Trusted by 2+ million users, 1000+ happy students everyday
Showing pages 1 to 2 of 4 pages
Running Head: NETWORK MANAGEMENT IN ORGANISATIONSNetwork Management in OrganizationsStudent’s nameName of the Institute
NETWORK MANAGEMENT IN ORGANISATIONSIntroduction It would be correct to say that ethical issues are one of the most critical and difficult to solvethat exist in implementation of any IT infrastructure (Chatterjee & Sarker, 2015). In this case, the ethical issue is to obtain a balance between the cost and the security. The client wants to compromise the network security measures that comes at a cost and as an expert the organization knows that these security measures should not be compromised. The ethical issue is to take a decision and obtain a balance between the cost and network security. IdentificationBefore solving any ethical issue, it is important to identify the issues. The two important andkey ethical issues identified in this case can be highlighted as:i.The implementer of network has to take a call between cost and security. The client has given a clear-cut instruction that network security should be compromised to save the cost. ii.The implementer has to decide that till what level or to what extent the network security should be compromised. It is not an easy decision to make considering the fact that this decision can have some sever future repercussions (Li & Tryfonas, 2016).AnalysisThe core of the above ethical issues is to obtain a balance between the cost and the security. It is important that this ethical issue should be analysed from the perspective or lenses of various stakeholders. The discussion around the key stakeholders in this case can be discussed as:Organization: It can be said that the organization is the most important stakeholder as in the end the organization has to approve the budget for network implementation. It appears that the prime focus of organization is to save cost and for the same organization is ready to compromise the quality of network security. Implementer: The implementer is other key stakeholder as or he she is the one who would ultimately be held responsible for the network security. Being an expert, implementer known the intricacies of compromised network security and this is the reason that implementer does not wantto compromise on the quality (Kizza, 2016). At the same time, he or she should not be the one to spend money from his or her pocket.
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss