How might users change the behaviors

Assignment Help Management Theories
Reference no: EM131883070

Problem: ETHICAL DECISION MAKING

Situation 1: The help desk is part of the group assigned to Doug Smith, the manager of office automation. The help desk has produced very low quality work for the past several months. Smith has access to the passwords for each of the help desk members' computer accounts. He instructs the help desk supervisor to go into each hard drive after hours and obtain a sample document to check for quality control for each pool member.

Discussion Questions

1. If you were the supervisor, what would you do?

2. What, if any, ethical propositions have been violated by this situation?

3. If poor quality was found, could the information be used for disciplinary purposes? For training purposes?

4. Apply PAPA to this situation.

Situation 2: Kate Essex is the supervisor of the customer service representative group for Enovelty.com, a manufacturer of novelty items. This group spends its workday answering calls, and sometimes placing calls, to customers to assist in solving a variety of issues about orders previously placed with the company. The company has a rule that personal phone calls are only allowed during breaks. Essex is assigned to monitor each representative on the phone for 15 minutes a day, as part of her regular job tasks. The representatives are aware that Essex will be monitoring them, and customers are immediately informed when they begin their calls. Essex begins to monitor James Olsen, and finds that he is on a personal call regarding his sick child. Olsen is not on break.

Discussion Questions

1. What should Essex do?

2. What, if any, ethical principles help guide decision making in this situation?

3. What management practices should be in place to ensure proper behavior without violating individual "rights"?

4. Apply the normative theories of business ethics to this situation.

Situation 3: Jane Mark was the newest hire in the IS group at We_Sell_More.com, a business on the Internet. The company takes in $30 million in revenue quarterly from Web business. Jane reports to Sam Brady, the VP of IS. Jane is assigned to a project to build a new capability into the company Web page that facilitates linking products ordered with future offerings of the company. After weeks of analysis, Jane concluded that the best way to incorporate that capability is to buy a software package from a small start-up company in Silicon Valley, California. She convinces Brady of her decision and is authorized to lease the software. The vendor e-mails Jane the software in a ZIP file and instructs her on how to install it. At the initial installation, Jane is asked to acknowledge and electronically sign the license agreement. The installed system does not ask Jane if she wants to make a backup copy of the software, so as a precaution, Jane takes it on herself and copies the ZIP files sent to her onto a thumb drive. She stores the thumb drive in her desk drawer. A year later, the vendor is bought by another company, and the software is removed from the marketplace. The new owner believes this software will provide them with a competitive advantage they want to reserve for themselves. The new vendor terminates all lease agreements and revokes all licenses on their expiration. But Jane still has the thumb drive she made as backup.

Discussion Questions

1. Is Jane obligated to stop using her backup copy? Why or why not?

2. If We_Sell_More.com wants to continue to use the system, can they? Why or why not?

3. Does it change your opinion if the software is a critical system for We_Sell_More.com? If it is a non-critical system? Explain.

Situation 4: Some of the Internet's biggest companies (i.e., Google, Microsoft, Yahoo, IBM, and Verisign) implemented a "single sign-on" system that is now available at more than 50,000 Web sites. As corporate members of the OpenID Foundation, they developed a system that is supposed to make it easier for users to sign on to a number of sites without having to remember multiple user IDs, passwords, and registration information. Theoretically, users also have a consistent identity across the Web. Under OpenID, the companies share the sign-on information for any Web user who agrees to participate. They also share personal information such as credit card data, billing addresses, and personal preferences.

Discussion Questions

1. Discuss any threats to privacy in this situation.

2. Who would own the data? Explain.

3. Who do you think should have access to the data? How should that access be controlled?

Situation 5: SpectorSoft markets eBlaster as a way to keep track of what your spouse or children are doing online. Operating in stealth mode, eBlaster tracks every single keystroke entered into a computer, from instant messages to passwords. It also records every e-mail sent and received and every Web site visited by the unsuspecting computer user. The data is sent anonymously to an IP address of the person who installed eBlaster. eBlaster could also be installed onto a business's computers.

Discussion Questions

1. Do you think it would be ethical for a business to install eBlaster to ensure that its employees are engaged only in work-related activities? If so, under what conditions would it be appropriate? If not, why not?

2. Apply the normative theories of business ethics to this situation.

Situation 6: Google, Inc. had a unique advantage as of March 2012. By combining information about user activity from its many popular applications (such as Gmail, Googleþ and YouTube), Google algorithms were able to alert users when things might be of interest. This vast amount of information, analyzed properly, gave Google a way to compete. By combining data with information from Internet searches, Google could better compete against applications such as Facebook. But this was a departure from its earlier privacy policy. In June 2011, the Executive Chairman of Google had declared, "Google will remain a place where you can do anonymous searches [without logging in]. We're very committed to having you have control over the information we have about you." This may be possible for users who don't login to a Google account, but for those with Gmail or other personal accounts or an Android mobile phone, it's more difficult to remain anonymous. Offering a counter viewpoint, Chirstopher Soghoian, an independent privacy and security researcher said, "Google now watches consumers practically everywhere they go on the Web [and anytime they use an Android phone]. No single entity should be trusted with this much sensitive data."

Discussion Questions

1. Do you see any ethical issues involved in Google's new approach to combining information from a particular user? Why or why not?

2. How might users change their behaviors if they were aware of this new approach?

3. How is Google's combining data about individuals in one central location any different ethically from the United Kingdom placing all individual's necessary information on an identity card?

4. Apply the normative theories of business ethics to Google's new policy about combining user information?

Situation 7: Spokeo is a company that gathers online data for employers, the public or anybody who is willing to pay for their services. Clients include recruiters and women who want to find out if their boyfriends are cheating on them. Spokeo recruits via ads that urge "HR-Recruiters-Click Here Now."

Discussion Questions

1. Do you think it would be ethical for a business to hire Spokeo to find out about potential employees? If so, under what conditions would it be appropriate? If not, why not?

2. Do you think it is ethical for women to hire Spokeo to see if their boyfriends are cheating on them? Why or why not?

Reference no: EM131883070

Questions Cloud

Analyze the ethical issues surrounding the situation : Consider arrest records, which are mostly computerized and stored locally by law enforcement agencies. They have an accuracy rate of about 50%.
What effect might restrictions have on global companies : The European Community's Directive on Data Protection strictly limits how database information is used and who has access to it.
Should there be a global internet privacy policy : Should there be a global Internet privacy policy? What is your opinion of the British Identity Card discussed in this chapter?
Which financial statement would be most important to you : Which financial statement would be most important to you and why?
How might users change the behaviors : Google, Inc. had a unique advantage as of March 2012. By combining information about user activity from its many popular applications.
Shares of high performing internet stock : Tom and Mary have each decided to buy 100 shares of a high performing Internet stock. The current price of the stock is $240 per share.
Calculate the average return and risk of the portfolio : Calculate the average return and risk of the portfolio. What is the average return and standard deviation of returns for these two companies?
Examine an environmental issue : Examine an environmental issue and apply one of the ethical theories to it to understand how human interactions with the natural environment .
What mutual funds would you recommend : What mutual funds would you recommend for a 22 year old college graduate who just landed their first real career job?

Reviews

Write a Review

Management Theories Questions & Answers

  Find that he used the correct proportions in only margaritas

The margarita is one of the most common tequila-based cocktails, made with tequila mixed with triple sec and lime or lemon juice, often served with salt.

  Justify moving-average algorithm

Consider a moving-average algorithm with time window n. Assume that the observed values are i.i.d. variables. Show that the autocorrelation function for two forecasts that are k time buckets apart is.

  Performance management systems and motivationthroughout

performance management systems and motivationthroughout this unit you may be discovering new ways that organisations

  Choices within a range from an ethical perspective

That is, how might a decision about the selection of one or another amount in the continuum relate to it being an ethical position to take?

  Discuss the supervisor''s role in implementing an eap

Shelly Wexler tells her supervisor, Rob Levine, that having to care for her aging mother is forcing her to leave work early and is making her feel increasingly "stressed out." Rob refers her to the company's EAP, but he also tries to convince her to ..

  Which training programs can help reduce the turnover problem

Which training programs can help reduce the turnover problem.

  Difference between the currency board or dollarization

Currency Board or Dollarization. Fixed exchange rate regimes are sometimes implemented through a currency board (Hong Kong) or dollarization (Ecuador).

  How moore law influences an organization ability

An explanation of the significance of the five-component model within information technology (IT) and information systems (IS).

  Promote business in asian market

Assume yourself as a marketing manager of a leading face cream manufacturing company. How will you choose effective intermediaries to promote your business in Asian market? Justify your views with appropriate examples.

  Global supply chain management aggregated forecast-based

global supply chain management aggregated forecast-based demand management with growth expectations and over-ordering

  Find probability of selected tulip is tall enough to pick

The Netherlands is one of the world leaders in the production and sale of flowers. Suppose the heights of the tulips in the greenhouse of Rotterdams Fantas.

  What are the three levels of management hierarchy

What are the three levels of management hierarchy? For each level, which management skills might be considered most important, and why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd