Analyse the case study using the doing ethics technique

Assignment Help Business Law and Ethics
Reference no: EM131384746

PART 1: DOING ETHICS TECHNIQUE AND ETHICAL THEORY QUESTIONS

Part 1 - Question 1 - Doing Ethics Technique

This session we have restricted the cases to the following three (3). One of these will appear in the exam. We encourage you to prepare all three.

i. A small software company is working on an integrated inventory control system for a very large national shoe manufacturer. The system will gather sales information daily from shoe stores nationwide. This information will be used by the accounting, shipping, and ordering departments to control all of the functions of this large corporation. The inventory functions are critical to the smooth operation of the system. Jane, a quality assurance engineer with the software company, suspects that the inventory functions of the system are not sufficiently tested, although they have passed all their contracted tests. She is pressured by her employers to sign off on the software. Legally she is only required to perform those tests which have been agreed to in the original contract. However, her considerable experience in software testing has led her to be concerned over risks of the system. Her employers say that they will go out of business if they do not deliver the software on time. Jane contends if the Inventory sub-system fails, it will significantly harm their client and its employees. If the potential failure were to threaten lives, it would be clear to Jane that she should refuse to sign off. But since the degree of threatened harm is less, Jane is faced with a difficult moral decision.

ii. Company X has just signed a business agreement with Company Y, which entitles both of them to access each other clients' records. Mr. Faisal, a software programmer at Company Z, was assigned the task of developing a software program that handles the access and retrieval of records from each Company's database system into the other. A first run of the software on real data indicated that the work was well within the state of the art, and no difficulties were found or anticipated. Several weeks later and during a normal test on the software developed, Faisal discovered a serious 'security hole' in the database system of Company Y by which hackers can easily obtain confidential information about clients. He was convinced that while the software he developed could correctly accomplish the task, the code in

Company Y's database system could not be trusted as the security hole posed a threat even on Company X's database system. Faisal told his manager about the problem and explained its significance. The manager's response was, "That's not our problem; let's just be sure that our software functions properly." Faisal is not sure what to do. Refusing to work on the project means disobeying his manager's orders. Continuing to work on the project, means disobeying one of God's commands, this requires him to be truthful and sincere in his dealings.

iii. Andrew, a highly qualified and experienced software developer, has just started work with a government health department on a project that has been underway for about 9 months. He is replacing a novice developer who has decided to move on to a new project with another organisation. Even though the current system is incomplete, it has is being used with 'live' data. On analysing what's been done so far, Andrew discovers that the system is poorly designed and is riddled with bugs due to the former developer's lack of expertise, and that the choice of technologies are incompatible with the department's infrastructure, leading to corruptions and loss of financial data on a daily basis. In fact, much of Andrew's time is initially spent unsuccessfully attempting to recover corrupted data. His vast experience leads him to the conclusion that the system is so unstable that it will eventually corrupt beyond repair and that all its data will become unrecoverable. He therefore advises the supervisor of his findings and recommends that the system be redeveloped using appropriate technologies and quality control measures. He indicates that the entire redevelopment effort will take less than 6 weeks. The supervisor rejects Andrew's recommendation, stating that their IT Department will not agree to a change in technology, and directs Andrew to complete the project using the existing technologies. What should Andrew do?

Reference: Australian Computer Society (2014). ACS Code of Ethics Case Studies & Related Clauses to the Code of Conduct

Part 1 - Question 1 - Doing Ethics Technique

Analyse the above case study using the Doing Ethics Technique.

Part 1 - Question 2 - Ethical Theory question

Some years we ask that students use two specified theories, other years four. It is always from the following short list: utilitarianism, deontology, virtue and contract.

Part 2 - Short Answer Questions

These will be four questions covering anything in the syllabus. In every topic that had review questions from the text we encouraged students to do them; exam questions in this section are frequently based on them.

PART 3: ESSAY

This session we have restricted the essay topics to the following three (3). One of these will appear in the exam. We encourage you to prepare all three.

i. Over the years a number of systems have been developed which record coded information across a range of factors about disabilities in ethnic communities. A new coding convention has been developed to rationalise the inconsistent coding conventions of these legacy systems. The new coding convention uses codes which had different meanings in the legacy systems. This means that time series analysis gives inconsistent results, particularly showing both under and over reporting of numbers of particular disability categories. This is significant when making policies for people based on the size of the communities. To fix this would take a lot of work and expense, and management has decreed that historical systems will not be fixed, but new systems will all adopt the new coding convention.

ii. Through the use of currently available online tools and search facilities, ordinary users can easily acquire personal information about others. In fact, anyone who has Internet access can, via a search engine such as Google, find information about us that we ourselves might have had no idea is publicly available there. Does this use of online tools threaten the privacy of ordinary people?

iii. Professions Australia has recognised the members of the Australian Computer Society (ACS) as 'professionals'. What special responsibilities does that imply for ACS members? In your answer you need to distinguish between someone who is a practitioner but not a professional.

Verified Expert

The paper is in relation to the Professional Ethics to a member of the Australian Computer Society. Case laws on the ethical behavior has been examined and answered. The validity of the privacy on internet access has been examined and the special responsibilities of a member of ACS has been pointed.

Reference no: EM131384746

Questions Cloud

What are the possible methods of resolving such issues : What are the possible methods of resolving such issues? Does the employer carry workers' compensation in the event of an injury, illness, or death? What workers' compensation laws is the employer subject to in your state?
Explain what you discovered about contingency planning : Discuss what you discovered about contingency planning. Discuss how creativity and critical thinking relate to contingency planning. Explain how you might integrate creativity into your own planning process.
Discuss the implications of possible solutions for project : You are a consultant in a hospice facility for adult patients who come from diverse ethnic and cultural backgrounds. The administration has two concerns. First, there have been many patient complaints filed indicating that the staff is abusive, bo..
Analyze a case study scenario and apply the concepts : You will read a case scenario related to business ethics. In completing the assignment, you will analyze a case study scenario and apply the concepts by answering a series of required elements.
Analyse the case study using the doing ethics technique : Analyse the case study using the Doing Ethics Technique. Some years we ask that students use two specified theories, other years four. It is always from the following short list: utilitarianism, deontology, virtue and contract
Construct a risk adjusted cumulative sum chart : Construct a risk-adjusted cumulative sum chart for patient mortality to determine if there has been an improvement. (Use the odds ratio under the alternative hypothesis to be Ra = 0.6.)
Discuss the effects of your own enculturation or group : State your position on the topic you selected for Assignment.Identify (3) three premises (reasons) from the Procon.org website that support your position and explain why you selected these specific reasons. Explain your answers to the "believing" ..
Construct a risk adjusted cumulative sum chart : Construct a risk-adjusted cumulative sum chart for patient mortality to determine if there has been an improvement.
Write an essay that conforms to the requirements below : you will demonstrate what you have learned by writing an essay in which you.Present a revised formulation of the ethical question and introduction to the topic.Explain the kind of reasoning you think is the best way to approach this question, and h..

Reviews

inf1384746

6/29/2017 4:12:03 AM

A debt of gratitude is in order for setting up the task in understanding to the necessities, Furthermore, the references have been included guaranteeing that the fitting sources are utilized and the same have been appropriately in-messaged. I have guaranteed the persistent connection to the subject of the task to guarantee premium quality.

len1384746

2/7/2017 12:17:54 AM

As a teaching panel we have decided to narrow the range of things that students need to focus on. From our point of view this approach to exam preparation ensures that students engage deeply with the subject matter, by having the motivation to explore particular cases and in great depth. From your point of view it should give you greater peace of mind going into the exam, because if you have prepared good answers to each of these restricted questions, then you can be sure to not only pass, but in all likelihood do well. However, we do put a caveat on this approach. That is, we will not give any students assistance with the particular cases and question examples listed here. For example, should a student come to one of us for help in applying the DET to a case study, we will gladly do so, except that we will not do so for any of the three cases listed here.

Write a Review

Business Law and Ethics Questions & Answers

  How might other approaches overcome this difficulty

Describe the literal approach to contractualinterpretation and explain how it may cause problems. Provide an example toillustrate your point. How might other approaches overcome this difficulty?Describe and explain them in the business context.

  Cyber law and internet law

The director of your department has requested that you conduct some research on the topic of cyber law or Internet law. He has asked you to draft a memo including the following information: Research, identify, and discuss at least 2 emerging trends o..

  Identify the applicable statute number and subpart

State whether each of the following contracts must be in writing under Ohio law and identify the applicable statute number and subpart:a. A contract with a celebrity to be featured in a 2 year marketing campaign

  Provide a 100- to 200-word summary in which you provide an

there are seven forms of business sole proprietorship partnership limited liability partnership limited liability

  Do you think sil has a chance of succeeding in legal battle

Do you think SIL has a chance of succeeding in a legal battle? Why or why not? Defend your views with special reference to legal and judicial authorities

  Discuss the legal ramifications of the division of home

Discuss the legal ramifications of the division of home

  Identify the two primary categories of law

Identify the two primary categories of law: the common and civil law systems. Focusing on the common and civil law world systems, use the library, Internet, and any other materials at your disposal to conduct a comparison and contrast of these two..

  Describing the misconduct discovered on the ethical systems

In 2010, North Carolina's state crime lab was cited for legal and ethical violations. Prepare a presentation describing the misconduct discovered there and relate these incidents to the ethical systems we have learned about in this course

  Some experts argue that people have been punished as an

some experts argue that people have been punished as an attempt to change conduct and deter crimes for thousands of

  Your security team has been tasked with conducting a threat

present the following scenarioyour security team has been tasked with conducting a threat and vulnerability assessment

  Describing the demise of enron corporation and worldcom

Write a paper of no more than 1,000 words, describing the demise of Enron Corporation and WorldCom, Identify major factors that led to the dissolution of Enron Corporation and WorldCom

  Analyze the legal issues of e business

Locate an article specifically related to e-business and intellectual property. Write a review of the article. Your review should assess the different types of and legal protections for intellectual property. Analyze the legal issues of e-business to..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd