Discuss how a cio might handle schrage scenarios

Assignment Help Computer Engineering
Reference no: EM13312995

Here's a possible case study for Week 3 homework assignment from Reynolds, George. (2006) Ethics in Information Technology. Boston, MA: Course Technology.

Is There a Place for Ethics in IT?

On March 15, 2005, Michael Schrage published an article in CIO magazine entitled "Ethics, Schmethics" that stirred up a great deal of controversy in the IT community. In the article, Schrage proposed that "CIOs should stop trying to do the ‘right thing' when implementing IT and focus instead on getting their implementations right." Ethics, Schrage argued, had become a buzzword much like quality in the 1980s, and that the demand for ethical behavior interferes with business efficiency.

Schrage gave a few scenarios. For example, a company is developing a customer relationship management (CRM) system, and the staff is working very hard to meet the deadline. The company plans to outsource the maintenance and support of the CRM once the system is developed. There is a good chance that two-thirds of the IT staff will be laid off. Would you disclose this information? Schrage answered, "I don't think so."

Schrage asked readers in another scenario, "How about deliberately withholding important information from your boss because you know that its disclosure would provoke his immediate counter productive intervention in an important project?" Schrage said he would do it; business involves competing values, he argued, and trade-offs must be made to keep business operations from becoming paralyzed.

Schrage was hit with a barrage of responses accusing him of being dishonorable, short- sighted, and lazy. Other feedback provided new perspectives on his scenarios that Schrage hadn't considered. For example, Kathleen Dewey, an IT manager at Boise State University, argued that doing the right thing is good for business. Not disclosing layoffs, she argued, is a trick that only works once. Remaining employees will no longer trust the company and pursue jobs where they can feel more secure. New job applicants will think twice before joining a company with a reputation for exploiting IT staff. Other readers responded to the scenario by suggesting that the company maintain loyalty by offering incentives for those who stayed or providing job placement services for departing employees.

Addressing the second scenario, Dewey suggested that not giving the boss important information could backfire on the employee. "What if your boss finds out the truth? What if you were wrong, and the boss could have helped? Once your boss knows that you lied once, will he believe you the next time?"

Another reader, Gautam Gupta, had actually worked under an unproductive, reactive, meddling boss. He suggested confronting the boss about the problem at an appropriate time and place. In addition, as situations arose that required Gupta to convey important information that might elicit interference, he developed action plans and then made firm presentations to his boss. The boss, he assured Schrage, will adapt.

Gupta, Dewey, and others argued that CIOs must consider a company's long-term needs rather than just the current needs of a specific project. Others argued that engaging in unethical behavior, even for the best of purposes, crosses a line that eventually leads to more serious transgressions. Some readers suspected that Schrage had published the article to provoke outrage. Another reader, Maikel Marrero, agreed with Schrage, arguing that ethics has to "take a back seat to budgets and schedules" in a large organization. Marrero explained, "At the end of the day, IT is business."

Questions:

1. Discuss how a CIO might handle Schrage's scenarios using the utilitarian approach, and the normative approach.

2. Discuss the possible short-term losses and long-term gains in implementing ethical solutions to each of Schrage's scenarios.

3. Must businesses choose between good ethics and financial benefits? Explain your answer using Schrage's scenarios or your own examples.

Reference no: EM13312995

Questions Cloud

Space-based remote sensing uses sensors to detect : Space-based remote sensing uses sensors to detect different types of EM radiation.
What is the time difference between the two flashes : You are standing at x=8.0km Lightning bolt 1 at x=0km and lightning bolt 2 at x=13.0 km. If your assistant didn't see the flashes at the same time, what is the time difference between the two flashes
What fraction of the power radiated by the sun : What fraction of the power radiated by the sun is intercepted by the planet Neptune? The radius of Mercury is 2.48 107 m
What management mistakes were made with blockbuster : What management mistakes were made with blockbuster? If you werethe Chief manager what business principles would you use to fix everything? Please discuss in detal your strategies.
Discuss how a cio might handle schrage scenarios : Must businesses choose between good ethics and financial benefits? Explain your answer using Schrage's scenarios or your own examples.
Companys overall performance : What recommendations would you make to allow Apple to strengthen its position in its most important markets? What steps should it take to ensure that the iPad becomes a success in the marketplace and a major contributor to the company's overall perfo..
Make good strategic sense : Does it make good strategic sense for Apple to be a competitor in the computer, personal media player, smartphone, and tablet computer industries? Are the value chain activities that Apple performs in computers, personal media players, tablet compute..
Different individuals hold the positions of board chair : What are the advantages and disadvantages of having two different individuals hold the positions of board chair and CEO rather than combining these two position?
Successful law enforcement strategies : Which are the Mexican Drug Trafficking Organizarions activities and methods of operation. What are the most successful law enforcement strategies against the MexicanDrug Trafficking Organizarions ?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Linked list based linear search algorithm

Write down an algorithm or the code segment for searching a circular linked list for a given item. Write down a recursive version of the linked list based linear search algorithm.

  Write down an event handler that automatically displays

design an ASP.NET project with Visual Studio.NET 2005. Add an aspx form to the application. Place an Image control, three RadioButton controls, a Label control, a TextBox control, and a Button control on the form. Add three images to the applicati..

  Why employees may leave the company

Do you think that it is acceptable for organizations to try to lock employees into a work term after training? In other words, if they send an employee on the training course that could have tremendous benefit to the organization, should they be a..

  Create a white paper based on knowledge

Create a white paper based on knowledge

  How to consider changing the hibernate framework

This Application challenges you to evaluate connectivity issues between database management systems (DBMS) and the procedural programming languages.

  What technologies must be used to secure those areas

The employees have hopes of making the breakthrough and bringing the company public in next two years. You have been hired as a security consultant to assess the company's needs.

  Birt is an open source eclipse-based reporting system

BIRT is an open source Eclipse-based reporting system that integrates with your Java/J2EE application to produce compelling reports BIRT provides core reporting features as in report layout, data access and scripting.

  Can a relation be stored as a sequential file

How various times should a user be allowed to mistype a password before the conversation is terminated.

  Determine the demand for gmc cars for the coming year

GMC wants to determine its production plan at each plant in the coming year. Based on the previous data, formulate a mixed integer programming model for solving GMC's production planning-capacity expansion problem for the coming year.

  Categorizing the threat

Download a password cracker developed for your operating system. Run the cracker on your system. Describe the results from cracker.

  Place the following terms into the logical sequence

Place the following terms into a logical sequence. Tell why you chose this sequence.(Note: Present your reordered terms in your suggested sequence. Do not use numbers or other methods to indicate the changed sequence.)

  Algorithm to read an arbitrary number

Develop an algorithm to read an arbitrary number of the data records, each consisting of a name, age, and code. A Code of 1 will indicate female, a code of 2 will indicate male.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd