How might users change the behaviors

Assignment Help Management Theories
Reference no: EM131883070

Problem: ETHICAL DECISION MAKING

Situation 1: The help desk is part of the group assigned to Doug Smith, the manager of office automation. The help desk has produced very low quality work for the past several months. Smith has access to the passwords for each of the help desk members' computer accounts. He instructs the help desk supervisor to go into each hard drive after hours and obtain a sample document to check for quality control for each pool member.

Discussion Questions

1. If you were the supervisor, what would you do?

2. What, if any, ethical propositions have been violated by this situation?

3. If poor quality was found, could the information be used for disciplinary purposes? For training purposes?

4. Apply PAPA to this situation.

Situation 2: Kate Essex is the supervisor of the customer service representative group for Enovelty.com, a manufacturer of novelty items. This group spends its workday answering calls, and sometimes placing calls, to customers to assist in solving a variety of issues about orders previously placed with the company. The company has a rule that personal phone calls are only allowed during breaks. Essex is assigned to monitor each representative on the phone for 15 minutes a day, as part of her regular job tasks. The representatives are aware that Essex will be monitoring them, and customers are immediately informed when they begin their calls. Essex begins to monitor James Olsen, and finds that he is on a personal call regarding his sick child. Olsen is not on break.

Discussion Questions

1. What should Essex do?

2. What, if any, ethical principles help guide decision making in this situation?

3. What management practices should be in place to ensure proper behavior without violating individual "rights"?

4. Apply the normative theories of business ethics to this situation.

Situation 3: Jane Mark was the newest hire in the IS group at We_Sell_More.com, a business on the Internet. The company takes in $30 million in revenue quarterly from Web business. Jane reports to Sam Brady, the VP of IS. Jane is assigned to a project to build a new capability into the company Web page that facilitates linking products ordered with future offerings of the company. After weeks of analysis, Jane concluded that the best way to incorporate that capability is to buy a software package from a small start-up company in Silicon Valley, California. She convinces Brady of her decision and is authorized to lease the software. The vendor e-mails Jane the software in a ZIP file and instructs her on how to install it. At the initial installation, Jane is asked to acknowledge and electronically sign the license agreement. The installed system does not ask Jane if she wants to make a backup copy of the software, so as a precaution, Jane takes it on herself and copies the ZIP files sent to her onto a thumb drive. She stores the thumb drive in her desk drawer. A year later, the vendor is bought by another company, and the software is removed from the marketplace. The new owner believes this software will provide them with a competitive advantage they want to reserve for themselves. The new vendor terminates all lease agreements and revokes all licenses on their expiration. But Jane still has the thumb drive she made as backup.

Discussion Questions

1. Is Jane obligated to stop using her backup copy? Why or why not?

2. If We_Sell_More.com wants to continue to use the system, can they? Why or why not?

3. Does it change your opinion if the software is a critical system for We_Sell_More.com? If it is a non-critical system? Explain.

Situation 4: Some of the Internet's biggest companies (i.e., Google, Microsoft, Yahoo, IBM, and Verisign) implemented a "single sign-on" system that is now available at more than 50,000 Web sites. As corporate members of the OpenID Foundation, they developed a system that is supposed to make it easier for users to sign on to a number of sites without having to remember multiple user IDs, passwords, and registration information. Theoretically, users also have a consistent identity across the Web. Under OpenID, the companies share the sign-on information for any Web user who agrees to participate. They also share personal information such as credit card data, billing addresses, and personal preferences.

Discussion Questions

1. Discuss any threats to privacy in this situation.

2. Who would own the data? Explain.

3. Who do you think should have access to the data? How should that access be controlled?

Situation 5: SpectorSoft markets eBlaster as a way to keep track of what your spouse or children are doing online. Operating in stealth mode, eBlaster tracks every single keystroke entered into a computer, from instant messages to passwords. It also records every e-mail sent and received and every Web site visited by the unsuspecting computer user. The data is sent anonymously to an IP address of the person who installed eBlaster. eBlaster could also be installed onto a business's computers.

Discussion Questions

1. Do you think it would be ethical for a business to install eBlaster to ensure that its employees are engaged only in work-related activities? If so, under what conditions would it be appropriate? If not, why not?

2. Apply the normative theories of business ethics to this situation.

Situation 6: Google, Inc. had a unique advantage as of March 2012. By combining information about user activity from its many popular applications (such as Gmail, Googleþ and YouTube), Google algorithms were able to alert users when things might be of interest. This vast amount of information, analyzed properly, gave Google a way to compete. By combining data with information from Internet searches, Google could better compete against applications such as Facebook. But this was a departure from its earlier privacy policy. In June 2011, the Executive Chairman of Google had declared, "Google will remain a place where you can do anonymous searches [without logging in]. We're very committed to having you have control over the information we have about you." This may be possible for users who don't login to a Google account, but for those with Gmail or other personal accounts or an Android mobile phone, it's more difficult to remain anonymous. Offering a counter viewpoint, Chirstopher Soghoian, an independent privacy and security researcher said, "Google now watches consumers practically everywhere they go on the Web [and anytime they use an Android phone]. No single entity should be trusted with this much sensitive data."

Discussion Questions

1. Do you see any ethical issues involved in Google's new approach to combining information from a particular user? Why or why not?

2. How might users change their behaviors if they were aware of this new approach?

3. How is Google's combining data about individuals in one central location any different ethically from the United Kingdom placing all individual's necessary information on an identity card?

4. Apply the normative theories of business ethics to Google's new policy about combining user information?

Situation 7: Spokeo is a company that gathers online data for employers, the public or anybody who is willing to pay for their services. Clients include recruiters and women who want to find out if their boyfriends are cheating on them. Spokeo recruits via ads that urge "HR-Recruiters-Click Here Now."

Discussion Questions

1. Do you think it would be ethical for a business to hire Spokeo to find out about potential employees? If so, under what conditions would it be appropriate? If not, why not?

2. Do you think it is ethical for women to hire Spokeo to see if their boyfriends are cheating on them? Why or why not?

Reference no: EM131883070

Questions Cloud

Analyze the ethical issues surrounding the situation : Consider arrest records, which are mostly computerized and stored locally by law enforcement agencies. They have an accuracy rate of about 50%.
What effect might restrictions have on global companies : The European Community's Directive on Data Protection strictly limits how database information is used and who has access to it.
Should there be a global internet privacy policy : Should there be a global Internet privacy policy? What is your opinion of the British Identity Card discussed in this chapter?
Which financial statement would be most important to you : Which financial statement would be most important to you and why?
How might users change the behaviors : Google, Inc. had a unique advantage as of March 2012. By combining information about user activity from its many popular applications.
Shares of high performing internet stock : Tom and Mary have each decided to buy 100 shares of a high performing Internet stock. The current price of the stock is $240 per share.
Calculate the average return and risk of the portfolio : Calculate the average return and risk of the portfolio. What is the average return and standard deviation of returns for these two companies?
Examine an environmental issue : Examine an environmental issue and apply one of the ethical theories to it to understand how human interactions with the natural environment .
What mutual funds would you recommend : What mutual funds would you recommend for a 22 year old college graduate who just landed their first real career job?

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd