Discussion - stealing from an employer

Assignment Help Management Information Sys
Reference no: EM131924305

Question:

Each of us perceives "ethics" from our own point of reference as to what is or is not ethical. This assignment asks you to consider ethics and whistleblowers.

Select one of the behaviors listed below for your discussion posting.

Base your posting on your relationship with the "unethical person" and any risk involved in "whistle blowing".

1. Stealing from an employer
2. Falsifying a time sheet
3. Padding an expense account
4. Falsifying any document or record
5. Lying about the conduct of a co-worker

Requirements

For each discussion, you are required to write a post (325 words) . you must have two academic peer-reviewed articles for references.
must include in-text citations and references in APA style formatting.

Verified Expert

This assignment is focused on the ethics in the organization and the unethical behavior in organization culture. We have also discussed about the ethics and whistle-blowing in this assignment.

Reference no: EM131924305

Questions Cloud

Is it ethical for government to agree to terrorist immunity : For each discussion, you are required to write an initial post (325 words) . For your post, you must have two academic peer-reviewed articles for references.
Amount of money you must set aside at the end of each year : Determine the amount of money you must set aside at the end of each year until you reach 65 to reach your retirement goal.
Draft a company policy that encourages managers : Draft a company policy that encourages managers to empower their employees. Several topics will be analyzed in preparing this policy.
Describe the risks and benefits with leading the market : There are two aspects to this assignment. First, describe the risks and benefits with leading, meeting, and lagging the market in overall compensation.
Discussion - stealing from an employer : Write a post you must have two academic peer-reviewed articles for references. must include in-text citations and references in APA style
What type of renal failure is most seen with dehydration : What type of renal failure is most often seen with dehydration? What signs and symptoms noted by the nurse are characteristic of renal failure
Define opportunities for organization development work : How do you respond to Julie as a leader? Compare Julie as a leader with some of the descriptions of leadership styles provided in Chapter 2.
Prepare a report on your game experience : In this game, you can choose to play with other players or play individually. Read the instructions on the site and choose a role to play.
Create a new budgeted income : create a new budgeted income for 20XZ assuming that the production and sales is double the level of 20XY - what is the NPV of this investment

Reviews

Write a Review

Management Information Sys Questions & Answers

  Role of the chief technology officer

The Evolving Role of the Chief Technology Officer - Explain What are the roles of a CTO and what are the implications of these roles on management?

  Develop a baseline for your project plan

Allocation of resources to project tasks (both labor and material), shown as resource assignments in the Microsoft Project file.

  Part 1are there any current strategies in place for disease

part 1are there any current strategies in place for disease prevention?part 2create a memo for managers of a health

  Explain the six attributes of success

Six Attributes of Success - Which one is (ones are) the most crucial for success, and why and Are there any that you see as being not very important or applicable? Why?

  What metadata should be provided for each type of document

Create a boardroom style presentation of no more than 5 slides and no more than 15 lines per slide using Microsoft® PowerPoint® that addresses the following in relation to creating a new EDMS to be used by your company to store and track all elect..

  Discuss the major types of security mechanisms

Do some Internet research on the security implications of HIPPA requirements for hospital networks. Discuss the major types of security mechanisms that must be in place to ensure hospital compliance with HIPPA requirements

  Review the privacy concerns scenario

Review the Privacy Concerns Scenario. Be sure to include the U.S. law that supports your position for each scenario.

  Explain the questions based on case studycase study -

explain the questions based on case study.case study - salesforce.com software-as-a-service goes mainstream1.

  Suggest a timeline for establishing an erm plan

Provide a list of essential personnel whom you believe should be involved in creating and maintaining an ERM plan for an organization.

  Compare and contrast public and in-house cas

Compare and contrast public and in-house CAs. Include the positive and negative characteristics of each type of certificate authority, and provide a sound recommendation of and a justification for which you would consider implementing within your ..

  How the old information system handles the functions

The CEO was very upset at the rise of shadow IT projects - a major indicator that the company's internal information system has failed to meet its needs.

  Seven recommendations to improve e-discovery

From the e-Activity, determine which of the seven recommendations to improve e-Discovery and incident management you would consider the most important for organizations to address. Justify your answer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd