Friday, December 6, 2019
Network Management in Organizations for IT - myassignmenthelp
Question: Discuss about theNetwork Management in Organizations for IT Infrastructure. Answer: Introduction The IT administration task is a difficult task and in recent times there has been an increase in the demand of quality IT administrator. There are various ethical and legal issues associated with IT administration that should be taken care of. Today, Information Technology has emerged as a critical organization function and it is important that the computers and networks in the organization should be protected from any external data theft or internal data leak (Guo Fan, 2015). The objective of this paper is to discuss the issue of ethical use of computers and networks in the organization and the paper would also discuss some of the guidelines for ethical use of IT infrastructure within the organization. Identification There are several issues that could be identified with the use of computers, networks and another IT infrastructure. One of the key ethical issue is the privacy of the users. In this era of technological advancements there is an increased concern of privacy of users. The data used within the organizational network can be vulnerable. Another ethical issue that could be identified in this area is the security issue. There is always a possibility that the sensitive data of the organization would be stolen. Moreover, the computer systems also store the personal and confidential data of users. From the IT administration point of view, there is an ethical issue of control and management (Beberlein Dias, 2017). The IT administrator would usually have the access to all the data within the department or the organization. It is important that the IT administrators should show high ethical standards while dealing with the data. In any of the case, the data of the employees should not be shared with any other stakeholder without the due consent of employee. In fact, this makes the job of IT administrators more challenging. In a nutshell, it can be said that there are three key ethical issues associated with computer and network management in the organization. These three issue can be summarized as: Privacy of the users Security of data Control and Management of data form IT administration perspective Analysis All the three issues are critical and important for organization. It is crucial that the steps should be taken to avoid these issues. The first issue of privacy and the second issue of security are interlinked as the privacy of the users is inversely proportional to security (Royle Laing, 2014). There are times when the IT administrators have to take the tough decision of compromise in the privacy level to ensure that the security of the system is maintained. Today, most of the organization follows a formal quality technique and standard guidelines to ensure that the balance between the security and privacy is maintained. It is important that the above issues should be analyzed from the perspective of various internal and external stakeholders. There are times when the external stakeholders like investors may not be much interested in the issue of privacy as they are not directly impacted by it. There are times when different stakeholders have different priorities (Amiri Nikoukar, 2014). For example, for some of the stakeholders, the priority could be privacy issues and for some of the stakeholders, the priority could be data security issues. In this type of situations, the organizational leaders are the key stakeholders and it is important that they should analyze the expectations of different stakeholders before making any internal policy. Evaluation From the evaluation perspective, it can be said that organizations should have strong measures in place to ensure that the above issues could be resolved. The bottom line is that the organization should be able to achieve its end objectives and the issues should not hinder the growth of organization. Moreover, Information Technology is a key enabler for organizations to achieve the objective. The evaluation of the issues suggest that the issue of privacy and security are the internal issues that could be sorted within the organization. For example, organization can have a strong set of procedures and policies to ensure that people stick to the policies. The third issue of control and management should be looked form and outside-in perspective. It is important that organizations should hire the people that demonstrates high ethical standards and moral values. It can be said that the evaluation of the issues should be done on time to time basis (Xi Yun, 2015). For organizations, it wo uld make sense to get the evaluation done through external organization. The external consultancy agencies would help the organizations to get a good perspective about the existing data and privacy issues. It is also important that the results of the evaluation should be shared with internal stakeholders of the organization. It would develop the confidence among the employees and they would be able to support the initiatives of the organization towards Information Security (Manshaei Zhu, 2013). Conclusion The above paper discusses the ethical issues associated with the use of computer and networks in the organization. The paper also touched upon the key guidelines that should be followed. With the above discussion, it can be said that one of the key guidelines that should be followed is standardization. The standardization of policies and procedures would ensure that there is little deviation from the set protocols. Another guideline or the recommendation for organizations is the use of benchmarking. It can be said that the benchmarking is a powerful tool that organizations should use. The focus on Information Technology is the key for organizations to move forward. It could be challenging for organizations and individuals to manage the issues associated with Information Technology, use of computers and networks. However, the benefits outweigh the risks. Therefore, it is important that organizations should have strong policy to tackle the issues of data security, privacy and network c ontrol. References Amiri, I. S., Nikoukar, A., Shahidinejad, A., Ranjbar, M., Ali, J., Yupapin, P. P. (2014). Generation of quantum photon information using extremely narrow optical tweezers for computer network communication.GSTF Journal on Computing (joc),2(1). Beberlein, L. T., Dias, G., Levitt, K. N., Mukherjee, B., Wood, J. (2017). Network attacks and an Ethernet-based network security monitor. Guo, J. C., Fan, D., Che, H. Y., Duan, Y. N., Wang, H. S., Zhang, D. W. (2015). An approach to network security evaluation of computer network information system with triangular fuzzy information.Journal of Intelligent Fuzzy Systems,28(5), 2029-2035. Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., Hubaux, J. P. (2013). Game theory meets network security and privacy.ACM Computing Surveys (CSUR),45(3), 25. Royle, J., Laing, A. (2014). The digital marketing skills gap: Developing a Digital Marketer Model for the communication industries. International Journal of Information Management, 34(2), 65-73. Xi, R. R., Yun, X. C., Zhang, Y. Z., Hao, Z. Y. (2015). An improved quantitative evaluation method for network security.Chinese Journal of Computers,38(4), 749-758.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.