The Role of Top Management in Developing Security and Safety Culture in the Organization (A Case of Enterprise Group)

Download Article

DOI: 10.21522/TIJAR.2014.08.02.Art008

Authors : Alexander D.K. Acquaye, Nestor Naabulee Nasage

Abstract:

The study investigated the role top management play in developing security and safety culture in the organization. Specifically, a case study exploration was used to evaluate one primary area of interest: 1. the role top management plays in developing organization’s security and safety culture. The strategy used for this work was exploratory, with both qualitative and quantitative approaches since the data collected would be converted into numerical value for better interpretation. The target population was the staff of Enterprise Group in the Greater Accra Region of Ghana, and the sample was composed of 30 management and staff members, using convenience sampling. Primary and secondary sources of data were used in this study. A survey questionnaire was used to acquire information from the target management and staff of Enterprise Group Ltd. The data gathered was analyzed quantitatively by using descriptive statistical tables and percentages where the Chi-Square test was considered. Statistical package for social sciences (SPSS) version 25 software was also used in the analysis. The study concluded that top management plays a role in developing security and safety culture in organizations through Security and Safety Supervision Committee, by building enabling security and safety working environment in organizations, ensuring there are policies and procedures guidelines in place in organizations. When there is Daily Reporting and available systems to address non-compliance issues in the organization to develop security and safety culture among employees. it is recommended that the Government and regulatory bodies of organizations should emphasize the establishment of security and safety policies in organizations.

References:

[1] Korletey, E. N., Asare, E. B., & Teye, J. K. (2019). The Role of the Labour Department in International Labour Migrant Management in Ghana. Journal of Economics, Management and Trade, 1-15.

[2] World Health Organization. (2010). World health statistics 2010. World Health Organization.

[3] Raelin, J. A. (2016). It’s not about the leaders: It’s about the practice of leadership. Organizational Dynamics, 45(2).

[4] Newell, B. R., & Shanks, D. R. (2014). Unconscious influences on decision making: A critical review. Behavioral and Brain Sciences, 37(1), 1–19.

[5] Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165.

[6] Colgan, P. A., Boal, T., & Czarwinski, R. (2013). Requirements relating to radon in the International Basic Safety Standards: information, measurement and national strategies. Journal of Radiological Protection, 33(1), 41.

[7] Sadgrove, K. (2016). The complete guide to business risk management. Routledge.

[8] Pinsonneault, A., & Kraemer, K. (1993). Survey research methodology in management information systems: an assessment. Journal of Management Information Systems, 10(2), 75–105.

[9] Armstrong, M. (2006). A handbook of human resource management practice. Kogan Page Publishers.

[10] Christopher, L., Choo, K.-K., & Dehghantanha, A. (2017). Honeypots for employee information security awareness and education training: a conceptual EASY training model. In Contemporary Digital Forensic Investigations of Cloud and Mobile Applications (pp. 111–129). Elsevier.

[11] Shaw, R. S., Chen, C. C., Harris, A. L., & Huang, H.-J. (2009). The impact of information richness on information security awareness training effectiveness. Computers & Education, 52(1), 92–100.

[12] Singer, P. W., & Friedman, A. (2014). Cybersecurity: What everyone needs to know. OUP USA.

[13] Blanchard, P. N. (2006). Effective Training, Systems, Strategies, and Practices, 4/e. Pearson Education India.

[14] Camp, L. J. (2009). Mental models of privacy and security. IEEE Technology and Society Magazine, 28(3), 37–46.

[15] Puhakainen, P., & Siponen, M. (2010). Improving employees’ compliance through information systems security training: an action research study. MIS Quarterly, 757–778.

[16] Kohn, A. (1999). Punished by Rewards: The Trouble with Gold Stars, Incentive Plans, A’s, Praise, and Other Bribes. Houghton Mifflin Harcourt.

[17] Coopey, J. (1995). The learning organization, power, politics and ideology introduction. Management Learning, 26(2), 193–213.

[18] Glendon, A. I., & Stanton, N. A. (2000). Perspectives on safety culture. Safety Science, 34(1–3), 193–214.

[19] Brown, W., & Nasuti, F. (2005). Sarbanes-Oxley and enterprise security: IT governance-what it takes to get the job done. Information Systems Security, 14(5), 15–28.

[20] Sennewald, C. A., & Baillie, C. (2015). Effective security management. Butterworth-Heinemann.

[21] Furnell, S., & Clarke, N. (2005). Organizational security culture: Embedding security awareness, education, and training. Proceedings of the IFIP TC11 WG, 11, 67–74.

[22] Martins, E. C., & Terblanche, F. (2003). Building organizational culture that stimulates creativity and innovation. European Journal of Innovation Management, 6(1), 64–74.

[23] Downs, C. W., & Adrian, A. D. (2012). Assessing organizational communication: Strategic communication audits. Guilford Press.

[24] Bedford, T., Cooke, R., & others. (2001). Probabilistic risk analysis: foundations and methods. Cambridge University Press.

[25] Annan, K. A. (2005). In larger freedom: towards development, security and human rights for all: report of the Secretary-General. United Nations Publications.

[26] Hofstede, G., Neuijen, B., Ohayv, D. D., & Sanders, G. (1990). Measuring organizational cultures: A qualitative and quantitative study across twenty cases. Administrative Science Quarterly, 286–316.