Network Management in Organizations: Ethical and Social Issues Report

Verified

Added on  2023/04/21

|8
|1759
|259
Report
AI Summary
This report delves into the ethical and social dimensions of network management within organizations. It begins by identifying key ethical issues such as software piracy, data protection, and privacy violations, alongside social concerns like the misuse of personal information on social media and the impacts of cyberbullying. The report then examines the effects of devices like Google glasses and smartwatches on data security. It emphasizes the importance of professional codes of ethics, including integrity, objectivity, confidentiality, and professional behavior, and how these principles should guide decision-making. Furthermore, the report suggests ethical solutions, such as adhering to government policies and updating security solutions, to benefit society. The conclusion underscores the significance of robust data security measures and the role of ethical practices in fostering trust and attracting customers.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORK MANAGEMENT IN ORGANIZATIONS
NETWORK MANAGEMENT IN ORGANIZATIONS
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1NETWORK MANAGEMENT IN ORGANIZATIONS
Table of Contents
Introduction:..........................................................................................................................................2
Ethical and social issues in IT administration:........................................................................................2
Ethical issues:....................................................................................................................................2
Social issues:......................................................................................................................................3
Effects of cyberbullying and devices such as Google glasses and smart watches:.................................3
Professional code of ethics:...................................................................................................................4
Ethical behaviour in accordance with professional codes:....................................................................4
Ethical solutions and recommendations for the benefit of the society:................................................4
Conclusion:............................................................................................................................................5
References:............................................................................................................................................6
Document Page
2NETWORK MANAGEMENT IN ORGANIZATIONS
Introduction:
Network management is one of the most important tasks of the systems administrators in
most of the organizations in today’s world. Data security is an increasingly important concern for the
organizations and often due to lack of improper security standards; there are huge economic losses
for the organizations, which often cause them to be answerable to ethically answerable questions.
There are different ethical as well as social impacts of improper information management over the
networks and is of utmost importance that the organizations consider them. In the following report,
the different ethical and social aspects of network management will be discussed in detail.
Recommendations to mitigate the data security related threats would be provided. By the end of the
report, the reader will have a clear idea on the different aspects of network management within an
organization.
Ethical and social issues in IT administration:
Ethical issues:
Some of the major ethical issues in IT administration are explained below:
- Piracy of software’s as well as company logos: Data piracy is one of the most unethical
activities by the users. Often in order to save money, users download free versions of
software’s from the internet instead of paying the legitimate subscription fee. In this
process, they do not have to purchase the software and they use the cracked versions of the
original software’s that are available over the internet [1]. Hackers also make use of
advanced graphics tools to imitate the logos of the different brands across the world that
look quite similar to the original company logos by which they are often successful in
cheating customers.
- Data protection as well as privacy is another important ethical issue of the organizations.
Hackers often hack into the internal organizational networks and gain access to the
important and confidential organizational information that should only remain internal to
the employees. In this way, they often take control of the important information such as
financial data and annual business reports of the organizations and black mail the
organizations [8]. They often ask for huge amounts of money and black mail the
organizations. The hackers often carry out tax frauds and other unethical tasks [7]. The
hackers also often release Trojan and other harmful virus into the networks thereby
corrupting data and causing huge economic losses to the organizations that also in turn
defame the brand image of the organizations.
Document Page
3NETWORK MANAGEMENT IN ORGANIZATIONS
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4NETWORK MANAGEMENT IN ORGANIZATIONS
Figure 1: Global code of ethics (Source: [10]).
Social issues:
- Users often share their personal information on the social networking websites and they are
often misused due to the advent of technologies [2]. It network management plays an
important role here and should be ensured by the Social networking companies like
Facebook, twitter that the users information are not hacked or misused by the hackers.
- Due to lack of proper security policies, the economy of the companies as well as the society
is affected [9]. Many employees lose their jobs due to unforeseen Situations within the
organization, which adversely affects the economic condition of the society.
Effects of cyberbullying and devices such as Google
glasses and smart watches:
Children as well as adults often provide much of their personal information over the social
networking sites, which are accessed by the hackers and they gain access to the pictures as well as
phone numbers, addresses of the users which are often misused .they claim money from the
families and black mail the users.
Devices such as Google glasses and smart watches have the capability of secretly taking
photographs as well as recording meetings in the corporate workplaces therefore recording the
confidential information which they also often misuse and leak in the outside world for their own
personal interests.
Document Page
5NETWORK MANAGEMENT IN ORGANIZATIONS
Professional code of ethics:
The professional code of ethics, which should be followed in IT network management, are
explained below as:
- Integrity: The employees should always bear a sense of integrity while taking any business
decisions and they should be honest to themselves as well as their co-workers [3]. They
should be truthful to other employees as well as the customers and the stakeholders of the
organizations.
- Objectivity: There should be clear goals and objectives set for the organization and all the
managers at the different levels including their teammates should have a positive mind-set
that should aim to meet the common objectives of the organization.
- Professional Competence and Due Care: The employees should be technologically
competent and should handle critical situations with due care.
- Confidentiality: The employees at all levels should ensure that they maintain the
confidentiality of the important internal documents and other important information such
as financial tax sheets etc. [4]. They should ensure that they never participate in any acts of
employee vandalism.
- Professional Behaviour: The employees should always ensure that they maintain
professionalism with all the co-workers as well as the stakeholders and customers [5]. They
should never accept any kind of unethical gifts or bribery from the stakeholders for their
own benefits, which are against the interests of the organization they are working for.
Ethical behaviour in accordance with professional codes:
The employees should always ensure that they act ethically in any decision making process
in favour of the company’s interests. They should maintain professionalism in all activities and
should maintain their ethics in every processes that they are a part of.
Ethical solutions and recommendations for the benefit
of the society:
The organizations should ensure that the government policies regarding professional ethics
as well as towards the benefit of the environment are always met so that they are never a part of
any kind of ethical situations [6]. They should also ensure that the databases are updated with the
most recent security solutions so that their customers are highly satisfied with their services at all
points in time.
Document Page
6NETWORK MANAGEMENT IN ORGANIZATIONS
Conclusion:
Therefore, it can be concluded that even though there are multiple advantages of storing
information on the online databases and it can help the organization to make huge profits in the
markets there are multiple data security related threats that they should also be aware of, at all
Points in time. Proper antivirus solutions and network firewalls should be incorporated. This will not
only ensure improved and more secure data storage and transmission but will also help the
customers to gain more trust towards the management. This in turn will adversely improve the
social condition and more and more customers will get attracted towards the secure services of the
organizations.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7NETWORK MANAGEMENT IN ORGANIZATIONS
References:
[1]Y. Pawar and P. Rewagad, Use of digital signature with diffie hellman key exchange and AES
encryption algorithm to enhance data security in cloud computing. In Communication Systems and
Network Technologies (CSNT), 2013 International Conference on. IEEE., 2013, pp. (pp. 437-439).
[2]M. Ramachandran and V. Chang, Towards achieving data security with the cloud computing
adoption framework. IEEE Trans. Services Computing, 9(1),. 2016, pp. pp.138-151.
[3]K. Selvamani and R. Rao, Data security challenges and its solutions in cloud computing. Procedia
Computer Science, 48,. 2015, pp. pp.204-209.
[4]R. Seshadri and H. Patil, Big data security and privacy issues in healthcare. In Big Data (BigData
Congress), 2014 IEEE International Congress on IEEE.. IEEE, 2014, pp. (pp. 762-765).
[5]J. Li, K. Chen, X. Mao, S. Liu and Z. Huang, Insight of the protection for data security under
selective opening attacks. Information Sciences, 412,. IEEE, 2017, pp. pp.223-241.
[6]S. Elnagdy, M. Qiu and G. K, Security-aware information classifications using supervised learning
for cloud-based cyber risk management in financial big data. In Big Data Security on Cloud
(BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC),
and IEEE International Conference on Intelligent Data and Security (IDS), 2016 IEEE 2nd International
Conference on. IEEE, 2018, pp. (pp. 197-202).
[7]"Privacy and Security in Big Data Management", International Journal of Recent Trends in
Engineering and Research, pp. 251-256, 2018. Available: 10.23883/ijrter.conf.20171201.051.rsxao.
King and N. Richards, Big data ethics. Wake Forest L. Rev., 49. 2018, p. p.393.
[9]E. Mendonca, U. Tachinardi, N. Fost and K. Shoenbill, Genetic data and electronic health records:
a discussion of ethical, logistical and technological considerations. Journal of the American Medical
Informatics Association, 21(1),. 2013, pp. pp.171-180.
[10]R. Mason, Four ethical issues of the information age. In Computer Ethics. 2017, pp. (pp. 41-48).
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]