Ethical Use of Computers and Networks in Organizations: Report

Verified

Added on  2020/03/28

|6
|1389
|108
Report
AI Summary
This report delves into the critical ethical considerations surrounding network management within organizations. It identifies key issues such as user privacy, data security, and the ethical responsibilities of IT administrators. The analysis explores the interlinked nature of these issues, emphasizing the need for a balance between security and privacy, and highlights the importance of considering the perspectives of various stakeholders. The evaluation section suggests the implementation of strong organizational measures, policies, and the hiring of individuals with high ethical standards. The report concludes with recommendations for standardization, benchmarking, and a strong emphasis on information technology to navigate the challenges of data security, privacy, and network control. It underscores the importance of ethical IT practices for organizational success, offering valuable insights for managing these complex issues effectively.
Document Page
Running Head: Network Management
Network Management in Organizations
Student’s name
Name of the Institute
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Network Management
Table of Contents
Introduction............................................................................................................................3
Identification...........................................................................................................................3
Analysis...................................................................................................................................4
Evaluation...............................................................................................................................4
Conclusion...............................................................................................................................5
References..............................................................................................................................6
Document Page
Network Management
Introduction
The IT administration task is a difficult task and in recent times there has been an
increase in the demand of quality IT administrator. There are various ethical and legal issues
associated with IT administration that should be taken care of. Today, Information Technology
has emerged as a critical organization function and it is important that the computers and
networks in the organization should be protected from any external data theft or internal data
leak (Guo & Fan, 2015). The objective of this paper is to discuss the issue of ethical use of
computers and networks in the organization and the paper would also discuss some of the
guidelines for ethical use of IT infrastructure within the organization.
Identification
There are several issues that could be identified with the use of computers, networks
and another IT infrastructure. One of the key ethical issue is the privacy of the users. In this era
of technological advancements there is an increased concern of privacy of users. The data used
within the organizational network can be vulnerable. Another ethical issue that could be
identified in this area is the security issue. There is always a possibility that the sensitive data of
the organization would be stolen. Moreover, the computer systems also store the personal and
confidential data of users. From the IT administration point of view, there is an ethical issue of
control and management (Beberlein & Dias, 2017). The IT administrator would usually have the
access to all the data within the department or the organization. It is important that the IT
administrators should show high ethical standards while dealing with the data. In any of the
case, the data of the employees should not be shared with any other stakeholder without the
due consent of employee. In fact, this makes the job of IT administrators more challenging. In a
nutshell, it can be said that there are three key ethical issues associated with computer and
network management in the organization. These three issue can be summarized as:
i. Privacy of the users
ii. Security of data
iii. Control and Management of data form IT administration perspective
Document Page
Network Management
Analysis
All the three issues are critical and important for organization. It is crucial that the steps
should be taken to avoid these issues. The first issue of privacy and the second issue of security
are interlinked as the privacy of the users is inversely proportional to security (Royle & Laing,
2014). There are times when the IT administrators have to take the tough decision of
compromise in the privacy level to ensure that the security of the system is maintained. Today,
most of the organization follows a formal quality technique and standard guidelines to ensure
that the balance between the security and privacy is maintained. It is important that the above
issues should be analyzed from the perspective of various internal and external stakeholders.
There are times when the external stakeholders like investors may not be much interested in
the issue of privacy as they are not directly impacted by it. There are times when different
stakeholders have different priorities (Amiri & Nikoukar, 2014). For example, for some of the
stakeholders, the priority could be privacy issues and for some of the stakeholders, the priority
could be data security issues. In this type of situations, the organizational leaders are the key
stakeholders and it is important that they should analyze the expectations of different
stakeholders before making any internal policy.
Evaluation
From the evaluation perspective, it can be said that organizations should have strong
measures in place to ensure that the above issues could be resolved. The bottom line is that the
organization should be able to achieve its end objectives and the issues should not hinder the
growth of organization. Moreover, Information Technology is a key enabler for organizations to
achieve the objective. The evaluation of the issues suggest that the issue of privacy and security
are the internal issues that could be sorted within the organization. For example, organization
can have a strong set of procedures and policies to ensure that people stick to the policies. The
third issue of control and management should be looked form and outside-in perspective. It is
important that organizations should hire the people that demonstrates high ethical standards
and moral values. It can be said that the evaluation of the issues should be done on time to
time basis (Xi & Yun, 2015). For organizations, it would make sense to get the evaluation done
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Network Management
through external organization. The external consultancy agencies would help the organizations
to get a good perspective about the existing data and privacy issues. It is also important that
the results of the evaluation should be shared with internal stakeholders of the organization. It
would develop the confidence among the employees and they would be able to support the
initiatives of the organization towards Information Security (Manshaei & Zhu, 2013).
Conclusion
The above paper discusses the ethical issues associated with the use of computer and
networks in the organization. The paper also touched upon the key guidelines that should be
followed. With the above discussion, it can be said that one of the key guidelines that should be
followed is standardization. The standardization of policies and procedures would ensure that
there is little deviation from the set protocols. Another guideline or the recommendation for
organizations is the use of benchmarking. It can be said that the benchmarking is a powerful
tool that organizations should use. The focus on Information Technology is the key for
organizations to move forward. It could be challenging for organizations and individuals to
manage the issues associated with Information Technology, use of computers and networks.
However, the benefits outweigh the risks. Therefore, it is important that organizations should
have strong policy to tackle the issues of data security, privacy and network control.
Document Page
Network Management
References
Amiri, I. S., Nikoukar, A., Shahidinejad, A., Ranjbar, M., Ali, J., & Yupapin, P. P. (2014). Generation
of quantum photon information using extremely narrow optical tweezers for computer
network communication. GSTF Journal on Computing (joc), 2(1).
Beberlein, L. T., Dias, G., Levitt, K. N., Mukherjee, B., & Wood, J. (2017). Network attacks and an
Ethernet-based network security monitor.
Guo, J. C., Fan, D., Che, H. Y., Duan, Y. N., Wang, H. S., & Zhang, D. W. (2015). An approach to
network security evaluation of computer network information system with triangular
fuzzy information. Journal of Intelligent & Fuzzy Systems, 28(5), 2029-2035.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory meets
network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Royle, J., & Laing, A. (2014). The digital marketing skills gap: Developing a Digital Marketer
Model for the communication industries. International Journal of Information
Management, 34(2), 65-73.
Xi, R. R., Yun, X. C., Zhang, Y. Z., & Hao, Z. Y. (2015). An improved quantitative evaluation method
for network security. Chinese Journal of Computers, 38(4), 749-758.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]