Home / Office technology / Leakages of confidential information in business organization: causes and effects

Leakages of confidential information in business organization: causes and effects

 

Table Of Contents


<p> </p><p>Title Page &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; i</p><p>Approval Page &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; ii</p><p>Certification Page &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; iii</p><p>Dedication &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; iv</p><p>Acknowledgement &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; v</p><p>Abstract &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; vi</p><p>Table of Contents &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; vii</p><p>

Chapter ONE

: INTRODUCTION</p><p>Background of the Study &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 1</p><p>Statement of the Problem &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 3</p><p>Objectives of the Study</p><p>Purpose of the Study &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;4</p><p>Research Questions &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 5</p><p>Significance of the Study &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 5</p><p>Scope of study &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 7</p><p>

Chapter TWO

: REVIEW OF RELATED LITERATURE</p><p>The concept of official secret &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 9</p><p>The source of official secret in business organizations &nbsp; 11</p><p>How confidential information can be protected</p><p>and controlled &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;13</p><p>Workers that are responsible for leakage of</p><p>confidential information &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 16</p><p>Consequences of information leakages &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 21</p><p>Summary of literature reviewed &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 23</p><p>

Chapter THREE

: RESEARCH METHODOLOGY</p><p>Design of Study &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 24</p><p>Area of Study &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;24</p><p>Population of Study &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 25</p><p>Sample and sampling &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 25</p><p>Instrument used for Data Collection &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 25</p><p>Method of Data Collection &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 25</p><p>Method of Data Analysis &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 26</p><p>

Chapter FOUR

: PRESENTATION AND ANALYSIS OF DATA</p><p>Research Question 1 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 24</p><p>Research Question 2 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 26</p><p>Research Question 3 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 27</p><p>Research Question 4 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 29</p><p>Discussion of findings &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 36</p><p>

Chapter FIVE

: SUMMARY OF FINDINGS, CONCLUSION AND RECOMMENDATION</p><p>Restatement of the Problem &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 40</p><p>Summary of Finding &nbsp; &nbsp; &nbsp; s &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;41</p><p>Conclusion &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 42</p><p>Recommendations &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 43</p><p>References &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 45</p><p>Appendix</p> <br><p></p>

Project Abstract

<p> Leakages of confidential information are an action or result of disclosing of secret information. While record is a document preserving piece of evidence or information constituting an official account of something that has been said and occurred etc. Having known the meaning of the key words we can now see that leakages of confidential information are all about the disclosure of official documented records. Based on the foregoing, we see the causes and effects of leakages of confidential information as those factors which could warrant the disclosure of official records to the public or the wrong hands thereby decrementing the information therein. And the effects of information disclosure, could affect a business organization adversely, which could go a long way to collapse a business setup through adulteration (inferior and imitation). Therefore, it would be wise to find out who or those responsible for this ugly trend in our business organizations. <br></p>

Project Overview

<p> </p><p>INTRODUCTION</p><p>BACKGROUND OF THE STUDY</p><p>According to Njoku, (2005) “one can say that the journey of a document is not an easy one, but could be by saying that the security of a document is an easy one if certain principles are adhered to.</p><p>Causes and effects of leakages of confidential information has remained un-rectifiable factor in business organizations, and also professional offices. But the vent and channels through which these matters get out of place remains the bane of some productive organizations. This is because important files or figures are exposed to those who are not supposed to have access to them.</p><p>Confidential information is those official issues with paramount importance to business organizations. Also they can be those private matters appertaining to office affairs, which also could be seen as the life wire of a business. &nbsp; And because of its importance should be kept away from the limelight of the general public.</p><p>Leakages of confidential information are the unauthorized disclosures of certain information or bringing them to limelight of those who are not supposed to have access to them. If the information is mismanaged and there is leakage, there would be exceptional great damage to the organization. (Ihekwoaba, 2005).</p><p>Business organizations are body of persons organized for some commercial activities aimed at making profit for themselves; it can be publicly or partly owned. There is a “maxim” that says business is “secret”, therefore official issues which are matters that are very important to the organization should be kept secret.</p><p>Causes and effects of leakages of confidential information are believed to be numerous, but some of them will be elaborated to the best of my knowledge. Confidential information should not be kept at the reach of everybody in the organization. This is because they form major part of management decisions and actions. The causes of information leakage must be those who have access to them.</p><p>STATEMENT OF PROBLEMS</p><p>Causes and effects of leakages of confidential information have always been of great concern to both private and public business organizations. It is an amazing thing to some of the Directors and Managers to discover, that it is within their midst that those highly important facts of the organization get out of place. In some instances, their subordinate like the secretary, clerk, typist and manager are also accused of being responsible for the circulation of confidential information in the organization. The perpetrators of this act have persistently continued to device a new means of getting access to official issues. This study is embodied on, to find out the best way of keeping official secret intact and raid of disclosures.</p><p>PURPOSE OF STUDY</p><p>The major purpose of this study was to determine the causes and effects of leakages of confidential information in business organizations. Specifically the study will attempt to;</p><p>&nbsp; &nbsp; Determine the concept of official secrets</p><p>&nbsp; &nbsp; Identify workers who would be responsible for the act of leakages</p><p>&nbsp; &nbsp; Identify sources of official secrets in business organizations</p><p>&nbsp; &nbsp; Determine the consequences of leakages of confidential information in business organizations</p><p>&nbsp; &nbsp; Evaluate how confidential information can be controlled and protected.</p><p>&nbsp; &nbsp; Proffer remedies</p><p>OBJECTIVE OF THE STUDY</p><p>&nbsp; &nbsp; To determining the concept of official secret?</p><p>&nbsp; &nbsp; To determining what identify the sources of official secrets in business organizations?</p><p>&nbsp; &nbsp; To determining what confidential information be controlled and protected?</p><p>&nbsp; &nbsp; To determining what responsible for leakages of confidential information?</p><p>&nbsp; &nbsp; To determining what consequences of information leakages in business organizations?</p><p>&nbsp; &nbsp; To determining the remedies?</p><p>RESEARCH QUESTIONS</p><p>&nbsp; &nbsp; What is the concept of official secret?</p><p>&nbsp; &nbsp; How can you identify the sources of official secrets in business organizations?</p><p>&nbsp; &nbsp; How can confidential information be controlled and protected?</p><p>&nbsp; &nbsp; Who are those responsible for leakages of confidential information?</p><p>&nbsp; &nbsp; What are the consequences of information leakages in business organizations?</p><p>&nbsp; &nbsp; What are the remedies?</p><p>SIGNIFICANCE OF THE STUDY</p><p>The worthwhile ness of this piece of work has put in place the need to state some of the significance leakages of confidential information business organizations. Because of the strategic nature of the information, over the years, organizations have spent tremendous amount of money (resources) in hope to protecting their important information.</p><p>However, efforts have been made in focused on preventing outsiders from hawking into the organizations, educating and securing data at rest. According to analyst, the majority of all leakages are as a result of unintentionally information loss from employees and partners, both internal and external. The average information leakage costs organization approximately N182 per record (according to pneumonic institution).</p><p>The high cost of a breach can have a profound effect on organizations, market presence, and competitive advantages as a result of damage to brand and reputation and loss of customers. As organizations invest millions in business systems, increasing availability information to build or maintain a competitive edge there, remain a slew of security related considerations.</p><p>SCOPE OF STUDY</p><p>The scope of this study is specifically on causes and effects of leakages of confidential information in business organizations. The study covered three selected business organizations in Owerri, Imo State. The organizations include Nigerian Bottling Company (coca-cola), Power Holding Company of Nigeria (PHCN), and Nigerian Tele-communication Plc (NITEL).</p><p>LIMITATIONS OF THE STUDY</p><p>In the process of carrying out this study, a lot of unit action came up as limiting forces and they include the following forces.</p><p>&nbsp; &nbsp; Lack of adequate fund to cover great part in the case of interview and observations.</p><p>&nbsp; &nbsp; Restrictions possessed by some Executives and Secretaries in the company who are unwilling to give out information freely.</p><p>&nbsp; &nbsp; Shortness of time also affected the research work negatively.</p> <br><p></p>

Blazingprojects Mobile App

📚 Over 50,000 Project Materials
📱 100% Offline: No internet needed
📝 Over 98 Departments
🔍 Project Journal Publishing
🎓 Undergraduate/Postgraduate
📥 Instant Whatsapp/Email Delivery

Blazingprojects App

Related Research

Office technology. 4 min read

Implementation of Virtual Assistants for Office Productivity Enhancement...

The project topic "Implementation of Virtual Assistants for Office Productivity Enhancement" focuses on the utilization of virtual assistants to enhan...

BP
Blazingprojects
Read more →
Office technology. 2 min read

Implementation of Virtual Assistants for Office Administration Tasks...

The project topic "Implementation of Virtual Assistants for Office Administration Tasks" focuses on exploring the integration of virtual assistants in...

BP
Blazingprojects
Read more →
Office technology. 3 min read

Topic: Implementing Virtual Reality Technology in Office Environments for Enhanced C...

The project topic "Implementing Virtual Reality Technology in Office Environments for Enhanced Collaboration and Productivity" focuses on exploring th...

BP
Blazingprojects
Read more →
Office technology. 2 min read

Implementation of Virtual Assistants for Office Automation...

The project on "Implementation of Virtual Assistants for Office Automation" focuses on integrating virtual assistants into office environments to stre...

BP
Blazingprojects
Read more →
Office technology. 2 min read

Implementation of Virtual Assistants in Streamlining Office Communication Processes...

The project on "Implementation of Virtual Assistants in Streamlining Office Communication Processes" focuses on the integration of virtual assistants ...

BP
Blazingprojects
Read more →
Office technology. 2 min read

Implementation of Document Management System in a Small Business Environment...

The project topic, "Implementation of Document Management System in a Small Business Environment," focuses on the integration and utilization of a doc...

BP
Blazingprojects
Read more →
Office technology. 4 min read

Implementation of Virtual Assistants for Office Automation...

The project topic "Implementation of Virtual Assistants for Office Automation" focuses on the utilization of virtual assistants to enhance and streaml...

BP
Blazingprojects
Read more →
Office technology. 4 min read

Implementation of Virtual Assistants in Office Environments...

The project topic "Implementation of Virtual Assistants in Office Environments" focuses on exploring the integration and utilization of virtual assist...

BP
Blazingprojects
Read more →
Office technology. 4 min read

Implementation of Virtual Assistants for Office Automation and Efficiency...

The project topic "Implementation of Virtual Assistants for Office Automation and Efficiency" focuses on leveraging virtual assistant technology to en...

BP
Blazingprojects
Read more →
WhatsApp Click here to chat with us