Ethical Issues Faced by IT Managers in Business and Technology
VerifiedAdded on 2023/01/12
|6
|1463
|40
Report
AI Summary
This report explores the ethical issues encountered by IT managers in today's business environment. It delves into critical areas such as privacy concerns related to data collection and usage, the complexities of information ownership within organizations, and the challenges of maintaining control over employee behavior and technology assets. The report also examines the importance of data accuracy and its impact on decision-making, as well as the ever-present threats to security in the digital age. The conclusion emphasizes the significance of addressing these ethical considerations for smooth business operations and the responsible use of technology. The paper utilizes credible sources and adheres to the specified formatting guidelines, including a title page, content pages, and a references section.

Running head: ISSUES FACED BY IT MANAGER
ISSUES FACED BY IT MANAGER
Name of the Student
Name of the Organization
Author Note
ISSUES FACED BY IT MANAGER
Name of the Student
Name of the Organization
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1ISSUES FACED BY IT MANAGER
Introduction
The main aim of the study is to describe all kinds of ethical issues which are seen to have
been raised due to all the capabilities of IT and these are those issues which are needed for all the
professionals of IT as well as the IT manager to consider as they have to go about their
respective duties. At this particular period of time, some ethical issues are looked upon which
will be very much specific for the management and not just necessarily the management of IT.
Discussion
Privacy
Governments are seen to have been collecting a huge amount of data on several
individuals as well as organizations and finally utilise it for a huge number of purposes. All of
these purposes mainly involves national security, proper collection of tax, demographics and so
on. There has been a number of technological advances in both the hardware as well as the
software which has altered the scope of actually what can be processed (Pearson, 2013). A huge
amount of data are being measured in petabytes and much beyond and they are being stored
centrally and again being retrieved very much quickly. But it has been observed that several
organizations are collecting huge amount of personal data on several employees and if this
particular data is not safeguarded in a proper way then this may result in a number of several
significant implications for a number of individuals. There is a huge need for the maintenance by
a particular panel which will be authorised for all kinds of information like the background data
and personal information of identification like the number of social security and identifiers of
account.
Introduction
The main aim of the study is to describe all kinds of ethical issues which are seen to have
been raised due to all the capabilities of IT and these are those issues which are needed for all the
professionals of IT as well as the IT manager to consider as they have to go about their
respective duties. At this particular period of time, some ethical issues are looked upon which
will be very much specific for the management and not just necessarily the management of IT.
Discussion
Privacy
Governments are seen to have been collecting a huge amount of data on several
individuals as well as organizations and finally utilise it for a huge number of purposes. All of
these purposes mainly involves national security, proper collection of tax, demographics and so
on. There has been a number of technological advances in both the hardware as well as the
software which has altered the scope of actually what can be processed (Pearson, 2013). A huge
amount of data are being measured in petabytes and much beyond and they are being stored
centrally and again being retrieved very much quickly. But it has been observed that several
organizations are collecting huge amount of personal data on several employees and if this
particular data is not safeguarded in a proper way then this may result in a number of several
significant implications for a number of individuals. There is a huge need for the maintenance by
a particular panel which will be authorised for all kinds of information like the background data
and personal information of identification like the number of social security and identifiers of
account.

2ISSUES FACED BY IT MANAGER
Ownership
Ownership generally raises the question that which part of any particular information will
be belonging to an organization and what is actually a part of the general knowledge of the
employees (French, Guo & Shim, 2014). The project manager has the capability of reengineering
the marketing operating system of the company and he also has the access of confidential
memoranda which is mainly internal on the main procedural information and strategy of the
organization (Radvanovsky & Brodsky, 2013). Many people are needed for signing all the
agreements which are non-disclosure and some incomplete clauses in all the contracts of the
employment, documents which are legal which mainly restricts their capability of sharing
information with some other future employers even to the particular point of not allowing them
to join some companies or rather continue in the participation within a specific industry.
Although it has been observed that there are certain areas of the law which is patent covering a
huge number of situations which is not in the path of the law testing of the case and this
particular law will be varying from one country to the other one.
Control
It is to be well known that there must be a particular degree to which all the behaviours of
the employees can be monitored. Organizations must have certain rights which will be capable of
monitoring all the activities of the employees and how the modern technology are being utilised.
It must be a common practice for notifying all the employees regarding the particular time for
utilising all the assets of the organization like the access of internet and they must not have any
privacy exception at all (Fernandes et al., 2014). Even without a particular disclaimer, they are
not at all needed for knowing about the warning of monitoring which can be taking place. In
such a way, all the activities of each and every employees can be easily monitored. A huge
Ownership
Ownership generally raises the question that which part of any particular information will
be belonging to an organization and what is actually a part of the general knowledge of the
employees (French, Guo & Shim, 2014). The project manager has the capability of reengineering
the marketing operating system of the company and he also has the access of confidential
memoranda which is mainly internal on the main procedural information and strategy of the
organization (Radvanovsky & Brodsky, 2013). Many people are needed for signing all the
agreements which are non-disclosure and some incomplete clauses in all the contracts of the
employment, documents which are legal which mainly restricts their capability of sharing
information with some other future employers even to the particular point of not allowing them
to join some companies or rather continue in the participation within a specific industry.
Although it has been observed that there are certain areas of the law which is patent covering a
huge number of situations which is not in the path of the law testing of the case and this
particular law will be varying from one country to the other one.
Control
It is to be well known that there must be a particular degree to which all the behaviours of
the employees can be monitored. Organizations must have certain rights which will be capable of
monitoring all the activities of the employees and how the modern technology are being utilised.
It must be a common practice for notifying all the employees regarding the particular time for
utilising all the assets of the organization like the access of internet and they must not have any
privacy exception at all (Fernandes et al., 2014). Even without a particular disclaimer, they are
not at all needed for knowing about the warning of monitoring which can be taking place. In
such a way, all the activities of each and every employees can be easily monitored. A huge
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3ISSUES FACED BY IT MANAGER
number of organizations have already started to add a particular kind of background checking
procedure to the standard check for the reference during the process of hiring.
Accuracy
It has been observed that several businesses are always possessing a certain kind of love
or hate relationship with that to the point of accuracy (Brandis, Dzombeta & Haufe, 2014). It has
then been seen that an effective making of decision has been driven by a proper information, but
the control of quality will be coming with the expense with a particular cost both in term of the
productivity as well as dollars. Technology has helped a lot in enabling vastly a much more
complicated as well as interconnected procedure such that the far upstream problem within a
procedure has a certain kind of ripple effect upon rest of all the processes. Unfortunately, it has
been known that accuracy is actually one of those special areas which are always seemed to be
assigned to someone who will be dreaded. As it has been observed that there is a complex
interaction in between all the systems and all the databases which are very much larger, the
consequence of downstream of error has become much more magnified (Boroojeni, Amini &
Iyengar, 2017). All the managers have a greater responsibility for assessing all the outcomes
which are mainly negative and all the cost mitigations as well.
Security
It has been seen nowadays that the modern technology has presented a full new
challenges related to security. Several networks can be easily breached and a huge amount of
personal information are being compromised to a large extent (McCrie, 2015). Several identities
are easily stolen and this has resulted in a personal ruin in the financial part, critical corporate
information which is highly confidential, websites being hacked and so on. Several organizations
number of organizations have already started to add a particular kind of background checking
procedure to the standard check for the reference during the process of hiring.
Accuracy
It has been observed that several businesses are always possessing a certain kind of love
or hate relationship with that to the point of accuracy (Brandis, Dzombeta & Haufe, 2014). It has
then been seen that an effective making of decision has been driven by a proper information, but
the control of quality will be coming with the expense with a particular cost both in term of the
productivity as well as dollars. Technology has helped a lot in enabling vastly a much more
complicated as well as interconnected procedure such that the far upstream problem within a
procedure has a certain kind of ripple effect upon rest of all the processes. Unfortunately, it has
been known that accuracy is actually one of those special areas which are always seemed to be
assigned to someone who will be dreaded. As it has been observed that there is a complex
interaction in between all the systems and all the databases which are very much larger, the
consequence of downstream of error has become much more magnified (Boroojeni, Amini &
Iyengar, 2017). All the managers have a greater responsibility for assessing all the outcomes
which are mainly negative and all the cost mitigations as well.
Security
It has been seen nowadays that the modern technology has presented a full new
challenges related to security. Several networks can be easily breached and a huge amount of
personal information are being compromised to a large extent (McCrie, 2015). Several identities
are easily stolen and this has resulted in a personal ruin in the financial part, critical corporate
information which is highly confidential, websites being hacked and so on. Several organizations
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4ISSUES FACED BY IT MANAGER
are therefore having a number of internal policies mainly for the purpose of dealing with all
kinds of breaches of security (Turan & Palvia, 2014). Those particular managers who do not
secure all the systems for they are actually hold responsible and for those specific users who
searches for certain shortcuts around all the procedures of security which are mainly established
are seen to be dealing with in the similar fashion as someone who is not capable of meeting all
the requirements of the job, anything from a certain transfer or rather highly demoted to
termination.
Conclusion
It can be concluded that all of these ethical issue are seen to be highly faced by a number
of IT managers and other professionals of IT during several business processes. All of these
essential points are to be handled with much care for enabling any particular organization or
business very smoothly.
are therefore having a number of internal policies mainly for the purpose of dealing with all
kinds of breaches of security (Turan & Palvia, 2014). Those particular managers who do not
secure all the systems for they are actually hold responsible and for those specific users who
searches for certain shortcuts around all the procedures of security which are mainly established
are seen to be dealing with in the similar fashion as someone who is not capable of meeting all
the requirements of the job, anything from a certain transfer or rather highly demoted to
termination.
Conclusion
It can be concluded that all of these ethical issue are seen to be highly faced by a number
of IT managers and other professionals of IT during several business processes. All of these
essential points are to be handled with much care for enabling any particular organization or
business very smoothly.

5ISSUES FACED BY IT MANAGER
References
Boroojeni, K. G., Amini, M. H., & Iyengar, S. S. (2017). Overview of the security and privacy
issues in smart grids. In Smart grids: security and privacy issues (pp. 1-16). Springer,
Cham.
Brandis, K., Dzombeta, S., & Haufe, K. (2014). Towards a framework for governance
architecture management in cloud environments: A semantic perspective. Future
Generation Computer Systems, 32, 274-281.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information
Security, 13(2), 113-170.
French, A. M., Guo, C., & Shim, J. P. (2014). Current status, issues, and future of bring your
own device (BYOD). Communications of the Association for Information Systems, 35(1),
10.
McCrie, R. (2015). Security operations management. Butterworth-Heinemann.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and security for
cloud computing (pp. 3-42). Springer, London.
Radvanovsky, R., & Brodsky, J. (2013). Handbook of SCADA/control systems security. CRC
Press.
Turan, A. H., & Palvia, P. C. (2014). Critical information technology issues in Turkish
healthcare. Information & Management, 51(1), 57-68.
References
Boroojeni, K. G., Amini, M. H., & Iyengar, S. S. (2017). Overview of the security and privacy
issues in smart grids. In Smart grids: security and privacy issues (pp. 1-16). Springer,
Cham.
Brandis, K., Dzombeta, S., & Haufe, K. (2014). Towards a framework for governance
architecture management in cloud environments: A semantic perspective. Future
Generation Computer Systems, 32, 274-281.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security
issues in cloud environments: a survey. International Journal of Information
Security, 13(2), 113-170.
French, A. M., Guo, C., & Shim, J. P. (2014). Current status, issues, and future of bring your
own device (BYOD). Communications of the Association for Information Systems, 35(1),
10.
McCrie, R. (2015). Security operations management. Butterworth-Heinemann.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and security for
cloud computing (pp. 3-42). Springer, London.
Radvanovsky, R., & Brodsky, J. (2013). Handbook of SCADA/control systems security. CRC
Press.
Turan, A. H., & Palvia, P. C. (2014). Critical information technology issues in Turkish
healthcare. Information & Management, 51(1), 57-68.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




