ETHICAL DECISION MAKING

User Generated

Oynax22

Business Finance

Description

ETHICAL DECISION MAKING.docx , please write  all together in one word document . 1400 words plus references, cover page, citations, APA style

Unformatted Attachment Preview

Case Study 12-1 ETHICAL DECISION MAKING Situation 1 The help desk is part of the group assigned to Doug Smith, the manager of office automation. The help desk has produced very low quality work for the past several months. Smith has access to the password for each of the help desk members’ computer accounts. He instructs the help desk supervisor to go into each hard drive after hours and obtain a sample document to check for quality control for each pool member. Discussion Questions 1. If you were the supervisor, what would you do? 2. What, if any, ethical propositions have been violated by this do? 3. If poor quality was found, could the information be used for disciplinary purposes? For training purposes? 4. Apply PAPA to this situation. Situation 2 Kate Essex is the supervisor of the customer service representative group for Enovelty.com, a manufacturer of novelty of novelty items. This group spends its workday answering calls, and sometimes placing calls, to customers to assist in solving a variety of issues about orders previously placed with the company. The company has a rule that personal phone calls are only allowed during breaks. Essex is assigned to monitor each representative on the phone for 15 minutes a day, as part of her regular job tasks. The representatives are aware that Essex will be monitoring them monitoring, and customers are immediately informed when they begin their calls. Essex begins to monitor James Olsen, and finds that he is on a personal call regarding his sick child. Olsen is not on break. Discussion Questions 1. What should Essex do? 2. What, if any, ethical principles help guide decision making in this situation? 3. What management practices should be in place to ensure proper behavior without violating individual "rights“? 4. Apply the normative theories of business ethics to this situation. Situation 3 Jane Mark was the newest hire in the IS group at We_Sell_More.com, a business on the Internet. The company takes in $30 million in revenue quarterly from Web business. Jane reports to Sam Brady, the VIP of IS. Jane is assigned to a project to build a new capability into the company Web page that facilitates linking products ordered with future offering of the company. After weeks of analysis, Jane concluded that the best way to incorporate that capability is to buy a software package from a small start-up company in Silicon Valley, California. She convinces Brady of her decision and authorized to lease the software. The vendor e-mails Jane the software in a ZIP file and instructs her on how to install it. At the initial installation, Jane is asked to acknowledge and electronically sign the license agreement. The installed system does not ask Jane if she wants to make a backup copy of the software, so as a precaution, Jane takes it on herself and copies the ZIP files sent to her onto a thumb drive. She stores the thumb drive in her desk drawer. A year later, the vendor is bought by another company, and the software is removed from the marketplace. The new owner believes this software will provide them with a competitive advantage they want to reserve for themselves. The new vendor terminates all lease agreements and revokes all licenses on their expiration. But Jane still has the thumb drive she made as backup. Discussion Questions 1. Is Jane obligated to stop using her backup copy? Why or why not? 2. If We_Sell_More.com wants to continue to use the system, can they? Why or why or why not? 3. Does it change your opinion if then software is a critical is a critical system for We_Sell_More.com? If it is a non-critical system? Explain. Situation 4 Some of the Internet’s biggest companies (i.e., Google, Microsoft, Yahoo, IBM, and Verisign) implemented a “single sign-on” system that is now available at more than 50,000 Web sites. As corporate members of the OpenID Foundation, they developed a system that is supposed to make it easier for users to sign on to a number of sites without having to remember multiple user IDs, passwords, and registration. Theoretically, users also have a consistent identity across the Web. Under OpenID, the companies share the sign-on information for any Web user who agrees to participate. They also share personal information such as credit card data, billing addresses, and personal preferences. Discussion Questions 1. Discuss any threats to privacy in this situation. 2. Who would own the data? Explain. 3. Who do you think should have access to the data? How should that access be controlled? Situation 5 SpectorSolf markets eBlaster as a way to keep track of what your spouse or children are doing online. Operating in stealth mode, eBlaster tracks every single Keystroke entered into a computer, from instant messages to passwords. It also records e-mail sent and received and every Web site visited by the unsuspecting computer user. The data is sent anonymously to an IP address of the person who installed eBlaster. eBlaster could also be installed onto a business’s computers. Discussion Questions 1. Do you think it would be ethical for a business to install eBlaster to ensure its employees are engaged only in work-related? If so, under what conditions would it be appropriate? If not, why not? 2. Apply the normative theories of business ethics to this situation. Situation 6 Google, Inc. had a unique advantage as of March 2012. By combining information about user activity from its many popular applications (such as Gmail, Google+ and YouTube), Google algorithms were able to alert users things might be of interest. This vast amount of information, analyzed properly, gave Google a way to compete. By combining data with information from Internet searches, Google could better compete against applications such as Facebook. But this was a departure from its earlier privacy. In June 2011, the Executive Chairman of Google had declared, “Google will remain a place where you can do anonymous searches [without logging in]. We’re very committed to having you have control over the information we have about you.” This may be possible for users who don’t login to a Google account, but for those with Gmail or other personal accounts or an Android mobile phone, it’s more difficult to remain anonymous. Offering a counter viewpoint, Chirstopher Soghoian, an independent privacy and security researcher said, “Google now watches consumers practically everywhere they go on the Web [and anytime they use an Android phone]. No single entity should be trusted with this much sensitive data.” Discussion Questions 1. Do you see any ethical issues involved in Google’s new approach to combining information from a particular user? Why or why not? 2. How might users change their behaviors if they were aware of this new approach? 3. How is Google’s combining data about individuals in one central location any different ethically from the United Kingdom placing all individual’s necessary information on an identity card? 4. Apply the normative theories of business ethics to Google’s new policy about combining user information? Situation 7 Spokeo is a company that gathers online data for employers, the public or anybody who is willing to pay for their services. Clients include recruiters and women who want to find out if their boyfriends are cheating on them. Spokeo recruits via ads that urge “HR-Recruiters – Click Here Now” Discussion Questions 1. Do you think it would be ethical for a business to hire Spokeo to find out about potential employees? If so, under what conditions it be appropriate? If not, why not? 2. Do you think it is ethical for women to hire Spokeo to see if their boyfriends are cheating on them? Why or why not?
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags