Legacy systems can become sources of interpersonal conflict within and across organizations especially when the legacy systems have little to no security features built into them but, at the same time provide critically needed support to business operations.
A risk assessment can be used to reduce interpersonal conflict by providing an objective evaluation of the risks associated with continuing to use legacy IT systems. The objective evaluation can then also be used to develop strategies for addressing security risks associated with the legacy systems (accept, mitigate, transfer, avoid).
Sometimes, interpersonal conflict between managers and between executives can arise because the individuals involved are concerned about potential impacts upon their customers. Thus, it is important to consider how a company’s approach to legacy systems (keep / toss) will affect its customer base and ability to continue operations without interruption.
You may use legacy IT systems as discussed in one of the case studies from this course as the starting point for your response.
Be creative with your answers.
Answer all questions
Requirements:
1.) APA Format
2.) Use any factual sources you may like
3.)Cite Sources