Paula Betzabeth Assignment 1 Week 1 Ethics IT BS
Paula Betzabeth Assignment 1 Week 1 Ethics IT BS
Paula Betzabeth Assignment 1 Week 1 Ethics IT BS
Chapter 1
Self-Assessment Questions
1. The term Morality refers to social conventions about right and wrong that are so widely shared
that they become the basis for an established consensus.
2. Ethics is a set of beliefs about right and wrong behavior within a society.
3. Virtues are habits of acceptable behavior.
4. A person who acts with integrity acts in accordance with a personal integrity.
5. Morals are one’s personal beliefs about right and wrong.
6. Corporate social responsibility is the concept that an organization should act ethically by
taking responsibility for the impact of its actions on the environment, the community, and the
welfare of its employees.
7. Supply chain sustainability focuses on developing and maintaining a supply chain that meets
the needs of the present without compromising the ability of future generations to meet their
needs.
8. The public reputation of an organization strongly influences the value of its stock, how
consumers regard its products and services, the degree of oversight it receives from government
agencies, and the amount of support and cooperation it receives from its business partners.
9. Vision--The corporate ethics officer provides the organization with and in the area of business
conduct.
10. Law is a system of rules that tells us what we can and cannot do.
11. Section 406 of the Sarbanes-Oxley Act requires public companies to disclose whether they
have codes of ethics and disclose any waiver to their code of ethics for certain members of senior
management.
12. The goal of the Sarbanes–Oxley Act was to renew investor’s trust in the content and
preparation of disclosure documents by public companies
13. Code of Ethics highlights an organization’s key ethical issues and identifies overarching
values and principles that are important to the organization and its decision-making process.
14. A social audit enables an organization to review how well it is meeting its ethical and social
responsibility goals, and communicate new goals for the upcoming year.
15. Formal ethics training makes employees more aware of a company’s code of ethics and how
to apply it, as well as demonstrates that the company intends to operate in an ethical manner.
16. The most important part of the decision-making process is problem definition
17. The Common good approaches approach to ethical decision making is based on a vision of
society as a community whose members work together to achieve a common set of values and
goals.
This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00
https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
2
18. Problem definition is a clear, concise description of the issue that needs to be addressed.
Discussion Questions
1. There are many ethical issues about which people hold very strong opinions abortion, gun
control, and the death penalty, to name a few. If you were a team member on a project
with someone whom you knew held an opinion different from yours on one of these
issues, how would it affect your ability to work effectively with this person?
If am in the team member on a project and have an own opinion. It would not affect my
ability to work with them. As a member of the project we need to share ideas and gather
all opinion’s regarding to the issue, by doing that we can actually accomplish our work
without anguishing with others opinions
2. Identify two important life experiences that helped you define your own personal code of
ethics.
The two important life experiences that helped me define my own personal code of ethics
are: first: when I met someone that is friend of my friend, I don’t know her totally! But
since I become fc to her, FC meaning “Feeling Close”, I joke her and she becomes angry.
She is not a fan of jokes and I apologize for what I did. The lesson there is if you don’t
know or you don’t have idea of a person’s personality or even attitudes, likes and dislike
then, you should not be “FC”. And the code of ethics there is, observe and know a person
and respect them at first met. The second is: when I met my teacher outside the school.
The statement reminds me of one of my teacher in high school were I did not greet. In
our class, she said to me that she is upset for what I did. So the personal code of ethics
that reminds me in that experience is be polite, inside and outside of any institution you
become part with.
3. Create a list of 5 to 10 guidelines for ensuring a successful brainstorming session to
identify potential solutions to a problem.
4. Do you believe than an organization should be able to escape criminal liability for the
acts of its employees if it has acted as a responsible corporate citizen, making strong
efforts to prevent and detect misconduct in the workplace? Why or why not?
The organization will not be able to escape from criminal liability that their employees
acted. Even if the organization conducted the ethical training to all the employees, you
will not if all your employees put in their hearts the training they participated. Whatever
the employees criminal doing, the organization will be affected, the name, the company’s
reputation. Maybe you will loss a valued customer. It’s harsh but it is true. The mistake of
one, everybody will be suffering. You can’t hide that mistake, if you do so, you are not a
good example for your company and what you are doing also a crime and unethical
behavior.
5. The Ethics Resource Center identified five characteristics of a successful ethics program.
Suggest a sixth characteristic, and defend your choice.
I would suggest the characteristic of being “Respectful”. Because without Respect to
each other there will be no unity in the work.
6. Identify three CSR goals that would be appropriate for a large, multinational IT
consulting firm. Create three such goals for a small, local IT consulting firm.
This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00
https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
3
Case # 3
1. Must businesses choose between good ethics and financial benefits? Explain your answer
using Schrage’s scenarios as examples.
A company is developing a customer is developing a customer relationship management
(CRM) system, and the staff is working very hard to meet the deadline. The company
plans to outscore the maintenance and support of the CRM system once it is developed,
meaning that there is a good chance that two-thirds of the IT staff will be laid off. They
would consider deliberately withholding important information from their boss if they
knew that is disclosure would provoke his or her immediate counterproductive
intervention in an important project. Business involves competing values, and trade-offs
must be made to keep business operations from becoming paralyzed.
2. Discuss the possible short-term losses and long-term gains in implementing ethical
solutions for each of Schrage’s scenarios.
Schrage gave a few scenarios. For example, a company is developing a customer
relationship management (CRM) system, and the staff is working very hard to meet the
deadline. The company plans to outsource the maintenance and support of the CRM once
the system is developed. There is good chance that two-thirds of the IT-staff will be laid
off. Would you disclose this information? Schrage answered, “I don't think so."
This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00
https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
4
Addressing the second scenario, Dewey suggested that not giving the boss important
information could be a backfire on the employee. "What if your boss finds out the truth?"
What if you were wrong and the boss could have helped? Once your boss knows that you
lied once, will he believe you the next time?"
Chapter 2
Self-Assessment questions
1. D
2. IT
3. Stop unauthorized copyright of software produced by its members
4. True
5. Fraud
6. Compliance
7. D
8. Internal audit
9. B
10. True
11. Negligence
12. Code of ethics
Discussion Questions
This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00
https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
5
3. You are caught in the middle of a dilemma. You have been subpoenaed to be a witness in
a work-related sexual harassment case involving your boss and a coworker. On many
occasions, you heard your boss make statements to this employee that could be
interpreted as sexual advancements. Your boss has made it clear that he will make things
difficult for you at work if you testify in favor of the employee. You could choose to
testify in a manner that would make it appear that your boss was not serious and that the
employee was overreacting. On the other hand, it was clear to you that your boss was not
joking with the employee and that he was harassing her. What kind of repercussions
could there be if you testify in favor of your coworker? Would you be willing to risk
those repercussions? Does it really matter if the case is dismissed because of your
testimony?
A lot repercussion could for testify on the behalf of the co-worker against your boss by
him giving you more on your workload, deny requested days off even if you give him or
her the proper timeframe to request or worst being fired and being in Michigan which no
cause state it could be easy to do so. I would really take in consideration if that was my
wife or my daughter or even myself if it was happening to me and I wouldn’t anyone to
feel uncomfortable in a work environment, but either way I would have to tell the truth
because if lie to save my boss it chance that someone else could try come forward and
have proof that I was their when it happen and we can both be fired.
4. Under the Foreign Corrupt Practices Act, under what conditions is a bribe not unlawful?
Explain, and provide an example.
Payments to foreign officials may be legal under the FCPA if the payments are permitted
under the written laws of the host country which could constitute a bribe not being
unlawful. Examples would be Items of nominal value, such as cab fare, reasonable meals
and entertainment expenses, or company promotional items, are unlikely to improperly
influence a government official
Case # 2
1. Present a strong argument that the state of Indiana is entitled to reimbursement of all
funds paid to IBM as well as reimbursement of all overtime employees were paid due to
fixing problems associated with the new system. Now present a strong argument that
IBM should be allowed to keep all funds it has received so far for this new system.
If I was IBM I would just cut my loses and move on from the State of Indiana for the
simple fact that with so many changes with state and federal laws as well in the computer
world they would still be fighting a losing battle trying to keep up with constant changes
with the system and keeping them in compliance with state and federal guidelines. The
State of Indiana was entitled the full reimbursement for all the funds paid to IBM as well
as reimbursement of all overtime employees due to contract that entered with them 2006
and IBM clearly breach the contract cause didn’t they meet the terms of the contract and
they have the legal right to ask for reimbursement. IBM should be allowed to keep all
funds it received so far for their new system because even though they breached the
contract it seemed that state chose to treat the contract as being in effect and sue for
damages they opted out from discharging IBM and future performance and since they
This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00
https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
6
continued and state used their technology to make hybrid system they should
compensated for their contribution.
Case # 3
Discussion Questions:
1. How can organizations and vendors change their certification programs to test for skills
as well as core knowledge? What issues might this introduce?
Organizations and vendors must produce a better training for employees to develop their
skills and core knowledge in implementing better solutions if they encountered some
problems in the company, some issues regarding of changing their certification programs
will occur in the state of time consume and short comings.
2. What are the primary arguments against certification, and how can certifying bodies
change their programs to overcome these shortcomings?
IT workers argued that testable IT knowledge does not necessarily translate into quality
IT work. To overcome these shortcomings, SAP has built alliances with some900
universities around the globe to deliver training and certify additional resources and while
there is no universal call for certification examination procedures that answers all needs
within the IT progression, certifying bodies are beginning to adapt their programs to
better fulfill the evolving needs for certification IT.
3. What are the benefits of certification? How might certification programs need to change
in the future to better serve the needs of the IT community?
Employers use certification as a hiring gate for entry-level positions and for jobs that
require specific core knowledge. In addition, employers use certification as a means of
training employees and increasing skill levels within the company. Certification programs
need to change in the future to better serve the needs of the IT community like changing
IT certification examination. Other organizations are catching on. Sun Microsystem
requires the completion of programming or design assignments for some of its
certification.
Chapter 3
Discussion Questions:
1. A successful distributed denial-of-service attack requires the downloading of software
that turns unprotected computers into zombies under the control of the malicious hacker.
Should the owners of the zombie computers be fined or otherwise punished as a means of
encouraging people to better safeguard their computers? Why or why not?
When it comes to distrusted denial of service attack and it being successful which causes
a person computer become a botnet which are controlled by the hackers from one or more
location without the consent or knowledge form it owner by turning their computers into
zombies. I feel the owners of the computer shouldn’t be fined because most they have no
knowledge it’s even going on, but I do think they computers should be locked and
remained locked until they get it fixed and gain knowledge on what not to do avoid this
happen to them again.
This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00
https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
7
2. Some IT security personnel believe that their organizations should employ former
computer criminals to identify weaknesses in their organizations’ security defenses. Do
you agree? Why or why not?
I believe you should employ some of these cyber criminals for your organization to
identify weaknesses in their organization security defenses cause depending on the nature
of their crime it could beneficial to everyone to have a person or persons with that type of
knowledge could help strengthen your team as well as educate your employees on things
that may been negligent to combat against it happen again.
3. What is the difference between industrial spying and the gathering of competitive
intelligence? Is the use of competitive intelligence ethical or unethical? Why?
The difference between industrial spying and the gathering of competitive intelligence is
simply industrial espionage involves using illegal mean to obtain information that not
available to the public and doing so by wiretapping bugs conference room, etc. Gathering
of competitive intelligence is using gathering information from financial reports, trade
journals, and other public records.
4. How would you distinguish between a hacktivist and a cyberterrorist? Should the use of
hacktivists by a country against enemy organizations be considered an act of war? Why
or why not? How about the use of cyberterrorists?
When it comes to how distinguish between and hacktivist and cyberterrorist their
isn’t a clear cut difference between the two me except to in the case of hacktivist they are
usually trying to bring social awareness or achieve political goal, but cyberterrorist they
are more extreme with the intent to cause harm rather just gathering information and they
use techniques to destroy or disrupt services. Now when it comes to if act of war is the
intent they are trying to achieve to achieve against the country corporation they are
against.
Case # 1
This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00
https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
8
Akamai saw DDoS attacks more than double in frequency and increase in duration by
nearly 20%. We've continued to analyze millions of web application attack triggers to
give you the most common vectors along with two additional new vectors: Shellshock
and cross-site scripting (XSS).
Case # 3
1. What role did computer forensics play in the high-profile cases of the New York subway
bomber and the San Francisco Bay oil spill?
Most important, the Bureau of Labor Statistics reported that job competition in this area
is keen. With high-profile cases such as the New York subway bomber and television
shows romanticizing the role of computer forensics investigators, it’s no wonder people
are flocking to the field. Yet even if computer forensics isn’t as powerful or glamorous as
it appears on TV, the field is becoming more critical to criminal investigation, and
increasing expertise will be required as cybercriminals develop more sophisticated means
of attack.
2. Why might computer forensics be more effective at preventing crimes than other forms of
criminal investigation?
For computer forensics to progress, the law must keep pace with technological
advancements. Clear and consistent legal procedures regarding computer system searches
must be developed so that police and investigators can be properly trained. An
International Code of Ethics for Cyber Crime and Cyber Terrorism should also be
established to develop protocols for “obtaining and preserving evidence, maintaining the
chain of custody of that evidence across borders,” and “clear[ing] up any difference in
language issues.” Following these measures may be the first steps to resolving the
technological and legal limitations afflicting computer forensics. Interpol, the
International Criminal Police Organization, has developed a Computer Crime Manual
with “training courses” and “a rapid information exchange system” that serves as a
foundation for international cooperation (8). Lastly, the criminal abuse of technology can
be limited by equipping the police department with state-of-the-art training and
equipment for forensic analysis. Only then is the world safely prepared to face the future
of technology. As one author predicts, “the next world war will be fought with bits and
bytes, not bullets and bombs”
This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00
https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
9
This study source was downloaded by 100000847375981 from CourseHero.com on 07-06-2022 03:07:45 GMT -05:00
https://www.coursehero.com/file/12301130/Paula-Betzabeth-Assignment-1-Week-1-Ethics-IT-BS/
Powered by TCPDF (www.tcpdf.org)