Week 10 discussions
Select any three of the following security threats described in the textbook (human error, damage by employees, misuse of computer systems, theft, computer-based fraud, viruses, hackers, and natural disasters) and recommend a control for each threat that can be put into place to mitigate the breach of organizational information. Be sure to provide specific examples to support your response. Rank the threats in order of risk and then justify your ranking.
Use the Internet to research new technologies that could impact the workforce, HR, human resource information systems, and world economics in the next decade. Next, predict what the workforce attitudes and preferences will look like in the next ten (10) years based on new technologies and how HR will deal with those preferences. Provide specific examples to support your response.