Discuss the below:
"Threats to Information Security"
Select any three of the following security threats described in the textbook (human error, damage by employees, misuse of computer systems, theft, computer-based fraud, viruses, hackers, and natural disasters) and recommend a control for each threat that can be put into place to mitigate the breach of organizational information. Be sure to provide specific examples to support your response. Rank the threats in order of risk and then justify your ranking.
"HR Trends"
From the e-Activity, predict what the workforce attitudes and preferences will look like in the next 10 years based on new technologies and how HR will deal with those preferences. Provide specific examples to support your response.