logo

Network Management in Organizations

   

Added on  2023-04-20

6 Pages1607 Words230 Views
 | 
 | 
 | 
Running head: NETWORK MANAGEMENT IN ORGANIZATIONS
Network Management in Organizations
Name of the Student
Name of the University
Author Note:
Network Management in Organizations_1

1
NETWORK MANAGEMENT IN ORGANIZATIONS
Table of Contents
Introduction...........................................................................................................................................2
Identification.........................................................................................................................................2
Analysis..................................................................................................................................................3
Evaluation and justification...................................................................................................................3
Conclusion.............................................................................................................................................4
Reference..............................................................................................................................................6
Network Management in Organizations_2

2
NETWORK MANAGEMENT IN ORGANIZATIONS
Introduction
The extensive development in the field of ICT technologies has led to the growth of numerous
ethical issues. The foremost determination of this paper is to focus on the ethical and social issues caused
due to cyber bullying. Apart from the ethical issues there are numerous security issues associated with
cyber bullying also, which will be discussed in the paper.
Cyber bullying is a global security concern these days as it is the misusing of the technological
advancements made in the field of ICT (Modecki et al., 2014). These security concerns do not follow the
professional code of conduct. The paper will be highlighting the ethical solutions for this security concern.
The following unit of the paper will be identifying the two ethical issues caused due to cyber bullying.
Identification
The extensive development in the field of ICT has led to the growth of many good and bad things
for our society and our business. Our society is hugely benefitted by the positive developments of the
smart technologies and very badly damaged due to the negative developments as it is not only harmful for
the society but also our businesses as well (Hinduja&Patchin, 2014). This unit of the paper will be
highlighting the different types of issues caused due to the global problem of cyber bullying. This category
of online bullying is done in online platforms such as the social media platforms where all the personal data
of the users are stored safely. There are different types of security issues associated with cyber bullying as
the followings:
Privacy of the users of mobile technologies are at stake most of the times as they accept all the
conditions of the technologies during the installation process without even going through the details
(Pabian&Vandebosch, 2016). Security of the users is at stake as the mobile applications are sometimes tied
up with many third parties. The users of the mobile applications are often victimized with their personal
data, which are the social ethical issues of cyber bullying.
The other important ethical issue is the traditional bullying techniques are converted into cyber
bullying without even knowing about its consequences on our society which causes behavioral changes (Del
Rey et al., 2016). The following unit of the paper will be analyzing the discussed issues in a detailed manner.
Analysis
Cyber-bullying is one of the most trending categories of cyber harassment. Electronic
communication methods are the platforms for the cyber criminals for this crime. Threating calls or offensive
emails are the other sort of issue associated withthe cyber-bullying. These kinds of issues may have very
direct impact on the users of those mobile applications as their behavior may seem to change after a cyber-
Network Management in Organizations_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents