What specific standards and restrictions should govern

Assignment Help Operation Management
Reference no: EM132252974

Answer the Following

QUESTION 1- Obligation to Protect Consumers' Personal/Financial Information

Disclosing our personal and financial information to corporations via online portals, apps and websites has become a necessity of modern life and can hardly be described as optional.

Whether we are communicating with our doctors, booking a hotel room or buying a school textbook, online disclosure of personal and financial information is required. Even our employers are requiring us to disclose our personal and financial data to human resource contractors.

Hacking and theft of our personal and financial information is also a fact of modern life. We are understandably angry when we learn that corporations who gathered our personal and financial information did not sufficiently invest in cybersecurity safeguards to prevent hacking.

A federal court has decided that the Federal Trade Commission (FTC) has authority to regulate and punish corporations as it pertains to protection of our personal and financial data. In a first of its kind case, the FTC fined Wyndham Worldwide Corporation for lax cybersecurity, leading to three (3) hacking incidents in two (2) years. Please review the link below regarding the case.

Fair, L. (2015, August 25). Third Circuit rules in FTC v. Wyndham case. Federal Trade Commission.

Many companies believe they should not be required to disclose hacking incidents to their affected customers. Additionally, many companies argue that it is unfair to be fined by the FTC when hackers steal information.

1. Discuss the arguments corporations can make in support of their position that they do not have a duty to disclose hacking incidents to their affected customers?

2. Explain why the court in FTC v. Wyndham Worldwide Corporation agreed that the FTC was justified in fining Wyndham Worldwide Corporation?

QUESTION 2 - Child Labor and Cultural Relativism

Those living in wealthy countries nearly universally condemn businesses that employ impoverished children under the age of 14 in poor countries. Contrarily, families living in poor countries are grateful that businesses come to their countries and offer work to their children.

1. Explain why this division of opinion is a classic example of cultural relativism?

2. Presenting supporting and opposing arguments (for and against), discuss why a business headquartered in a wealthy nation can employ children under the age of 14?

3. Discuss what specific standards and restrictions should govern the practice of using child labor.

Create a Word or Rich Text Format (RTF) document that is double-spaced, 12-point font. The final product will cover all questions provided and should not exceed 8 pages in length excluding the title page and reference page. Write clearly and concisely with complete sentences and indented paragraphs.

Completing the paper

In order to complete this paper, you will want to first read the module, Learn How to Support What You Write, as this assignment requires you to use the course material and research to support what you write. Also,

· Read and use the grading rubric while completing the paper to ensure all requirements are met that will lead to the highest possible grade.

· Third person writing is required. Third person means that there are no words such as "I, me, my, we, or us" (first person writing), nor is there use of "you or your" (second person writing).

· Contractions are not used in business writing, so do not use them.

· Paraphrase and do not use direct quotation marks. Paraphrase means you do not use more than four consecutive words from a source document. Instead put a passage from a source document into your own words and attribute the passage to the source document. Not using direct quotation marks means that there should be no passages with quotation marks and instead the source material is paraphrased as stated above.

Note that a reference within a reference list cannot exist without an associated in-text citation and vice versa. You may not use more than four consecutive words from a source document, as doing so would require direct quotation marks. Changing words from a passage does not exclude the passage from having quotation marks. If more than four consecutive words are used from source documents, this material will not be included in the grade and could lead to allegations of academic dishonesty.

· You are expected to use the case scenarios, research and weekly course material to develop the analysis and support the reasoning.

Material used from a source document must be cited and referenced. A reference within a reference list cannot exist without an associated in-text citation and vice versa.

Changing words from a passage does not exclude the passage from having quotation marks. If more than four consecutive words are used from source documents, this material will not be included in the grade and could lead to allegations of academic dishonesty.

· Use in-text citations and provide a reference list that contains the reference associated with each in-text citation.

· The only book you may use is the course eBook. You may not use a dictionary or Wikipedia.

Business Ethics (2016)

· Provide the page or paragraph number in every in-text citation presented. If the eBook does not have pages, provide the chapter title and topic heading. Note that this is not an APA requirement but an Attention to Instructions requirement.

Emerging Technologies, Data Protection & Privacy

Theme 1: Emerging Technology

Jennifer Golbeck The curly fry conundrum Why social media likes say more than you might think

Bias already exists in search engine results, and it's only going to get worse

Facebook has revealed the hyper-specific internal rules it uses to police content

Net neutrality rules are likely doomed, but the debate isn't going away

California is on the verge of passing a sweeping new online privacy law targeting Facebook, Google and other tech giants

Theme 2: Data Protection

The Complicated Ethics of Data-Breach Disclosure

Equifax Breach Exposed More Consumer Data Than First Disclosed

The cost of data security: Are cybersecurity investments worth it?

The ethics of Hacking 101

US v Europe - a cultural gap on the right to be forgotten

Tracking The Trackers

What happens to your digital assets when you die?

Theme 3: Privacy

· Technology as a Threat to Privacy: Ethical Challenges to the Information Profession

· FDA medical device plan zeros in on cybersecurity, public-private partnership

· Ethics and advanced medical devices: Do we need a new approach?

Consumer Privacy Bill of Rights---not the law

European Union hits Google with record $5 billion fine in Android antitrust case

The 10 Biggest Data Breaches of 2018... So Far

Marketing, Brand Protection, Food Production, Agribusiness & Obesity

Theme 1: Ethical Issues Related to Marketing

Offensive/Exploitive/Insensitive/Violent-short of illegal

· The Most Offensive Urban Outfitters Products to Ever Exist

· Sorry About That: Wells Fargo to End Ads Suggesting Science Over Arts

· Update: Hyundai Apologizes For Car Ad Depicting Attempted Suicide

· Ikea apologises over removal of women from Saudi Arabia catalogue

False Claims to Making One Healthier, Richer, Younger--illegal

· 14 False Advertising Scandals That Cost Brands Millions

· Controversial Lollipop Ad Goes Up in Times Square

· FTC to Crack Down on Deceptive Weight-Loss Ads

· The fall of "anti-aging" skin care

· FTC Action Puts Deceptive Marketer Out of the Debt Relief Business

· Federal Trade Commission Act Section 5: Unfair or Deceptive Acts or Practices

Exploitive/Dangerous to Children & Vulnerable Populations

· Exploitative Advertising Campaigns are Targeting our Children

· Monster drinks: Are the energy drinks marketed to children?

· E-Cigarette Ads Target Millions of Kids, CDC Says

· Study eyes candy-flavored e-cigarette ads targeted to kids

Stealth Advertising/Conflicts of Interest/Biased Reviewers

· Astroturfing: Government shills are flooding the web

· The Never-Ending War on Fake Reviews

· The Real Problem with Mommy Bloggers

Theme 2: Ethical Issues Related to Brand Protection

Controversial Ingredients and Testing of Ingredients

· Controversial caffeinated products

· 5 Lessons Learned From Mattel's Lead Paint Crisis

· Doing Well By Doing Good

· Choking Hazards: Are Current Product Testing Methods for Small Parts Adequate?

· Animal Antibiotics

Assembly & Manufacturing Problems

· An Empirical Examination of a Multinational Ethical Dilemma: The Issue of Child Labor

· Ethical diamonds: What Conscientious Consumers Need to Know

· Conflict Minerals and Firms' Ignorance Over Their Supply Chains

Consumer Privacy

· Tim Cook to talk consumer privacy and data ethics at European data protection conference later this month Pricing

· Uber's Surge Pricing: Is it Ethical?

Theme 3: Ethical Issues Related to Food & Drink Production

· At sentencing, cantaloupe growers apologize for deadly listeria outbreak

· For first time, company owner faces life sentence for food poisoning outbreak

· Business Ethics Alive: Blue Bell vs Peanut Corporation of America

· 2.5 million pounds of taquitos recalled for salmonella, listeria concerns

Reference no: EM132252974

Questions Cloud

Particular aspect of walmart supply chain could be enhanced : Describe how a particular aspect of the Walmart supply chain could be enhanced.
Difference between sprial and win win sprial : What is win win sprial model difference between sprial and win win sprial - when uses of sprial
Two best models to use in redesign effort : Two best models to use in a redesign effort? Why?
Edward snowden is a famous whistleblower : Edward Snowden is a famous whistleblower. Did he violate IT security laws? If so, what are some of those laws he violated?
What specific standards and restrictions should govern : Presenting supporting and opposing arguments discuss why a business headquartered in a wealthy nation can employ children under the age of 14?
How should we balance privacy with security : Security and privacy are not the same but both are important in informatics or information technology in general. After you have read the reading activities
Research two other package managers available : Research two other package managers available for Linux systems other than RPM and DPM.
Consistently within business communication : What types of benefits are generated from providing accurate information consistently within business communication?
Write the someclass class based on the statements : Write the SomeClass class based on the statements above. Include any instance variables and the complete constructors, including the assignment of variables

Reviews

Write a Review

Operation Management Questions & Answers

  Current online catalog from the erp system

The sales order process begins when a customer logs on to the Web site. The Web server requests the current online catalog from the ERP system,

  Purpose of the supply chain operations reference

Of the three macro processes in a firm, one process is the most important. Comment on the statement or comment if you think otherwise. Read the purpose of the Supply Chain Operations Reference (SCOR) Model and about its major processes. Read about th..

  The current and projected job markets find employment

Research and determine what tools are out there to help job seekers in both the current and projected job markets find employment.

  Main driver for unethical strategies and business behaviours

What do you think is the main driver for unethical strategies and business behaviours? Defend your answer.

  Mergers and acquisitions

The decision criteria for mergers and acquisitions were typically based on considerations such as the strategic fit of the merged organizations,

  Identify two other strategies that the city might consider

What are the main causes of these symptoms? What actions should the company take to correct these problems?

  Describe member services and incentives

Examine provider network and outreach. Explain the insurance company's commitment to excellence and quality.Discuss new/current/upcoming technology.

  Explain how understanding your personal learning style

Explain how understanding your personal learning style can assist you when identifying, evaluating and selecting development opportunities.

  Which arts lend themselves to conveying ideas of divinity

Are the arts necessary for us to grasp the divine realm at all? which arts most lend themselves to conveying ideas of divinity?

  Calculate the range of the data in module assignment five

Calculate the Range of the data in Module Assignment Five. Calculate the Sample Standard Deviation of the data in Module Assignment Five.

  Develop your public relations and sales promotion

Develop your public relations, sales promotion, and personal selling plan most relevant for your product / service and audience.

  Why did that quote catch your attention

Note the page number and interpret each quote in a few sentences, explaining why each quote is interesting or important.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd