A programmer at a bank realized

Assignment Help Management Information Sys
Reference no: EM13998109

Review each scenario below carefully.  Choose three and respond to them using the following statement, choosing the description you feel most appropriate:  I feel the actions of this individual were (very ethical / ethical / neither ethical nor unethical / unethical / very unethical).  Then, justify your response.

Scenario 1: 
A programmer at a bank realized that he had accidentally overdrawn his checking account.  He made a small adjustment in the bank's accounting system so that his account would not have the additional service charge assessed.  As soon as he deposited funds that made his balance positive again, he corrected the bank's accounting system. 
The programmer's modification of the accounting system was:

Scenario 2:
A student at a university found out that one of the local computer bulletin boards contained a "pirate" section (a section containing a collection of illegally copied software programs). He subscribed to the board, and proceeded to download several games and professional programs, which he then distributed to several of his friends.
The student's actions in downloading the games were:
The student's actions in downloading the programs were:
The student's actions in sharing the programs and games with his friends were:

Scenario 3:
An engineer needed a program to perform a series of complicated calculations. He found a computer programmer capable of writing the program, but would only hire the programmer if he agreed to share any liability that may result from an error in the engineer's calculations. The programmer said he would be willing to assume any liability due to a malfunction of the program, but was unwilling to share any liability due to an error in the engineer's calculations.
The programmer's position in this situation is:
The engineer's position in this situation is:

Reference no: EM13998109

Questions Cloud

Designers can develop the ability to know : In Security Engineering, it's quite common for designers to secure the wrong things. How do you think that system designers can develop the ability to know what the right thing is?
What is the half-life of the radium nuclei : A sample is being analyzed 5800 years after undergoing an alpha decay process. As the technician is analyzing, he observes the sample contains only 8.5% of the radium nuclei it initially contained. What is the half-life of the radium nuclei?
How can managers promote sound leadership : How can managers promote sound leadership practices and good ethical behavior?  Why are they important and how do you promote an environment where they thrive?
Calculate number of collisions per second for a given atom : In a sample of Ar gas at 24 oC and 5.00 bar, calculate the number of collisions per second for a given atom. The diameter of an atom of Ar is 194 pm.
A programmer at a bank realized : A programmer at a bank realized that he had accidentally overdrawn his checking account.  He made a small adjustment in the bank's accounting system so that his account would not have the additional service charge assessed.  As soon as he deposited f..
Determine the best e-mail policy for an organization : Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.
What is the efficiency of the cycle : From A to B, the pressure increases from 1 atmosphere to PB=3.06 atmospheres and the process is adiabatic; from B to C, it is isobaric with 335.16 kJ of energy entering the system by heat. From C to D, the process is isothermal; from D to A, it is..
When choosing a store or business : When choosing a store or business, select a medium or large operation as it will be easier to complete the assignment. Look at the information the store or business uses in their daily business operations and identity four (4) key security risks to t..
Computer security is not an issue for organizations alone : Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Project management risk managementrisk management is a

project management risk managementrisk management is a critical aspect of project management. the supply chain

  What are the four types of consumer oriented applications

What are the four types of consumer oriented applications of E-commerce? Discuss them briefly.

  Advantages and disadvantages of the two systems

Summarize the advantages and disadvantages of the two systems. Recommend which system is the best choice to meet meaningful use requirements in this particular setting

  Supply chain management redesign

Supply Chain Management Redesign - Why does the Supply Chain Management process needs too be redesigned?

  Marketing management both an art and a science1-how is

marketing management both an art and a science?1-how is marketing management both an art and a science? what marketing

  Academic computing environment - discuss or share any

academic computing environment - discuss or share any problems that you faced in accessing or using the academic

  What are some specific tools organizations can use

What are some specific tools (IS or management) organizations can use to improve their business processes

  Advantages and disadvantages of using personal health record

Demonstrate effective communication by composing writing that communicates ideas, meaning and/or argument in a format that broadly follows conventions in the information systems field. What are the advantages and disadvantages of using a Personal ..

  Discussion on digital crime

discussion on Digital Crime

  Computer forensics - analysing hostile codein this week you

computer forensics - analysing hostile codein this week you need to analyze software. in your forensics practice you

  Basic steps for designing a logistics network

Logistics Network - What are the basic steps for designing a logistics network?

  What project areas need to be assessed

What project areas need to be assessed in a readiness process? What is included (and not included) during the stabilization timeframe - Why is knowledge transfer important to the long-term stability of the ERP system? What are the 5 areas addressed..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd