Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paula Betzabeth Assignment 1 Week 1 Ethics IT BS

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

1

Ethics in Information Technology Betzabeth Paula


Assignment 1 Week 1

Chapter 1

Self-Assessment Questions

1. The term Morality refers to social conventions about right and wrong that are so widely shared
that they become the basis for an established consensus.
2. Ethics is a set of beliefs about right and wrong behavior within a society.
3. Virtues are habits of acceptable behavior.
4. A person who acts with integrity acts in accordance with a personal integrity.
5. Morals are one’s personal beliefs about right and wrong.
6. Corporate social responsibility is the concept that an organization should act ethically by
taking responsibility for the impact of its actions on the environment, the community, and the
welfare of its employees.
7. Supply chain sustainability focuses on developing and maintaining a supply chain that meets
the needs of the present without compromising the ability of future generations to meet their
needs.
8. The public reputation of an organization strongly influences the value of its stock, how
consumers regard its products and services, the degree of oversight it receives from government
agencies, and the amount of support and cooperation it receives from its business partners.
9. Vision--The corporate ethics officer provides the organization with and in the area of business
conduct.
10. Law is a system of rules that tells us what we can and cannot do.
11. Section 406 of the Sarbanes-Oxley Act requires public companies to disclose whether they
have codes of ethics and disclose any waiver to their code of ethics for certain members of senior
management.
12. The goal of the Sarbanes–Oxley Act was to renew investor’s trust in the content and
preparation of disclosure documents by public companies
13. Code of Ethics highlights an organization’s key ethical issues and identifies overarching
values and principles that are important to the organization and its decision-making process.

14. A social audit enables an organization to review how well it is meeting its ethical and social
responsibility goals, and communicate new goals for the upcoming year.

15. Formal ethics training makes employees more aware of a company’s code of ethics and how
to apply it, as well as demonstrates that the company intends to operate in an ethical manner.

16. The most important part of the decision-making process is problem definition

17. The Common good approaches approach to ethical decision making is based on a vision of
society as a community whose members work together to achieve a common set of values and
goals.

This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00

https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
2

18. Problem definition is a clear, concise description of the issue that needs to be addressed.

Discussion Questions

1. There are many ethical issues about which people hold very strong opinions abortion, gun
control, and the death penalty, to name a few. If you were a team member on a project
with someone whom you knew held an opinion different from yours on one of these
issues, how would it affect your ability to work effectively with this person?
If am in the team member on a project and have an own opinion. It would not affect my
ability to work with them. As a member of the project we need to share ideas and gather
all opinion’s regarding to the issue, by doing that we can actually accomplish our work
without anguishing with others opinions
2. Identify two important life experiences that helped you define your own personal code of
ethics.
The two important life experiences that helped me define my own personal code of ethics
are: first: when I met someone that is friend of my friend, I don’t know her totally! But
since I become fc to her, FC meaning “Feeling Close”, I joke her and she becomes angry.
She is not a fan of jokes and I apologize for what I did. The lesson there is if you don’t
know or you don’t have idea of a person’s personality or even attitudes, likes and dislike
then, you should not be “FC”. And the code of ethics there is, observe and know a person
and respect them at first met. The second is: when I met my teacher outside the school.
The statement reminds me of one of my teacher in high school were I did not greet. In
our class, she said to me that she is upset for what I did. So the personal code of ethics
that reminds me in that experience is be polite, inside and outside of any institution you
become part with.
3. Create a list of 5 to 10 guidelines for ensuring a successful brainstorming session to
identify potential solutions to a problem.
4. Do you believe than an organization should be able to escape criminal liability for the
acts of its employees if it has acted as a responsible corporate citizen, making strong
efforts to prevent and detect misconduct in the workplace? Why or why not?
The organization will not be able to escape from criminal liability that their employees
acted. Even if the organization conducted the ethical training to all the employees, you
will not if all your employees put in their hearts the training they participated. Whatever
the employees criminal doing, the organization will be affected, the name, the company’s
reputation. Maybe you will loss a valued customer. It’s harsh but it is true. The mistake of
one, everybody will be suffering. You can’t hide that mistake, if you do so, you are not a
good example for your company and what you are doing also a crime and unethical
behavior.
5. The Ethics Resource Center identified five characteristics of a successful ethics program.
Suggest a sixth characteristic, and defend your choice.
I would suggest the characteristic of being “Respectful”. Because without Respect to
each other there will be no unity in the work.
6. Identify three CSR goals that would be appropriate for a large, multinational IT
consulting firm. Create three such goals for a small, local IT consulting firm.

This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00

https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
3

7. It is a common practice for managers to hold people accountable to meet “Stretch”goals,


quotas, and budgets. How can this be done in a way that does not encourage unethical
behavior on the part of employees?
Actually there are some companies required a minimum rate for the employees based on
the work done. Company should have a contract to their employees and orient their
people to meet stretch.
8. Describe a hypothetical situation in which the action you would take is not legal, but it is
ethical. Describe a hypothetical situation where the action you would take is legal, but not
ethical.
9. Hypothesis: It is easier to establish an ethical work environment in a nonprofit
organization than in a for-profit organization. Provide three facts or opinions that support
this hypothesis. Provide three facts or opinions that refute the hypothesis.
10. This chapter discusses four approaches to dealing with moral issues. Which approach is
closest to your way of analyzing moral issues? Now that you are aware of different
approaches, do you think you might modify your approach to include other perspectives?
Explain why or why not.
11. It can be difficult for a large organization to act ethically consistently across all facets of
its business. Identify a recent example of a usually ethical company acting in an unethical
manner.
12. Should software piracy within the boundaries of third-world countries be tolerated to
allow these countries an opportunity to move more quickly into the information age?
Why or why not?
13. Without revealing the name of your employer, comment on the efforts of your employer
to promote a work environment in which employees are encouraged to act ethically.
14. Do you think that ethics training can really be effective in changing the behavior of
employees? Why or why not?

Case # 3
1. Must businesses choose between good ethics and financial benefits? Explain your answer
using Schrage’s scenarios as examples.
A company is developing a customer is developing a customer relationship management
(CRM) system, and the staff is working very hard to meet the deadline. The company
plans to outscore the maintenance and support of the CRM system once it is developed,
meaning that there is a good chance that two-thirds of the IT staff will be laid off. They
would consider deliberately withholding important information from their boss if they
knew that is disclosure would provoke his or her immediate counterproductive
intervention in an important project. Business involves competing values, and trade-offs
must be made to keep business operations from becoming paralyzed.

2. Discuss the possible short-term losses and long-term gains in implementing ethical
solutions for each of Schrage’s scenarios.
Schrage gave a few scenarios. For example, a company is developing a customer
relationship management (CRM) system, and the staff is working very hard to meet the
deadline. The company plans to outsource the maintenance and support of the CRM once
the system is developed. There is good chance that two-thirds of the IT-staff will be laid
off. Would you disclose this information? Schrage answered, “I don't think so."

This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00

https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
4

Addressing the second scenario, Dewey suggested that not giving the boss important
information could be a backfire on the employee. "What if your boss finds out the truth?"
What if you were wrong and the boss could have helped? Once your boss knows that you
lied once, will he believe you the next time?"

Chapter 2

Self-Assessment questions

1. D
2. IT
3. Stop unauthorized copyright of software produced by its members
4. True
5. Fraud
6. Compliance
7. D
8. Internal audit
9. B
10. True
11. Negligence
12. Code of ethics

Discussion Questions

1. How do you distinguish between misrepresentation and embellishment of one’s


professional accomplishments on a résumé? Provide an example of an embellishment that
would not be considered misrepresentation.
Some ways that you distinguish between embellishments of your resume than
misrepresentation would be to claim to have done projects and results that may not have
been in their formal job descriptions. An example would be to say I was an office
manager and took on HR in my company after the HR coordinator left, but my office
manager's title was never changed, but I took on responsibility for payroll, benefits and
so on, but changed my title to Office Manager with HR responsibilities on my resume.
2. Does charging by the hour encourage unethical behavior on the part of contract workers
and consultants?
I truly believe it depends on the individual’s moral values and ethic when it comes to this
matter. Personally it doesn’t matter whether the person is contract or consultant and for
the most part in this society a lot of individuals believe that you should be serviced right
then and right now . I feel that it would okay give a person a certain amount time to
figure out all the kinks and any problems that could come about during that time of
service. Myself working as help desk we are given up to 48 hours to respond to a request
but if we feel it can be easy fix we would try to get done as soon as possible but that
cushion gives up the opportunity if come to be more than bargain for the leeway to give
the client a piece of mine that it would be done right and to the best of our abilities.

This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00

https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
5

3. You are caught in the middle of a dilemma. You have been subpoenaed to be a witness in
a work-related sexual harassment case involving your boss and a coworker. On many
occasions, you heard your boss make statements to this employee that could be
interpreted as sexual advancements. Your boss has made it clear that he will make things
difficult for you at work if you testify in favor of the employee. You could choose to
testify in a manner that would make it appear that your boss was not serious and that the
employee was overreacting. On the other hand, it was clear to you that your boss was not
joking with the employee and that he was harassing her. What kind of repercussions
could there be if you testify in favor of your coworker? Would you be willing to risk
those repercussions? Does it really matter if the case is dismissed because of your
testimony?
A lot repercussion could for testify on the behalf of the co-worker against your boss by
him giving you more on your workload, deny requested days off even if you give him or
her the proper timeframe to request or worst being fired and being in Michigan which no
cause state it could be easy to do so. I would really take in consideration if that was my
wife or my daughter or even myself if it was happening to me and I wouldn’t anyone to
feel uncomfortable in a work environment, but either way I would have to tell the truth
because if lie to save my boss it chance that someone else could try come forward and
have proof that I was their when it happen and we can both be fired.
4. Under the Foreign Corrupt Practices Act, under what conditions is a bribe not unlawful?
Explain, and provide an example.
Payments to foreign officials may be legal under the FCPA if the payments are permitted
under the written laws of the host country which could constitute a bribe not being
unlawful. Examples would be Items of nominal value, such as cab fare, reasonable meals
and entertainment expenses, or company promotional items, are unlikely to improperly
influence a government official

Case # 2

1. Present a strong argument that the state of Indiana is entitled to reimbursement of all
funds paid to IBM as well as reimbursement of all overtime employees were paid due to
fixing problems associated with the new system. Now present a strong argument that
IBM should be allowed to keep all funds it has received so far for this new system.
If I was IBM I would just cut my loses and move on from the State of Indiana for the
simple fact that with so many changes with state and federal laws as well in the computer
world they would still be fighting a losing battle trying to keep up with constant changes
with the system and keeping them in compliance with state and federal guidelines. The
State of Indiana was entitled the full reimbursement for all the funds paid to IBM as well
as reimbursement of all overtime employees due to contract that entered with them 2006
and IBM clearly breach the contract cause didn’t they meet the terms of the contract and
they have the legal right to ask for reimbursement. IBM should be allowed to keep all
funds it received so far for their new system because even though they breached the
contract it seemed that state chose to treat the contract as being in effect and sue for
damages they opted out from discharging IBM and future performance and since they

This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00

https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
6

continued and state used their technology to make hybrid system they should
compensated for their contribution.

Case # 3

Discussion Questions:

1. How can organizations and vendors change their certification programs to test for skills
as well as core knowledge? What issues might this introduce?
Organizations and vendors must produce a better training for employees to develop their
skills and core knowledge in implementing better solutions if they encountered some
problems in the company, some issues regarding of changing their certification programs
will occur in the state of time consume and short comings.
2. What are the primary arguments against certification, and how can certifying bodies
change their programs to overcome these shortcomings?
IT workers argued that testable IT knowledge does not necessarily translate into quality
IT work. To overcome these shortcomings, SAP has built alliances with some900
universities around the globe to deliver training and certify additional resources and while
there is no universal call for certification examination procedures that answers all needs
within the IT progression, certifying bodies are beginning to adapt their programs to
better fulfill the evolving needs for certification IT.
3. What are the benefits of certification? How might certification programs need to change
in the future to better serve the needs of the IT community?
Employers use certification as a hiring gate for entry-level positions and for jobs that
require specific core knowledge. In addition, employers use certification as a means of
training employees and increasing skill levels within the company. Certification programs
need to change in the future to better serve the needs of the IT community like changing
IT certification examination. Other organizations are catching on. Sun Microsystem
requires the completion of programming or design assignments for some of its
certification.

Chapter 3

Discussion Questions:
1. A successful distributed denial-of-service attack requires the downloading of software
that turns unprotected computers into zombies under the control of the malicious hacker.
Should the owners of the zombie computers be fined or otherwise punished as a means of
encouraging people to better safeguard their computers? Why or why not?
When it comes to distrusted denial of service attack and it being successful which causes
a person computer become a botnet which are controlled by the hackers from one or more
location without the consent or knowledge form it owner by turning their computers into
zombies. I feel the owners of the computer shouldn’t be fined because most they have no
knowledge it’s even going on, but I do think they computers should be locked and
remained locked until they get it fixed and gain knowledge on what not to do avoid this
happen to them again.

This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00

https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
7

2. Some IT security personnel believe that their organizations should employ former
computer criminals to identify weaknesses in their organizations’ security defenses. Do
you agree? Why or why not?
I believe you should employ some of these cyber criminals for your organization to
identify weaknesses in their organization security defenses cause depending on the nature
of their crime it could beneficial to everyone to have a person or persons with that type of
knowledge could help strengthen your team as well as educate your employees on things
that may been negligent to combat against it happen again.

3. What is the difference between industrial spying and the gathering of competitive
intelligence? Is the use of competitive intelligence ethical or unethical? Why?
The difference between industrial spying and the gathering of competitive intelligence is
simply industrial espionage involves using illegal mean to obtain information that not
available to the public and doing so by wiretapping bugs conference room, etc. Gathering
of competitive intelligence is using gathering information from financial reports, trade
journals, and other public records.
4. How would you distinguish between a hacktivist and a cyberterrorist? Should the use of
hacktivists by a country against enemy organizations be considered an act of war? Why
or why not? How about the use of cyberterrorists?
When it comes to how distinguish between and hacktivist and cyberterrorist their
isn’t a clear cut difference between the two me except to in the case of hacktivist they are
usually trying to bring social awareness or achieve political goal, but cyberterrorist they
are more extreme with the intent to cause harm rather just gathering information and they
use techniques to destroy or disrupt services. Now when it comes to if act of war is the
intent they are trying to achieve to achieve against the country corporation they are
against.

Case # 1

1. Identify three potential kinds of DDoS attackers of an e-commerce company such as


SpaFinder. What would be the motive for each of these attackers?
There are many ways hackers can utilize a distributed network to target websites, but the
most common types can be divided into three broad categories: volume-based, protocol
and application layer attacks.
2. Do research on the Web to find three DDoS mitigation service providers. How are their
services similar? How are they different? Which DDoS service provider do you think is
the best?
Multi-Layered Web Security Computing in the cloud changes everything for IT security.
When securing websites and applications against cyber attackers, knowledge is your best
defense.
DDoS Radar View the most recent 5,000 DDoS attacks mitigated by Akamai. Each
DDoS attack source commands hundreds or thousands of DDoS bots. View attack
activity worldwide in real time, including global sources, volume and targets.

Security Intelligence - Q2 2015

This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00

https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
8

Akamai saw DDoS attacks more than double in frequency and increase in duration by
nearly 20%. We've continued to analyze millions of web application attack triggers to
give you the most common vectors along with two additional new vectors: Shellshock
and cross-site scripting (XSS).

Case # 3

1. What role did computer forensics play in the high-profile cases of the New York subway
bomber and the San Francisco Bay oil spill?
Most important, the Bureau of Labor Statistics reported that job competition in this area
is keen. With high-profile cases such as the New York subway bomber and television
shows romanticizing the role of computer forensics investigators, it’s no wonder people
are flocking to the field. Yet even if computer forensics isn’t as powerful or glamorous as
it appears on TV, the field is becoming more critical to criminal investigation, and
increasing expertise will be required as cybercriminals develop more sophisticated means
of attack.
2. Why might computer forensics be more effective at preventing crimes than other forms of
criminal investigation?
For computer forensics to progress, the law must keep pace with technological
advancements. Clear and consistent legal procedures regarding computer system searches
must be developed so that police and investigators can be properly trained. An
International Code of Ethics for Cyber Crime and Cyber Terrorism should also be
established to develop protocols for “obtaining and preserving evidence, maintaining the
chain of custody of that evidence across borders,” and “clear[ing] up any difference in
language issues.” Following these measures may be the first steps to resolving the
technological and legal limitations afflicting computer forensics. Interpol, the
International Criminal Police Organization, has developed a Computer Crime Manual
with “training courses” and “a rapid information exchange system” that serves as a
foundation for international cooperation (8). Lastly, the criminal abuse of technology can
be limited by equipping the police department with state-of-the-art training and
equipment for forensic analysis. Only then is the world safely prepared to face the future
of technology. As one author predicts, “the next world war will be fought with bits and
bytes, not bullets and bombs”

This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00

https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
9

This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00

https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
Powered by TCPDF (www.tcpdf.org)

You might also like