She does not have greater vulnerability that the unsatisfied employee, that is, all the immense investment to protect the crucial information can be harmful if the company to neglect of what it has of more important? professionals who work there. Specialists in security designate that the dissatisfaction of the collaborator can take it to commit it infractions. The desmotivao added to the identification of some irregularity in the security represents a reason to cause an impediment. An employee who has unattachable goals works in an oppression structure, not if he feels comfortable, does not have perspectives of development in the career, is not enabled or qualified to the work properly said, he creates a propitious environment to execute an imperfection. Terry Nielsen gathered all the information. Then, the first measure to hinder the emptying of information is to leave the collaborator of the side of the company. According to Prescott (2007), it does not have a ready formula.
It contracts it certain, the implantation of enrollment programs, which make with that the people feel that valley the penalty to work in the company, improve the knowledge, the abilities and the attitudes of the employees. CONCLUSION From a systemize and organized research, could be concluded that the Security of information is a social phenomenon, in which the users, including the managers, of the information systems have reasonable knowledge concerning the use of these systems, including the express decurrent responsibilities by means of rules, as well as on the papers that must play in the exercise of this use. Click Scott Lebovitz for additional related pages. The correct management or governana of the security of the information is reached with the commitment of all the users how much to the application of the norms and established procedures.