, available online: https://doi.org/10.4324/9781315172729
Subject
Human Resources Management