Support managers, involve stakeholders, address resistance, celebrate victories and define the objective
Give focus and support to individuals involved in the change
Know the needs of all stakeholders
Start at the top
Change has to be implemented correctly and follow a process so as not to stall or be met with resistance (Schantz, 2018)
Change is required
IT workers have to be more involved in making computers and networks safer for users
Anyone who uses the Internet is at risk of being hacked
Health care providers, IT workers, administrators, patients and all stakeholders have to be more aware of the cybersecurity risks attendant the use of multiple
medical devices (Shindell, 2018)
Medical devices can be hacked
(Anderson & Williams, 2018)Part I: Concept Map
Part II: Explaining the Concept Map
The Relationship of Parts
Cybersecurity, Organizational Change and Modernization Theory
As the concept map shows, cybersecurity, organizational change and Rostowâ€™s modernization theory are all interrelated and flow into and out of one another. In fact, each depends on the other to make sense. Cybersecurity explains the goal of organizational change and yet without the concept of cybersecurity there would be no reason for organizational change: the relationship between the two is thus symbiotic. Modernization theory likewise informs both because it supplies the rationale for both cybersecurity and organizational change, while both simultaneously inform modernization theory as they are what make it possible for the strategies to be discovered to make modernization possible in the first place.
Cybersecurity. Cybersecurity is further developed into parts based on what computers can do and why cybersecurity is needed. The concept map defines these parts as four:
1) people use the Internet with the aid of computers,
2) medical personnel use devices that communicate with one another (Anderson and Williams, 2018),
3) medical personnel and computer users (including IT workers) have to be aware of the threats to cybersecurity and be informed on ways to make users safer (Shindell, 2018), and
4) cybersecurity protects users against hacking.
These parts are defined so as to explain what cybersecurity is in relation to what is expected of computers and digital machines todayâ€”i.e., in other words, the more integrated our machines become, the more important it is that we become familiar with the concept of cybersecurity and what it can do (Ten, Manimaran & Liu, 2010).
Organizational change. The concept of organizational change is explained in the concept map as indicating that (a) change is required in organizations for a reason, and (b) that change has to implemented in certain manner so that it can be effectively conducted (Schantz, 2018).
Following from these points are the steps that are to be adhered to when conducting organizational change:
1) Change has to start at the topâ€”i.e., with the executives running the organization so that they are aware of whatâ€™s needed, why and how to support the change process
2) Change cannot take place without first knowing the needs and viewpoints of all stakeholdersâ€”otherwise they might throw up an obstacle to change in the form of resistance that change managers did foresee
3) Individuals within the change process have to be the focus, as they are the ones who will be implementing the changeâ€”therefore, it is critical that they receive the necessary support from those above them
4) Managers have to be supported from above as wellâ€”i.e., the executives at the topâ€”so that they can lead effectively
5) The change management plan should have procedures in place for dealing with the potential of resistance
6) Victories should be celebrated, no matter how small, so as to ensure that morale is boosted along the way
7) Stakeholders have to be involved in on-going discussions and dialogues so that that process is not hindered by surprise objections from stakeholders who do not like what is going on
8) The ultimate objective has to be defined for all so that everyone knows what the point and purpose of the change is
This last point in the process is crucial and helps to explain why education is so critical in any change management process. The understanding that is obtained in the cybersecurity section of the concept map has to translate into understanding under the organizational change part of the map. For this reason the two flow into and out of one another in a kind of communicative exchange.
Modernization theory. Modernization theory is the umbrella that explains and provides shelter to both cybersecurity as a development and to organizational change as a process. The theory of modernization put forward by Rostow explains that invention is the source of changeâ€”i.e., that as technology develops, changes in organizations occur because they have to adapt to the new tools being used in the environment. That is why organizations have to be flexible and adaptive to their environmentsâ€”no world is stagnant; new ideas are always percolating and impacting the world (Dooley, 1997).
Discovery, moreover, is what facilitates change: so the theory explains how cybersecurity develops and how it in turn impacts change in the organization and how both go on to reinforce the idea of modernization by the fact of diffusionâ€”i.e., the culture surrounding the invention is impacted by it and obliged to change to adapt to what it brings. The Internet obliged the world to adapt in numerous ways, and made communication and business easierâ€”but it also created new challenges and risks that had to be addressed via cybersecurity and organizational change. Thus, modernization theory explains the process involved in how invention leads to change, which leads to modernization.
In the context of cybersecurity, the invention is establishedâ€”digital communications among computers and the need for secure systems; the strategy has to be identified by IT and shared throughout the organization; and the strategy has to be duplicated and implemented throughout the network in order to be meaningful and effective.
The Parts Come Together
The parts come together as cybersecurity becomes the goal, organizational change becomes the method for achieving the goal, and modernization theory explains the rationale for the method. These parts achieve a whole through simultaneous interaction. There is no one part that can be taken from the others and explained by itself; on the contrary, all parts are needed together to understand the whole.
The concept map provides insight regarding the specialization area by showing how all ideas are interrelated and how they feed into one another. No single area can be viewed in isolation of the others, so it is crucial for a specialized area to be mindful of what factors and parts are impacting the area and are impacted by the area of specialization.
Connecting Theory and Practice
The theory of modernization is related to the concept of practice in that it explains the practice and how it comes about. The practice relies upon theory for a reasonable perspective as to why it is being conducted or implemented in the first place. Without the theory, there is no proper perspective to make sense of the interconnectedness of the parts, and without the parts of the practice there is no need for theory. So in this sense they interlock and work together to produce a meaningful whole.
Influence of a Visionary Leader
A visionary leader is suggested by all areas of the concept mapâ€”from the need to understand cybersecurity to the oversight of the organizational change process to the explanation of the modernization theory that holds it all together. A visionary leader is always required to supply followers with a sense of what the organization is trying to achieve, which, in this case, is the goal of cybersecurity. In an organization, a transformative leader is one who can supply that vision and the means or inspiration required to motivate the people to achieve it (Bass, 1999).
An organization must have a visionary leader who is able to realize when a change is required and what that change must be. The organization must also have the same kind of leader who is capable of overseeing that change process by following the steps listed in the organizational change area. Without such a leader, the theory cannot be implemented to explain how the working parts go together and the goal of cybersecurity cannot be defined or even identified as a need. A leader who is not visionary will simply be one who is willing to accept the status quo and not make any changes to address an obvious need.
Anderson, S., & Williams, T. (2018). Cybersecurity and medical devices: Are the
ISO/IEC 80001-2-2 technical controls up to the challenge?. Computer Standards & Interfaces, 56, 134-143.
Bass, B. M. (1999). Two decades of research and development in transformational
leadership. European journal of work and organizational psychology, 8(1), 9-32.
Dooley, K. J. (1997). A complex adaptive systems model of organization
change. Nonlinear Dynamics, Psychology, and Life Sciences, 1(1), 69-97.
Schantz, J. (2018). How can leaders manage change successfully? HR.com, 8-9.
Shindell, R. (2018). Wearable devices: The next wave of cybercrime. Journal of
Ten, C. W., Manimaran, G., & Liu, C. C. (2010). Cybersecurity for critical
infrastructures: Attack and defense modeling. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 40(4), 853-865.
Get Professional Assignment Help Cheaply
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Why Choose Our Academic Writing Service?
- Plagiarism free papers
- Timely delivery
- Any deadline
- Skilled, Experienced Native English Writers
- Subject-relevant academic writer
- Adherence to paper instructions
- Ability to tackle bulk assignments
- Reasonable prices
- 24/7 Customer Support
- Get superb grades consistently
Online Academic Help With Different Subjects
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
What discipline/subjects do you deal in?
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Are your writers competent enough to handle my paper?
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
What if I don’t like the paper?
There is a very low likelihood that you won’t like the paper.
- When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
- We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.
In the event that you don’t like your paper:
- The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
- We will have a different writer write the paper from scratch.
- Last resort, if the above does not work, we will refund your money.
Will the professor find out I didn’t write the paper myself?
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
What if the paper is plagiarized?
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
When will I get my paper?
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
Will anyone find out that I used your services?
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
How our Assignment Help Service Works
1. Place an order
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
2. Pay for the order
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
3. Track the progress
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
4. Download the paper
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!