Briefly discuss any ethical issues related to dilemma

Assignment Help Business Law and Ethics
Reference no: EM131211939

Ethics/Professional development

Question 1: Is there an Ethical Dilemma?

Read the case study below and then briefly discuss any ethical issues related to any of the people mentioned (by name) in the scenario. (Maximum 1 typed page)

Question 2: Four-step Ethical Analysis and Decision Making Process

Do the more structured ethical analysis and decision making process (as done in Ethics Practice Class (Week 6), following the procedures outlined in Kallman and Grillo). Complete this analysis using the following headings and associated questions and/or statements. These are the same headings as used in the Ethics practice Class for the case study "Landscape".

Step I. Understand the Situation

a) List and number the relevant facts. Remember just the facts here - no judgements or opinions - only the facts as presented in the scenario.

b) Which of these raise an ethical issue? What is the potential or resulting harm? From the above listed facts- identify which raise an ethical issue and, of course, what is/are the ethical issue(s) that the fact raises. There will be quite a few ethical issues in this case study - some closely related while others may be/seem unrelated.

c) List the stakeholders involved. Identify all the "players" that are involved - this includes all the named individuals/people, as well as groups (e.g. the company itself) etc.

Step II. Isolate the Major Ethical Dilemma

Need to identify from all the listed ethical issues you have detected (in Step 1. b above) which is the main/major ethical Issue that needs to be dealt with NOW. That is, which is the ethical issue from which all or most of the issues detected above are caused by or are a consequence of, and if dealt with promptly (↔ NOW) would also solve many of those other issues.
Step III. Ethical Analysis

Consequentialism:
A. If action in Step II is done, who will be harmed?
B. If action in Step II is NOT done, who will be harmed?
C. Which alternative results in the least harm?
D. If action in Step II is done, who will benefit?
E. If action in Step II is NOT done, who will benefit?
F. Which alternative results in the maximum benefit?

Consequentialism Comments (on the choices at C. and F.):

Make your comments/assessments regarding your answers to C and F (above) here. It may be that the conclusions arrived at in answering the questions above appear contradictory or may logically follow - either case will require your comments... ↔ where you can "make sense" of it all ...

Rights and Duties:

G. List relevant abridged rights and neglected duties.

That is, when considering the stakeholders, who has had their rights "violated or ignored", and who has neglected their duties with respect to the events as outlined in the given scenario.

Rights and Duties Comments:
Again make your comments/assessments here - often a duty may appear to contradict a responsibility - this is your opportunity to "make sense of it all".

Kant's Categorical Imperative:

H. If action in Step II is done, who will be treated with disrespect?
I. If action in Step II is NOT done, who will be treated with disrespect?
J. Which alternative is preferable?
K. If action in Step II is done, who will be treated unlike others?
L. If action in Step II is NOT done, who will be treated unlike others?
M. Which alternative is preferable?
N. Are there benefits if everyone did action in Step II?
O. Are there benefits if nobody did action in Step II?
P. Which alternative is preferable?

Step III Discussion. This is where you may summarize your views/opinions on the results you have discovered in your ethical analysis involving Consequentialism, Rights and Duties and Categorical Imperative above. It is also the place where you can give/outline your reasons, relative weights (or importance) attributed to your views on each of the results above. However your reasons must be supported by the evidence provided by the ethical analysis above

Step IV. Making a decision

a) Make a defensible ethical decision. The statement, "make a defensible decision" implies that the decision is as a consequence of having done the ethical analysis above and all/most of the results (answers to the questions posed) strongly indicate that to solve the main ethical dilemma the - "following"-- has to be done, NOW! Typically this is in the form off an action statement action that - "something" - has to be done. Typically the "something" may be to: hire/fire someone, immediately close down ... , call in the security experts, ... , etc. depending on the ethical dilemma being addressed.

b) List the steps needed to implement your defensible ethical decision. Having made the bold action statement (↔ ethical decision) above, here is the place to outline the actual steps that need to be taken to achieve your decision. This may also involve steps that also address "lesser" but related (to the main/major) ethical dilemma. This normally takes the form of who has to do what and when - several people may need to do several different things in order to implement the decision - these actions need to be given here.

Case Study - Transcript

Alice was a bright, vivacious, popular systems programmer working at a private company called ACE Inc., one of the major graphics software providers in Australia.

Alice had proved to be a considerable asset to ACE and was very happy working there. Alice had been sent on many professional development courses involving systems programming, security, networks, etc. since joining ACE (after graduating from University 5 years ago). As a result, Alice had developed considerable expertise and knowledge concerning all of ACE's systems - which included a deep understanding of ACE's security systems, security software being used - including their ever-changing updates and configurations. Her current job at ACE largely consisted of computer security. She had developed a sound reputation both within and external to ACE for being proactive (always trying to anticipate a problem before it happened) as she tried to provide solutions or preventative measures before any damage could be done to the company's resources - especially its software and data. She maintained a keen interest in and had an extensive knowledge of all the problems concerned with ACE's security procedures, as well as all of ACE's systems and networks.

As Alice was excited by her work, she pursued her interests in systems security software at home on her own computer. Over a period of time, Alice developed an anti- virus program in which she took great pride. As there were many competitors vying for market share in this lucrative environment, Alice realised that, to make her program stand out from other competitors, she would design it and make it operate in a network environment.

Alice continued developing her program: she purchased extra hardware and software to create her own small network to continue developing her design. As the program neared completion, Alice dreamed of creating a start-up company that would take her prototype and upgrade it to be a commercial distribution: marketed for all users, no matter how complex a network environment was involved.

The basic features of the program, for which Alice was very proud, included:
• A sophisticated Graphics User Interface (GUI)
• Help screens and graphics for every activity
• Procedures for backing out of any potentially hazardous activity (a way forward and a way back at every progress point)
• It could recognise and destroy both old and new viruses
• It described any virus that it found in detail by its type, its source, and its structure
• Additionally (one of the features that Alice was most proud of) there was a validation feature. The user could copy each virus to a diskette (or quarantined memory location), and modify the existing virus and then let the program loose on this new, redesigned version of the virus. The program never failed to destroy the newly created virus every time!

Having completed as many trials as possible at home, Alice then approached her manager, Ted, the Head of IT Security at ACE, offering the program to ACE at a discount price, as her first customer. Alice was aware that ACE had its share of virus infections recently and that this program could greatly improve ACE's security.

Ted examined Alice's proposal - particularly the features, however he immediately expressed many misgivings about the program. He told Alice that she had in fact developed an extremely dangerous program. "If ACE were to make it available on the network it would be like leaving a kid in the candy store. ACE certainly won't buy this

program! In fact I am sure that ACE wouldn't touch it even if it were free! It's just entirely too dangerous."

Alice was shocked. She considered her program to be an unquestionable asset. How could Ted take it on himself to refuse it? She decided to give up her dreams of making money and, instead, became a consultant on the internet in her own time by releasing her program (source and executable) on a Bulletin Board System and providing help (as a consultant) to prospective users on the program's features. On deciding to release the program, she published it under the name Safe-Tee and consulted under the name Lock-Smith.

Ted discovered what Alice had done when he became aware that a Bulletin Board was hosting a system based security program that was creating a lot of interest in the industry. To Ted's horror he found that it was exactly the same program that Alice had previously shown him. It was clear to Ted that Alice was indeed Lock-Smith, so he immediately fired Alice (by formally issuing her with the required notice of employment termination) and informed his manager, Sheila Silk. Alice has now been out of a job for two weeks. But there is considerable interest in her program on the internet, and Lock- Smith receives many new enquiries daily.

Ted's manager, Sheila Silk, the executive Head of IT at ACE (who had privately considered Alice to be a bit of a "scatter-brain") always had a high opinion of Ted and supported Ted's decision to sack Alice with no further review of the case being necessary. As it happens, Sheila has just received an urgent email from Busta Bigwig, the owner of the ACE. Busta had just been briefed by an independent head-hunter (Look-Ahead) concerning an innovative developer on the internet called Lock-Smith. In his email, Busta instructed Sheila to find Lock-Smith and offer Lock-Smith a position immediately in order to bring Lock-Smith's expertise to ACE. Sheila, knowing exactly who Lock-Smith actually is, pours herself a strong cup of coffee and considers the situation.

Reference no: EM131211939

Questions Cloud

Demand and supply curves for t-shirts in touristtown : The demand and supply curves for T-shirts in Touristtown, U.S.A., are given by the following equations.
A true reflection of the actual security of the system : Unfortunately, this is not a true reflection of the actual security of the system. Explain the problem.
Purchasing decisions of households : Consider an economic model designed to analyze the purchasing decisions of households. An assumption that a household chooses between only two goods would be an example of a
How does behavior-blocking software work : What types of programming languages are vulnerable to buffer overflows?
Briefly discuss any ethical issues related to dilemma : CSE3PE, CSE5PE - Professional Environment - Read the case study below and then briefly discuss any ethical issues related to any of the people mentioned (by name) in the scenario and four-step Ethical Analysis and Decision Making Proces
Write a analysis over chuck palahniuks fight club : Literary Analysis Paper. Write a 650-800 word analysis over Chuck Palahniuk's Fight Club using 3-5 sources, including Fight Club -novel and/or film.
Supply shifters for microeconomics : What are the most used supply shifters for Microeconomics?
Why is it asserted that the salt increases security : Therefore, those two characters are known to the attacker and need not be guessed. Why is it asserted that the salt increases security?
Understand the significance of the salt : Assuming that you have successfully answered the preceding problem and understand the significance of the salt, here is another question. Wouldn't it be possible to thwart completely all password crackers by dramatically increasing the salt size t..

Reviews

len1211939

9/19/2016 3:43:20 AM

Assignments will be available for collection from the General Office within 2 weeks of the final allowable submission date. Students will be advised via email and on the LMS when assignments are ready for collection. Details of collection (location/date-time) will be promulgated on lms when ready.

len1211939

9/19/2016 3:43:04 AM

Question 1: Is there an Ethical Dilemma? [9 marks] Question 2: Four-step Ethical Analysis and Decision Making Process Step I. Understand the Situation [9 marks] Step II. Isolate the Major Ethical Dilemma [3 marks] Step III. Ethical Analysis Consequentialism [4 marks] Rights and Duties [4 marks] Kant’s Categorical Imperative [3 marks] Step III Discussion [9 marks] Step IV. Making a decision a) Make a defensible ethical decision [2 marks] b) List the steps needed to implement your defensible ethical decision

len1211939

9/19/2016 3:42:21 AM

{Note that many submissions will come to quite different conclusions – the differences that each submission may arrive at is not the real/main issue for this assignment – it is performing (and recording) the logical steps, and, most importantly, your supporting logical ( ethical) reasoning that you have applied at each step that has led you to that particular (step and final) conclusion.} Another variable that largely affects the conclusions arrived at (i.e. making an ethical decision stage) is the weight ( importance) attributed to each ethical dilemma/ethical consideration being evaluated in Step III – these can obviously vary!

len1211939

9/19/2016 3:42:12 AM

It is important that your ethical analysis be fully supported by providing ethical reasoning for each step/suggestion/conclusion that you performed during your analysis. That is, provide and argue (only ethical arguments will be accepted) each step and/or conclusion/action that you present. Note that the events described in the scenario have happened and cannot be changed however many ethical points can be made as to the conduct of each player (what should/could have occurred, and the consequences of such actions, etc.)! Your conclusion must be the solution to your identified major dilemma – along with the relevant supporting ethical reasoning.

len1211939

9/19/2016 3:41:24 AM

Use exactly the same headings as used in the Practical Class when undertaking your ethical analysis – however as this situation is far more complex, you should find that there is much more to comment on or list under each of the headings. Use the comments at each stage to tie together any outstanding or awkward conclusions/results or observations that may have occurred as well as the standard or “normal/obvious” results. Sometimes anomalies and even contradictions occur at and between stages of analysis – don’t be shy to comment on these if they occur.

Write a Review

Business Law and Ethics Questions & Answers

  Legal environment of business caselet

The assignment in Law deals with the topic "Legal Environment of Business". A case study about Mary, a newly joined employee who is working in the USA and Europe. She faces few issues at her work place in Europe and tries to talk to her manager who s..

  Business ethics & legal issues caselet

This assignment is about the concept of Business Ethics & Legal Issues. The laws relating to these can be found in Antitrust laws. These laws are concerned with those large corporations which have a majority of market share, mergers and acquisitions.

  Questions on business law and ethics

Examples of securities that are exempted from the registration provisions of the 1933 Act and involving misstatement of material facts in a prospectus.

  Discuss the doctrine of ratification of pre-incorporation

With the aid of a decided cases, discuss the doctrine of ratification of pre-incorporation contract.

  Discuss the extent of phoenixing activity

It has been estimated that about 6,000 phoenix companies operate in Australia, costing government and the community hundreds of millions of dollars per year and impacting on individuals.

  Application of law to facts

Company Law, Application of Law to Facts and Conclusion.

  Question on business law and ethics

This assignment related to business law.

  Questions on business law

Answer all the questions under business law.

  Iidentify the issue raised by the facts

Iidentify the issue(s) raised by the facts, identify the relevant legal principles, apply the relevant legal principles to the facts, reach a conclusion.

  Evaluation of software development

Prepare a report and present an evaluation of the subsequent methodologies for software development in terms of cost, resources and time.

  Business value and ethics

Business value and ethics,  Bart agrees to put Sam's Super Bowl champion-ship autographed football in his sports store to sell for $1,500. Sam agrees to pay Bart a 15% commission for selling the ball. If Joe comes in the sports store and offers Bart ..

  Explain what is meant by income by ordinary concepts

Advise what tax consequences arise in respect of the payments.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd