Several experienced IT resources have been hired away by a competitor.
These individuals created and managed a business critical system that gave the enterprise a market advantage.
Which of the following should be the PRIMARY concern of the system's business owner?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
The PRIMARY concern of the system's business owner in this scenario should be whether the remaining staff are able to maintain the quality of the system (Option D).
While all of the options provided may be valid concerns, the loss of experienced IT resources who created and managed a business critical system that gave the enterprise a market advantage could have serious implications for the organization's ability to maintain its competitive edge. Therefore, the primary concern of the system's business owner should be whether the remaining staff have the necessary skills and knowledge to maintain the quality of the system, and whether any knowledge transfer or training is required to ensure that the system is not compromised.
Option A, the impact on morale of the remaining IT employees, is also a valid concern, but it is secondary to the primary concern of ensuring that the system is maintained.
Option B, the competitor hiring additional IT employees from the enterprise, is a concern, but it is not directly related to the maintenance of the system. However, the organization may need to take steps to protect its intellectual property and prevent the loss of additional staff to the competitor.
Option C, whether access to the system and data has been adequately revoked, is also a valid concern, but it is not the primary concern in this scenario. While it is important to ensure that access to the system and data is properly secured, it is not the most pressing concern when it comes to maintaining the quality of the system.
In summary, the primary concern of the system's business owner should be whether the remaining staff are able to maintain the quality of the system, and whether any knowledge transfer or training is required to ensure that the system is not compromised.