Future selection decisions are discrimination-proof

Assignment Help Basic Computer Science
Reference no: EM133098345

Case Synopsis

In November 2014, the Residence Services department at MacEwan University in Alberta, Canada, needed to replace a residence assistant who was exiting midway through the academic year. The new hire would have one semester of work for the current academic year and, with good performance, was expected to return for two semesters of work in the following academic year. One of the qualified applicants had a distinguishable disability: she used a wheelchair. On the one hand, it would be easier for Residence Services to not hire her because of the various potential risks, concerns, or expected difficulties that could arise with her employment. The primary concern was her ability to respond effectively to emergency situations. A secondary concern was the impact on operational efficiency and the need to adapt work and staff routines to accommodate the use of a wheelchair. On the other hand, it was not legal to discriminate against the candidate for employment, and Residence Services valued inclusive hiring practices. The decision to hire or not hire this candidate needed to be made very soon.

CASE- MacEwan Residence Services: A Risky Accommodation?

Case Questions:

What other options does Galloway have besides hiring or not hiring Benson?

What changes or safeguards could be made in the selection process to ensure that future selection decisions are discrimination-proof?

Reference no: EM133098345

Questions Cloud

Interprofessional collaborative reflection : Write a brief personal reflection describing interprofessional collaboration during your experiences this quarter.
Describe experience of watching each program : Describe the experience of watching each program. How did each show have an impact upon a view of the world? What was learned, changed, or influenced?
Qualitative tools-determine what factors contribute to falls : Choose the best tool that will help you determine what factors contribute to falls. Use your best creative thinking.
Health care information system : What is Telemedicine and telehealth? Investigate the adoption and use of telemedicine and telehealth in NY state.
Future selection decisions are discrimination-proof : What changes or safeguards could be made in the selection process to ensure that future selection decisions are discrimination-proof?
Advantages and disadvantages of proposed design : Discuss and compare the advantages and disadvantages of each proposed design and justify your recommendations.
Existing information systems and information technology : Existing Information Systems (IS)/Information Technology (IT) Applications (those currently in place or already being provisioned in the near future)
Security breach which compromised data records : Find an example of a security breach which compromised data records at a company in the same industry
Focus for information governance efforts : We learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How many other machines is each machine equivalent to

Every Turing machine is equivalent to some other machine in our enumeration. Why? How many other machines is each machine equivalent to? How many times is each Turing-computable function represented in our enumeration? Be sure to justify your answ..

  Privacy issues with data mining

What are the privacy issues with data mining? Do you think they are substantiated?

  Construct an nfa for the regular

Use Thompson's construction to construct an NFA for the regular expression above. (b) Convert the NFA to a DFA using subset construction.

  Write an algorithm to determine if a string is a palindrome

write an algorithm to determine if a string is a palindrome. Assume that the string is read from standard input one character at a time. The algorithm should output true or false as appropriate.

  Baseline security requirements

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure,

  Compare and contrast between dsdm method

Compare and contrast between DSDM method and Scrum method list the requirements analysis for system development and provide the explanation.

  Analyse the results that you got from model

Create a model as described in the video. Analyse the results that you got from model. Are the results reasonable?

  What is the probability that the hotel receives at least one

What is the probability that the hotel receives at least one of the defective sets?

  Objectives of defining network security

About Information Security Fundamentals, Security Policies, and Operations Life Cycle - Based on the weeks objectives of defining network security and business priorities that must be taken into account provide your own experiences and perceptions ..

  Write a java applet that animates myhashmap

Write a Java applet that animates MyHashMap as shown in Figure 27.8(see below), page 994 You can change the initial size of the table. Assume the load-factor threshold is 0.75.

  Different authentication methods and policies

Discuss security design principles utilizing different authentication methods and (password) policies.

  Particular incident of nonprofit wrong doing

Do research about a particular incident of nonprofit wrong doing (possible examples involve the Nature Conservancy; United Way/Bill Aramony

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd