A programmer at a bank realized

Assignment Help Management Information Sys
Reference no: EM13998109

Review each scenario below carefully.  Choose three and respond to them using the following statement, choosing the description you feel most appropriate:  I feel the actions of this individual were (very ethical / ethical / neither ethical nor unethical / unethical / very unethical).  Then, justify your response.

Scenario 1: 
A programmer at a bank realized that he had accidentally overdrawn his checking account.  He made a small adjustment in the bank's accounting system so that his account would not have the additional service charge assessed.  As soon as he deposited funds that made his balance positive again, he corrected the bank's accounting system. 
The programmer's modification of the accounting system was:

Scenario 2:
A student at a university found out that one of the local computer bulletin boards contained a "pirate" section (a section containing a collection of illegally copied software programs). He subscribed to the board, and proceeded to download several games and professional programs, which he then distributed to several of his friends.
The student's actions in downloading the games were:
The student's actions in downloading the programs were:
The student's actions in sharing the programs and games with his friends were:

Scenario 3:
An engineer needed a program to perform a series of complicated calculations. He found a computer programmer capable of writing the program, but would only hire the programmer if he agreed to share any liability that may result from an error in the engineer's calculations. The programmer said he would be willing to assume any liability due to a malfunction of the program, but was unwilling to share any liability due to an error in the engineer's calculations.
The programmer's position in this situation is:
The engineer's position in this situation is:

Reference no: EM13998109

Questions Cloud

Designers can develop the ability to know : In Security Engineering, it's quite common for designers to secure the wrong things. How do you think that system designers can develop the ability to know what the right thing is?
What is the half-life of the radium nuclei : A sample is being analyzed 5800 years after undergoing an alpha decay process. As the technician is analyzing, he observes the sample contains only 8.5% of the radium nuclei it initially contained. What is the half-life of the radium nuclei?
How can managers promote sound leadership : How can managers promote sound leadership practices and good ethical behavior?  Why are they important and how do you promote an environment where they thrive?
Calculate number of collisions per second for a given atom : In a sample of Ar gas at 24 oC and 5.00 bar, calculate the number of collisions per second for a given atom. The diameter of an atom of Ar is 194 pm.
A programmer at a bank realized : A programmer at a bank realized that he had accidentally overdrawn his checking account.  He made a small adjustment in the bank's accounting system so that his account would not have the additional service charge assessed.  As soon as he deposited f..
Determine the best e-mail policy for an organization : Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.
What is the efficiency of the cycle : From A to B, the pressure increases from 1 atmosphere to PB=3.06 atmospheres and the process is adiabatic; from B to C, it is isobaric with 335.16 kJ of energy entering the system by heat. From C to D, the process is isothermal; from D to A, it is..
When choosing a store or business : When choosing a store or business, select a medium or large operation as it will be easier to complete the assignment. Look at the information the store or business uses in their daily business operations and identity four (4) key security risks to t..
Computer security is not an issue for organizations alone : Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Building a relational database for inventory management

Building a Relational Database for Inventory Management

  Parts of the frame for analysis

Parts of the FRAME for analysis of IS are Purpose, Boundary, Environment

  Common mistakes to avoid as a systems analystwhat common

common mistakes to avoid as a systems analystwhat common errors does a new systems analyst often make when analyzing a

  List the best practices you intend to use

You have gained confidence in the CISO and board of directors, and they've identified additional funding that may be applied towards security. List the best practices you intend to use

  Why is supply chain importantshort two-paragraphs on the

why is supply chain important?short two-paragraphs on the importance of the supply chain. discusses how companies are

  Organizational management in the modern context

Organizational Management in the modern context - History of Management

  Identifies the purpose of the project

Draft a 1-2 page (350 words per page) executive summary that states that identifies the areas of the business to be improved, identifies the purpose of the project, and lists stakeholders associated with the project

  Database management identify organizations and describe the

database management identify organizations and describe the purpose of each.explore the web and identify professional

  Ordering and holding costs associated with the director of

ordering and holding costs associated with the director of purchasings policiescalculate the eoqels for the following

  If you were a cio of wm - what could you have done

sap software a complete failure lawsuit claimswaste management claims sap showed it fake mock-up simulations of

  Define broadband and baseband transmission technology

In 10 or more pages, address the following topics (be sure to use diagrams as well as references).  1) Define broadband and baseband transmission technology.

  Show the process flow structures appropriate

What process flow structures are prevalent in a hospital organization - Are the process flow structures appropriate?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd