Is jane obligated to stop using her backup copy

Assignment Help Operation Management
Reference no: EM131956363

ETHICAL DECISION MAKING

Situation 1

The help desk is part of the group assigned to Doug Smith, the manager of office automation. The help desk has produced very low quality work for the past several months. Smith has access to the passwords for each of the help desk members' computer accounts.

He instructs the help desk supervisor to go into each hard drive after hours and obtain a sample document to check for quality control for each pool member.

Discussion Questions

1. If you were the supervisor, what would you do?

2. What, if any, ethical propositions have been violated by this situation?

3. If poor quality was found, could the information be used for disciplinary purposes? For training purposes?

4. Apply PAPA to this situation.

Situation 2

Kate Essex is the supervisor of the customer service representative group for Enovelty.com, a manufacturer of novelty items. This group spends its workday answering calls, and sometimes placing calls, to customers to assist in solving a variety of issues about orders previously placed with the company.

The company has a rule that personal phone calls are only allowed during breaks. Essex is assigned to monitor each representative on the phone for 15 minutes a day, as part of her regular job tasks. The representatives are aware that Essex will be monitoring them, and customers are immediately informed when they begin their calls. Essex begins to monitor James Olsen, and finds that he is on a personal call regarding his sick child. Olsen is not on break.

Discussion Questions

1. What should Essex do?

2. What, if any, ethical principles help guide decision making in this situation?

3. What management practices should be in place to ensure proper behavior without violating individual "rights"?

4. Apply the normative theories of business ethics to this situation.

Situation 3

Jane Mark was the newest hire in the IS group at We_Sell_More.com, a business on the Internet. The company takes in $30 million in revenue quarterly from Web business. Jane reports to Sam Brady, the VP of IS. Jane is assigned to a project to build a new capability into the company Web page that facilitates linking products ordered with future offerings of the company.

After weeks of analysis, Jane concluded that the best way to incorporate that capability is to buy a software package from a small start-up company in Silicon Valley, California. She convinces Brady of her decision and is authorized to lease the software. The vendor e-mails Jane the software in a ZIP file and instructs her on how to install it. At the initial installation, Jane is asked to acknowledge and electronically sign the license agreement.

The installed system does not ask Jane if she wants to make a backup copy of the software, so as a precaution, Jane takes it on herself and copies the ZIP files sent to her onto a thumb drive. She stores the thumb drive in her desk drawer. A year later, the vendor is bought by another company, and the software is removed from the marketplace. The new owner believes this software will provide them with a competitive advantage they want to reserve for themselves. The new vendor terminates all lease agreements and revokes all licenses on their expiration. But Jane still has the thumb drive she made as backup.

Discussion Questions

1. Is Jane obligated to stop using her backup copy? Why or why not?

2. If We_Sell_More.com wants to continue to use the system, can they? Why or why not?

3. Does it change your opinion if the software is a critical system for We_Sell_More.com? If it is a non-critical system? Explain.

Situation 4

Some of the Internet's biggest companies (i.e., Google, Microsoft, Yahoo, IBM, and Verisign) implemented a "single sign-on" system that is now available at more than 50,000 Web sites. As corporate members of the OpenID Foundation, they developed a system that is supposed to make it easier for users to sign on to a number of sites without having to remember multiple user IDs, passwords, and registration information.

Theoretically, users also have a consistent identity across the Web. Under OpenID, the companies share the sign-on information for any Web user who agrees to participate. They also share personal information such as credit card data, billing addresses, and personal preferences.

Discussion Questions

1. Discuss any threats to privacy in this situation.

2. Who would own the data? Explain.

3. Who do you think should have access to the data? How should that access be controlled?

Situation 5

SpectorSoft markets eBlaster as a way to keep track of what your spouse or children are doing online. Operating in stealth mode, eBlaster tracks every single keystroke entered into a computer, from instant messages to passwords. It also records every e-mail sent and received and every Web site visited by the unsuspecting computer user. The data is sent anonymously to an IP address of the person who installed eBlaster. eBlaster could also be installed onto a business's computers.

Discussion Questions

1. Do you think it would be ethical for a business to install eBlaster to ensure that its employees are engaged only in work-related activities? If so, under what conditions would it be appropriate? If not, why not?

2. Apply the normative theories of business ethics to this situation.

Situation 6

Google, Inc. had a unique advantage as of March 2012. By combining information about user activity from its many popular applications (such as Gmail, Googleþ and YouTube), Google algorithms were able to alert users when things might be of interest. This vast amount of information, analyzed properly, gave Google a way to compete. By combining data with information from Internet searches, Google could better compete against applications such as Facebook.

But this was a departure from its earlier privacy policy. In June 2011, the Executive Chairman of Google had declared, "Google will remain a place where you can do anonymous searches [without logging in]. We're very committed to having you have control over the information we have about you."

This may be possible for users who don't login to a Google account, but for those with Gmail or other personal accounts or an Android mobile phone, it's more difficult to remain anonymous. Offering a counter viewpoint, Chirstopher Soghoian, an independent privacy and security researcher said, "Google now watches consumers practically everywhere they go on the Web [and anytime they use an Android phone]. No single entity should be trusted with this much sensitive data."

Discussion Questions

1. Do you see any ethical issues involved in Google's new approach to combining information from a particular user? Why or why not?

2. How might users change their behaviors if they were aware of this new approach?

3. How is Google's combining data about individuals in one central location any different ethically from the United Kingdom placing all individual's necessary information on an identity card?

4. Apply the normative theories of business ethics to Google's new policy about combining user information?

Situation 7

Spokeo is a company that gathers online data for employers, the public or anybody who is willing to pay for their services. Clients include recruiters and women who want to find out if their boyfriends are cheating on them. Spokeo recruits via ads that urge "HR-Recruiters-Click Here Now."

Discussion Questions

1. Do you think it would be ethical for a business to hire Spokeo to find out about potential employees? If so, under what conditions would it be appropriate? If not, why not?

2. Do you think it is ethical for women to hire Spokeo to see if their boyfriends are cheating on them? Why or why not?

Reference no: EM131956363

Questions Cloud

Protect human health and the environment : What immediate action should the EHS and FS responders take to protect human health and the environment?
Should these types of restrictions be made into law : The European Community's Directive on Data Protection strictly limits how database information is used and who has access to it.
Should there be a global internet privacy policy : Is sending targeted advertising information to a computer using cookies objectionable? Why or why not?
Calculate the concentration pb in the sample : Calculate the concentration Pb (ppm) in the sample assuming that Beer's law is followed.
Is jane obligated to stop using her backup copy : If you were the supervisor, what would you do? What, if any, ethical propositions have been violated by this situation?
Journalize the may transactions that should be recorded : Journalize the May transactions that should be recorded in the purchases journal assuming the perpetual inventory system is used.
Explain the degradation in aquatic ecosystems : Explain the factors that determine the solubility of a gas in a liquid. How might this process be used to explain the degradation in aquatic ecosystems due to t
What is this reaction half-life : The concentration of A(aq) is reduced to 33.6 % of its initial value in 1.74 minutes. What is this reaction's half-life (in s)?
Make the stockholders equity section of the balance sheet : Make the stockholders' equity section of the balance sheet, including appropriate notes, for Penn Company as of June 30, 2015.

Reviews

Write a Review

Operation Management Questions & Answers

  Book review - the goal

Operations Management is about a book review. Title of the book is "Goal". This book has been written by Dr. Eliyahu Goldartt. The book has been appreciated by many as one of those books which offers an insight into the operations and strategic capac..

  Operational plan in hospitality enterprise

Operational plan pertaining to a hospitality enterprise is given in detail in the solution. The operational plan is an important plan or preparation which gives guidelines regarding the role and responsibilities of each and every operation at all lev..

  Managing operations and information

Recognise the importance of a strategic approach to the development and deployment of organisational information systems. Demonstrate an understanding of the importance of databases and their integration to the organisation's overall information mana..

  A make-or-buy analysis

An analysis of the holding costs, including the appropriate annual holding cost rate.

  Evolution and contributor of operations management

Briefly explain Evolution and contributor of Operations management.

  Functions and responsibilities of an operations manager

A number of drivers of change have transformed the roles, functions and responsibilities of an operations manager over recent years. These drivers have not only been based on technological innovations but also on the need for organisations to develop..

  Compute the optimal order quantity

Compute the Optimal Order quantity of DVD players. Determine the appropriate reorder point.

  Relationship to operations practice in the organisation

Evaluate problems in operations and identify approaches to overcoming them. Critically evaluate operating plans and identify areas for improvement. Justify, implement and evaluate changes to operations in line with modern approaches.

  A make or buy analysis

Develop a report for Figi Fabricating that will address the question of whether the company should continue to purchase the part from the supplier or begin to produce the part itself.

  Prepare a staffing plan

Prepare a staffing plan showing the change of your unit from medical/surgical staffing to oncology staffing.

  Leadership styles in different organizations

Ccompare the effectiveness of different leadership styles in different organizations

  Risk management tools and models

Be able to understand the concept of risk, roles and responsibilities for risk management and risk management tools and models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd