SlideShare una empresa de Scribd logo
1 de 27
Dr Shah Miah
HRIS Issues
Today, we will be talking about issues of
HRIS: integration; data integrity, security
and privacy (CHAPTER 16)
 Mainly experienced in HRIS design and
implementation phases
 HR Payroll Integration
 Example: fully integrated app
http://www.empower-hr.com/
Integration Issues
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
Confidential information
 A great deal of confidential information about
employees is captured and stored by organizations
 Employee personal details
 Pay and benefits history
 Medical records
 Disciplinary records
 Data is stored electronically and transmitted across
networks.
 Increasing integration of HRIS has made information
security management a complex and challenging
undertaking
4
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
Information Security in HRIS
 Protecting information in the HRIS from
unauthorized
 Access, use, disclosure, disruption, modification, and
destruction
 Objectives of information security
 Protect confidentiality, integrity and availability of
information (Pfleeger, 2006; Wong, 2006b).
5
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
COMPONENTS OF
INFORMATION SECURITY
 Three main principles of information security
 Confidentiality
 Integrity
 Availability
 The HRIS is composed of three components
 Hardware
 Software
 Communications
 As mechanisms of protection
 Physical
 Personal
 Organizational levels
6
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
SOURCE: Wikipedia (2007)
COMPONENTS OF INFORMATION SECURITY
Figure 16.1
7
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
LEGAL REQUIREMENTS FOR INFORMATION
TECHNOLOGY
 The European Union Data Protection Directive (EUDPD)
 Requires that all EU members must adopt national regulations to
standardize the protection of data privacy for citizens throughout
the European Union.
 Singapore
 http://www.aar.com.au/pubs/asia/foasia24oct11.htm#Intro
8
 OECD/APEC
https://www.privacyenforcement.net/public/activities
Transborder data transfer
 Multinational employer
 New idea – centralised database for HR related data
 Business case template check-box:
 “Meets HR Data Privacy Requirements”
 Could not be marked because of lack of relevant
documentation
 Project denied
 Data transfer privacy requirements
 Risk associated with non-compliance
 (Gracen 2008, p.38)
HR Data Privacy and Project Metrics
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
THREATS TO INFORMATION SECURITY
 Human errors in data entry & handling
 Damage by employee
 Disgruntled & ill-informed employees: critical role of HR
 Misuse of computer systems:
 Unauthorized access to or use of information
 Computer-based fraud
 Viruses, worms & trojans: cyber terrorism
 Hackers
 Natural disasters
11
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
BEST PRACTICES IN HR INFORMATION SECURITY
 Adopt A comprehensive privacy policy
 Store sensitive personal data in secure computer systems
and provide encryption
 Dispose of documents properly or restore computer drives
and cd-roms
 Build document destruction capabilities into the office
infrastructure
 Conduct regular security practice training
 Conduct privacy “walk-throughs”
(Canavan, 2003; David, 2002; Tansley & Watson, 2000)
12
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
ADDITIONAL BEST PRACTICES IN HR
INFORMATION SECURITY
 The careful selection of staff with regard to their honesty and
integrity
 Raise information security awareness and ensure employees
understand corporate security policies
 Institute measures to address the personal problems of staff,
such as gambling and drug addictions, which might lead them
indulge in abuse for financial gains
 Provide access to effective grievance procedures since the
motivation for much computer abuse is retaliation against
management
Kovach, Hughes, Fagan, and Maggitti (2002)
Grundy, Collier, and Spaul (1994)
13
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
INFORMATION SECURITY
MANAGEMENT FOR HRIS
 ISO/IEC 27002
 Administrative/Procedural
 Logical/Technical
 Physical Controls
14
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
INFORMATION PRIVACY
 Comprises ethical, moral, and legal dimensions and has
assumed greater importance with the increased adoption of
the internet and Web 2.0.
 Privacy is A human value consisting of four elements (Kovach
& Tansey, 2000):
 Solitude: the right to be alone without disturbances
 Anonymity: the rights to have no public personal identity
 Intimacy: the right not to be monitored
 Reserve: the right to control one’s personal information including the
methods of dissemination of that information.
15
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
CONTROLLING ACCESS TO HR DATA
 Administrative controls
 Logical (technical) controls
 Physical controls
 Security classification for information
 Access control
 Cryptography
 Defense in depth
16
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
INFORMATION PRIVACY AND HRIS
 Concerns
 Types of employee information that can be collected and stored in
the system
 Who can access and update the information (Noe et al., 1994; Sadri &
Chatterjee, 2003)
 Considerations
 Collect and store information based on sound and valid business
reasons (Hubbard Et Al., 1998)
 Collect only information which is necessary, lawful, current, and
accurate (Camardella, 2003)
17
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
HRIS SECURITY BEST PRACTICES
1. Train users on how to securely use and handle the
equipment, data, and software.
2. Train employees to “log off” personal computers after they
are through using them.
3. Do not allow passwords to be shared. Change passwords
frequently.
4. Run software through a virus-detection program before
using it on the system.
5. Ensure that backup copies, data files, software, and
printouts are used only by authorized users.
(Noe et al., 1994; Pfleeger, 2006)
18
Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human
Resource Information Systems: Basics, Applications, and Future
Directions, 2e © 2012 SAGE Publications, Inc.
HRIS SECURITY BEST PRACTICES
1. Make backup copies of data files and programs.
2. Ensure that all software and mainframe applications
include an audit trail (a record of the changes and
transactions that occur in a system, including when and
who performed the changes).
3. Use edit controls (such as passwords) to limit employees'
access to data files and data fields.
4. Employees take responsibility for updating their
employee records themselves via the self-service system.
(Noe et al., 1994; Pfleeger, 2006)
19
 Effectiveness and efficiency depends on integrity and
accuracy of data
DATA INTEGRITY
 HR data management issues
 Siloed systems
 Inaccurate or outdated information
 Inefficient means of data sharing and transmission
 Resulting in
 Delays in decision making
 Missed opportunities
 Preventing movement to strategic role
 Costs millions of dollars each year
HR Data Availability, Quality and
Integrity (Sopoci & Keebler 2005)
 Government reporting requirements
 Basic organisational efficiency
 Credibility of HR function
 Costs
Business critical issues (Sopoci & Keebler 2005)
 Automation
 Fragmented systems
 Mix of manual and automated systems and processes
 Manual override
 Bad data
 Outdated data
Why data becomes bad (Sopoci & Keebler 2005)
 Best opportunity to fix data
 Identify information needed
 Don’t assume paper based data is accurate – check
 Data audits
Conversions (Sopoci & Keebler 2005)
 Develop an overall HR technology strategy
 Master system into which all HR data is entered and
resides (e.g. SAP HCM)
Keeping it clean (Sopoci & Keebler 2005)
 Data integrity results in efficiency, effectiveness and
strategic opportunities.
 Protecting the privacy concerns of individuals requires
a combination of law, processes, procedures and
technology.
 Organisations must ensure:
 Collection, maintenance, use and dissemination of personal
information is necessary, lawful, current, and accurate
 Maintenance of high ethical standards
(Wong & Thite 2009, p.404)
Conclusion
 Over the past 3 years, Monster.com has had breaches in
security.
 In your discussion groups search for information about this
security breach
 Prepare a short presentation on this and include some
analysis of the data integrity implications.
Web based exercise

Más contenido relacionado

La actualidad más candente

Aligning human resources with strategy
Aligning human resources with strategy Aligning human resources with strategy
Aligning human resources with strategy Tanjin Tamanna urmi
 
Strategic Human Resource Management (SHRM) - MBA 423 Human Resources Manageme...
Strategic Human Resource Management (SHRM) - MBA 423 Human Resources Manageme...Strategic Human Resource Management (SHRM) - MBA 423 Human Resources Manageme...
Strategic Human Resource Management (SHRM) - MBA 423 Human Resources Manageme...Stuart Gow
 
Chap 18 employee relations strategy
Chap 18 employee relations strategyChap 18 employee relations strategy
Chap 18 employee relations strategyZahidul Islam
 
Employee retention
Employee retentionEmployee retention
Employee retentionbhawnajha091
 
Investment perspective of human resource management
Investment perspective of human resource managementInvestment perspective of human resource management
Investment perspective of human resource managementSeredup Maya
 
Human Resource Management HRM
Human Resource Management  HRMHuman Resource Management  HRM
Human Resource Management HRMAlam Nuzhathalam
 
HR Strategy: What is it? Why do we need it?
HR Strategy: What is it? Why do we need it?HR Strategy: What is it? Why do we need it?
HR Strategy: What is it? Why do we need it?CreativeHRM
 
Strategic Human Resource Management
Strategic Human Resource ManagementStrategic Human Resource Management
Strategic Human Resource ManagementMariaVyalkova
 
High performance work system (hpws)
High performance work system (hpws)High performance work system (hpws)
High performance work system (hpws)Manvi Thanai
 

La actualidad más candente (20)

Human Capital Management
Human Capital Management Human Capital Management
Human Capital Management
 
Aligning human resources with strategy
Aligning human resources with strategy Aligning human resources with strategy
Aligning human resources with strategy
 
Strategic Human Resource Management (SHRM) - MBA 423 Human Resources Manageme...
Strategic Human Resource Management (SHRM) - MBA 423 Human Resources Manageme...Strategic Human Resource Management (SHRM) - MBA 423 Human Resources Manageme...
Strategic Human Resource Management (SHRM) - MBA 423 Human Resources Manageme...
 
Chap 18 employee relations strategy
Chap 18 employee relations strategyChap 18 employee relations strategy
Chap 18 employee relations strategy
 
HR Audit.
HR Audit. HR Audit.
HR Audit.
 
Employee engagement
Employee engagementEmployee engagement
Employee engagement
 
Employee retention
Employee retentionEmployee retention
Employee retention
 
SOFT AND HARD HRM PRESENTATION
SOFT AND HARD HRM PRESENTATIONSOFT AND HARD HRM PRESENTATION
SOFT AND HARD HRM PRESENTATION
 
Investment perspective of human resource management
Investment perspective of human resource managementInvestment perspective of human resource management
Investment perspective of human resource management
 
Human Resource Management HRM
Human Resource Management  HRMHuman Resource Management  HRM
Human Resource Management HRM
 
HR Strategy: What is it? Why do we need it?
HR Strategy: What is it? Why do we need it?HR Strategy: What is it? Why do we need it?
HR Strategy: What is it? Why do we need it?
 
HR Analytics
HR AnalyticsHR Analytics
HR Analytics
 
HRM Metrics and Analytics
HRM Metrics and Analytics HRM Metrics and Analytics
HRM Metrics and Analytics
 
Functions of hrd
Functions of hrdFunctions of hrd
Functions of hrd
 
Ch 1 shrm
Ch 1 shrmCh 1 shrm
Ch 1 shrm
 
Human Resource Practices
Human Resource PracticesHuman Resource Practices
Human Resource Practices
 
Performance Management
Performance ManagementPerformance Management
Performance Management
 
Strategic Human Resource Management
Strategic Human Resource ManagementStrategic Human Resource Management
Strategic Human Resource Management
 
High performance work system (hpws)
High performance work system (hpws)High performance work system (hpws)
High performance work system (hpws)
 
Hrd audit
Hrd auditHrd audit
Hrd audit
 

Similar a HRIS Issues

HR Needs Analysis and Cost Estimation
HR Needs Analysis and Cost EstimationHR Needs Analysis and Cost Estimation
HR Needs Analysis and Cost EstimationThu Nandi Nwe
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...The University of Texas (UTRGV)
 
Hello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred inHello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred inSusanaFurman449
 
Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptxdamilolasunmola
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...mkeane
 
HRIS Implementation and Change Management
HRIS Implementation and Change ManagementHRIS Implementation and Change Management
HRIS Implementation and Change ManagementThu Nandi Nwe
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxcowinhelen
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsIRJET Journal
 
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...ijseajournal
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachIRJET Journal
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?John D. Johnson
 
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET Journal
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfSoumodeep Nanee Kundu
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxjeanettehully
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSInteraktiv
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 

Similar a HRIS Issues (20)

HR Needs Analysis and Cost Estimation
HR Needs Analysis and Cost EstimationHR Needs Analysis and Cost Estimation
HR Needs Analysis and Cost Estimation
 
Computerized human resource information system
Computerized human resource information systemComputerized human resource information system
Computerized human resource information system
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
Hello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred inHello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred in
 
Implementing Best Practices.pptx
Implementing Best Practices.pptxImplementing Best Practices.pptx
Implementing Best Practices.pptx
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
HRIS Implementation and Change Management
HRIS Implementation and Change ManagementHRIS Implementation and Change Management
HRIS Implementation and Change Management
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
 
Major Point Summary - HR-ICT Governmental Unit
Major Point Summary - HR-ICT Governmental UnitMajor Point Summary - HR-ICT Governmental Unit
Major Point Summary - HR-ICT Governmental Unit
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
FEDERATED LEARNING FOR PRIVACY-PRESERVING: A REVIEW OF PII DATA ANALYSIS IN F...
 
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining ApproachPrivacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
Privacy Preserving Data Mining Using Inverse Frequent ItemSet Mining Approach
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
 
IRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in IndustriesIRJET- Big Data Privacy and Security Challenges in Industries
IRJET- Big Data Privacy and Security Challenges in Industries
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
 
Privacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMSPrivacy experience in Plone and other open source CMS
Privacy experience in Plone and other open source CMS
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 

Más de Thu Nandi Nwe

Prof. Dr. Aung Tun Thet: The Art and Science of Management
Prof. Dr. Aung Tun Thet: The Art and Science of ManagementProf. Dr. Aung Tun Thet: The Art and Science of Management
Prof. Dr. Aung Tun Thet: The Art and Science of ManagementThu Nandi Nwe
 
Organizational Development by Prof. Dr. Aung Tun Thet
Organizational Development by Prof. Dr. Aung Tun ThetOrganizational Development by Prof. Dr. Aung Tun Thet
Organizational Development by Prof. Dr. Aung Tun ThetThu Nandi Nwe
 
Beyond values – exploring the twenty first century organization
Beyond values – exploring the twenty first century organizationBeyond values – exploring the twenty first century organization
Beyond values – exploring the twenty first century organizationThu Nandi Nwe
 
Cultural imagery and the study of Change in Public Organizations
Cultural imagery and the study of Change in Public OrganizationsCultural imagery and the study of Change in Public Organizations
Cultural imagery and the study of Change in Public OrganizationsThu Nandi Nwe
 
An holistic approach to Organisational Change Management
An holistic approach to Organisational Change ManagementAn holistic approach to Organisational Change Management
An holistic approach to Organisational Change ManagementThu Nandi Nwe
 
Achieving Organisational Change through Values Alignment
Achieving Organisational Change through Values AlignmentAchieving Organisational Change through Values Alignment
Achieving Organisational Change through Values AlignmentThu Nandi Nwe
 
HRIS Apps and Reporting Methods
HRIS Apps and Reporting MethodsHRIS Apps and Reporting Methods
HRIS Apps and Reporting MethodsThu Nandi Nwe
 
Human Resource Information Systems (Victoria University Australia)
Human Resource Information Systems (Victoria University Australia)Human Resource Information Systems (Victoria University Australia)
Human Resource Information Systems (Victoria University Australia)Thu Nandi Nwe
 
War for talent by Prof. Dr.Aung Tun Thet
War for talent by Prof. Dr.Aung Tun ThetWar for talent by Prof. Dr.Aung Tun Thet
War for talent by Prof. Dr.Aung Tun ThetThu Nandi Nwe
 

Más de Thu Nandi Nwe (9)

Prof. Dr. Aung Tun Thet: The Art and Science of Management
Prof. Dr. Aung Tun Thet: The Art and Science of ManagementProf. Dr. Aung Tun Thet: The Art and Science of Management
Prof. Dr. Aung Tun Thet: The Art and Science of Management
 
Organizational Development by Prof. Dr. Aung Tun Thet
Organizational Development by Prof. Dr. Aung Tun ThetOrganizational Development by Prof. Dr. Aung Tun Thet
Organizational Development by Prof. Dr. Aung Tun Thet
 
Beyond values – exploring the twenty first century organization
Beyond values – exploring the twenty first century organizationBeyond values – exploring the twenty first century organization
Beyond values – exploring the twenty first century organization
 
Cultural imagery and the study of Change in Public Organizations
Cultural imagery and the study of Change in Public OrganizationsCultural imagery and the study of Change in Public Organizations
Cultural imagery and the study of Change in Public Organizations
 
An holistic approach to Organisational Change Management
An holistic approach to Organisational Change ManagementAn holistic approach to Organisational Change Management
An holistic approach to Organisational Change Management
 
Achieving Organisational Change through Values Alignment
Achieving Organisational Change through Values AlignmentAchieving Organisational Change through Values Alignment
Achieving Organisational Change through Values Alignment
 
HRIS Apps and Reporting Methods
HRIS Apps and Reporting MethodsHRIS Apps and Reporting Methods
HRIS Apps and Reporting Methods
 
Human Resource Information Systems (Victoria University Australia)
Human Resource Information Systems (Victoria University Australia)Human Resource Information Systems (Victoria University Australia)
Human Resource Information Systems (Victoria University Australia)
 
War for talent by Prof. Dr.Aung Tun Thet
War for talent by Prof. Dr.Aung Tun ThetWar for talent by Prof. Dr.Aung Tun Thet
War for talent by Prof. Dr.Aung Tun Thet
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

HRIS Issues

  • 2. Today, we will be talking about issues of HRIS: integration; data integrity, security and privacy (CHAPTER 16)
  • 3.  Mainly experienced in HRIS design and implementation phases  HR Payroll Integration  Example: fully integrated app http://www.empower-hr.com/ Integration Issues
  • 4. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. Confidential information  A great deal of confidential information about employees is captured and stored by organizations  Employee personal details  Pay and benefits history  Medical records  Disciplinary records  Data is stored electronically and transmitted across networks.  Increasing integration of HRIS has made information security management a complex and challenging undertaking 4
  • 5. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. Information Security in HRIS  Protecting information in the HRIS from unauthorized  Access, use, disclosure, disruption, modification, and destruction  Objectives of information security  Protect confidentiality, integrity and availability of information (Pfleeger, 2006; Wong, 2006b). 5
  • 6. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. COMPONENTS OF INFORMATION SECURITY  Three main principles of information security  Confidentiality  Integrity  Availability  The HRIS is composed of three components  Hardware  Software  Communications  As mechanisms of protection  Physical  Personal  Organizational levels 6
  • 7. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. SOURCE: Wikipedia (2007) COMPONENTS OF INFORMATION SECURITY Figure 16.1 7
  • 8. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. LEGAL REQUIREMENTS FOR INFORMATION TECHNOLOGY  The European Union Data Protection Directive (EUDPD)  Requires that all EU members must adopt national regulations to standardize the protection of data privacy for citizens throughout the European Union.  Singapore  http://www.aar.com.au/pubs/asia/foasia24oct11.htm#Intro 8
  • 10.  Multinational employer  New idea – centralised database for HR related data  Business case template check-box:  “Meets HR Data Privacy Requirements”  Could not be marked because of lack of relevant documentation  Project denied  Data transfer privacy requirements  Risk associated with non-compliance  (Gracen 2008, p.38) HR Data Privacy and Project Metrics
  • 11. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. THREATS TO INFORMATION SECURITY  Human errors in data entry & handling  Damage by employee  Disgruntled & ill-informed employees: critical role of HR  Misuse of computer systems:  Unauthorized access to or use of information  Computer-based fraud  Viruses, worms & trojans: cyber terrorism  Hackers  Natural disasters 11
  • 12. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. BEST PRACTICES IN HR INFORMATION SECURITY  Adopt A comprehensive privacy policy  Store sensitive personal data in secure computer systems and provide encryption  Dispose of documents properly or restore computer drives and cd-roms  Build document destruction capabilities into the office infrastructure  Conduct regular security practice training  Conduct privacy “walk-throughs” (Canavan, 2003; David, 2002; Tansley & Watson, 2000) 12
  • 13. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. ADDITIONAL BEST PRACTICES IN HR INFORMATION SECURITY  The careful selection of staff with regard to their honesty and integrity  Raise information security awareness and ensure employees understand corporate security policies  Institute measures to address the personal problems of staff, such as gambling and drug addictions, which might lead them indulge in abuse for financial gains  Provide access to effective grievance procedures since the motivation for much computer abuse is retaliation against management Kovach, Hughes, Fagan, and Maggitti (2002) Grundy, Collier, and Spaul (1994) 13
  • 14. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. INFORMATION SECURITY MANAGEMENT FOR HRIS  ISO/IEC 27002  Administrative/Procedural  Logical/Technical  Physical Controls 14
  • 15. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. INFORMATION PRIVACY  Comprises ethical, moral, and legal dimensions and has assumed greater importance with the increased adoption of the internet and Web 2.0.  Privacy is A human value consisting of four elements (Kovach & Tansey, 2000):  Solitude: the right to be alone without disturbances  Anonymity: the rights to have no public personal identity  Intimacy: the right not to be monitored  Reserve: the right to control one’s personal information including the methods of dissemination of that information. 15
  • 16. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. CONTROLLING ACCESS TO HR DATA  Administrative controls  Logical (technical) controls  Physical controls  Security classification for information  Access control  Cryptography  Defense in depth 16
  • 17. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. INFORMATION PRIVACY AND HRIS  Concerns  Types of employee information that can be collected and stored in the system  Who can access and update the information (Noe et al., 1994; Sadri & Chatterjee, 2003)  Considerations  Collect and store information based on sound and valid business reasons (Hubbard Et Al., 1998)  Collect only information which is necessary, lawful, current, and accurate (Camardella, 2003) 17
  • 18. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. HRIS SECURITY BEST PRACTICES 1. Train users on how to securely use and handle the equipment, data, and software. 2. Train employees to “log off” personal computers after they are through using them. 3. Do not allow passwords to be shared. Change passwords frequently. 4. Run software through a virus-detection program before using it on the system. 5. Ensure that backup copies, data files, software, and printouts are used only by authorized users. (Noe et al., 1994; Pfleeger, 2006) 18
  • 19. Michael J. Kavanagh, Mohan Thite, and Richard D. Johnson - Human Resource Information Systems: Basics, Applications, and Future Directions, 2e © 2012 SAGE Publications, Inc. HRIS SECURITY BEST PRACTICES 1. Make backup copies of data files and programs. 2. Ensure that all software and mainframe applications include an audit trail (a record of the changes and transactions that occur in a system, including when and who performed the changes). 3. Use edit controls (such as passwords) to limit employees' access to data files and data fields. 4. Employees take responsibility for updating their employee records themselves via the self-service system. (Noe et al., 1994; Pfleeger, 2006) 19
  • 20.  Effectiveness and efficiency depends on integrity and accuracy of data DATA INTEGRITY
  • 21.  HR data management issues  Siloed systems  Inaccurate or outdated information  Inefficient means of data sharing and transmission  Resulting in  Delays in decision making  Missed opportunities  Preventing movement to strategic role  Costs millions of dollars each year HR Data Availability, Quality and Integrity (Sopoci & Keebler 2005)
  • 22.  Government reporting requirements  Basic organisational efficiency  Credibility of HR function  Costs Business critical issues (Sopoci & Keebler 2005)
  • 23.  Automation  Fragmented systems  Mix of manual and automated systems and processes  Manual override  Bad data  Outdated data Why data becomes bad (Sopoci & Keebler 2005)
  • 24.  Best opportunity to fix data  Identify information needed  Don’t assume paper based data is accurate – check  Data audits Conversions (Sopoci & Keebler 2005)
  • 25.  Develop an overall HR technology strategy  Master system into which all HR data is entered and resides (e.g. SAP HCM) Keeping it clean (Sopoci & Keebler 2005)
  • 26.  Data integrity results in efficiency, effectiveness and strategic opportunities.  Protecting the privacy concerns of individuals requires a combination of law, processes, procedures and technology.  Organisations must ensure:  Collection, maintenance, use and dissemination of personal information is necessary, lawful, current, and accurate  Maintenance of high ethical standards (Wong & Thite 2009, p.404) Conclusion
  • 27.  Over the past 3 years, Monster.com has had breaches in security.  In your discussion groups search for information about this security breach  Prepare a short presentation on this and include some analysis of the data integrity implications. Web based exercise