Analyze the actions of the students from kantian perspective

Assignment Help Other Subject
Reference no: EM131248081

Hacking Into Harvard" Please respond to the following:

• Read Case 2.1: Hacking into Harvard, located here or on page 71 in your textbook. As applicants began to defend themselves against the penalties handed out by the business schools, they appealed to both consequentialist and nonconsequentialist criteria to support their actions. Some responded by pointing out that their intentions were never malicious, while others argued they did not think checking their application statuses would cause any real harm. Review the case study and analyze the actions of the students from a Kantian perspective. Consider whether the actions taken by the hackers were permissible according the standard of universal acceptability.

CASE 2.1

Hacking into Harvard

EVERYONE WHO HAS EVER APPLIED FOR ADMISSION to a selective college or who has been interviewed for a highly desired job knows the feeling of waiting impatiently to learn the result of one's application. So it's not hard to identify with those applicants to some of the nation's most prestigious MBA programs who thought they had a chance to get an early glimpse at whether their ambition was to be fulfilled. While visiting a Businessweek Online message board, they found instructions, posted by an anonymous hacker, explaining how to find out what admission decision the business schools had made in their case. Doing so wasn't hard. The universities in question-Harvard, Dartmouth, Duke, Carnegie Mellon, MIT, and Stanford-used the same application software from Apply Yourself, Inc. Essentially, all one had to do was change the very end of the applicant-specific URL to get to the supposedly restricted page containing the verdict on one's application. In the nine hours it took Apply Yourself programmers to patch the security flaw after it was posted, curiosity got the better of about two hundred applicants, who couldn't resist the temptation to discover whether they had been admitted.19

Some of them got only blank screens. But others learned that they had been tentatively accepted or tentatively rejected. What they didn't count on, however, were two things: first, that it wouldn't take the business schools long to learn what had happened and who had done it and, second, that the schools in question were going to be very unhappy about it. Harvard was perhaps the most outspoken. Kim B. Clark, dean of the business school, said, "This behavior is unethical at best-a serious breach of trust that cannot be countered by rationalization." In a similar vein, Steve Nelson, the executive director of Harvard's MBA program, stated, "Hacking into a system in this manner is unethical and also contrary to the behavior we expect of leaders we aspire to develop."

It didn't take Harvard long to make up its mind what to do about it. It rejected all 119 applicants who had attempted to access the information. In an official statement, Dean Clark wrote that the mission of the Harvard Business School "is to educate principled leaders who make a difference in the world. To achieve that, a person must have many skills and qualities, including the highest standards of integrity, sound judgment and a strong moral compass-an intuitive sense of what is right and wrong. Those who have hacked into this web site have failed to pass that test." Carnegie Mellon and MIT quickly followed suit. By rejecting the ethically challenged, said Richard L. Schmalensee, dean of MIT's Sloan School of Management, the schools are trying to "send a message to society as a whole that we are attempting to produce people that when they go out into the world, they will behave ethically."

Duke and Dartmouth, where only a handful of students gained access to their files, said they would take a case-by-case approach and didn't publicly announce their individualized determinations. But, given the competition for places in their MBA programs, it's a safe bet that few, if any, offending applicants were sitting in classrooms the following semester. Forty-two applicants attempted to learn their results early at Stanford, which took a different tack. It invited the accused hackers to explain themselves in writing. "In the best case, what has been demonstrated here is a lack of judgment; in the worst case, a lack of integrity," said Derrick Bolton, Stanford's director of MBA admissions. "One of the things we try to teach at business schools is making good decisions and taking responsibility for your actions." Six weeks later, however, the dean of Stanford Business School, Robert Joss, reported, "None of those who gained unauthorized access was able to explain his or her actions to our satisfaction." He added that he hoped the applicants "might learn from their experience."

Given the public's concern over the wave of corporate scandals in recent years and its growing interest in corporate social responsibility, business writers and other media commentators warmly welcomed Harvard's decisive response. But soon there was some sniping at the decision by those claiming that Harvard and the other business schools had overreacted. Although 70 percent of Harvard's MBA students approved the decision, the undergraduate student newspaper, The Crimson, was skeptical. "HBS [Harvard Business School] has scored a media victory with its hard-line stance," it said in an editorial. "Americans have been looking for a sign from the business community, particularly its leading educational institutions, that business ethics are a priority. HBS's false bravado has given them one, leaving 119 victims in angry hands."

As some critics pointed out, Harvard's stance overlooked the possibility that the hacker might have been a spouse or a parent who had access to the applicant's password and personal identification number. In fact, one applicant said that this had happened to him. His wife found the instructions at Businessweek Online and tried to check on the success of his application. "I'm really distraught over this," he said. "My wife is tearing her hair out." To this, Harvard's Dean Clark responds, "We expect applicants to be personally responsible for the access to the website, and for the identification and passwords they receive."

Critics also reject the idea that the offending applicants were "hackers." After all, they used their own personal identification and passwords to log on legitimately; all they did was to modify the URL to go to a different page. They couldn't change anything in their files or view anyone else's information. In fact, some critics blamed the business schools and Apply Yourself more than they did the applicants. If those pages were supposed to be restricted, then it shouldn't have been so easy to find one's way to them.

In an interview, one of the Harvard applicants said that although he now sees that what he did was wrong, he wasn't thinking about that at the time-he just followed the hacker's posted instructions out of curiosity. He didn't consider what he did to be "hacking," because any novice could have done the same thing. "I'm not an IT person by any stretch of the imagination," he said. "I'm not even a great typist." He wrote the university a letter of apology. "I admitted that I got curious and had a lapse in judgment," he said. "I pointed out that I wasn't trying to harm anyone and wasn't trying to get an advantage over anyone." Another applicant said that he knew he had made a poor judgment but he was offended by having his ethics called into question. "I had no idea that they would have considered this a big deal." And some of those posting messages at Businessweek Online and other MBA-related sites believe the offending applicants should be applauded. "Exploiting weaknesses is what good business is all about. Why would they ding you?" wrote one anonymous poster.

Dean Schmalensee of MIT, however, defends Harvard and MIT's automatically rejecting everyone who peeked "because it wasn't an impulsive mistake." "The instructions are reasonably elaborate," he said. "You didn't need a degree in computer science, but this clearly involved effort. You couldn't do this casually without knowing that you were doing something wrong. We 've always taken eth ics seriously, and this is a serious matter." To those applicants who say that they didn't do any harm, Schmalensee replies, "Is there nothing wrong with going through files just because you can?"

To him and others, seeking unauthorized access to restricted pages is as wrong as snooping through your boss's desk to see whether you've been recommended for a raise. Some commentators, however, suggest there may be a generation gap here. Students who grew up with the Internet, they say, tend to see it as wide-open territory and don't view this level of web snooping as indicating a character flaw.

Reference no: EM131248081

Questions Cloud

How has the program raised racial profiling issues : By Saturday, October 15, 2016, in a minimum of 250 words, post to the Discussion Area your response to the following:Research the New York stop and frisk program. What laws, statutes, or cases are the basis for the program?
Meant by the term digital divide : 1) What is meant by the term "Digital Divide" in relation to the Internet? Which groups of people are most negatively affected by the Digital Divide, and why? What are some of the consequences of the Digital Divide to both individuals and society?
Compares international and domestic terrorist events : Write a 750- to 1,200-word paper that compares international and domestic terrorist events. Justification showing how each terrorism event meets the allocated definition (international or domestic terrorism).
Who will you contact to assist in the investigation : When would you seek to interview Mr. Dume in relationship to this  investigation?
Analyze the actions of the students from kantian perspective : Review the case study and analyze the actions of the students from a Kantian perspective. Consider whether the actions taken by the hackers were permissible according the standard of universal acceptability.
Segmented packets are rearranged or reassembled : Do all packets arrive at their destination in the order in which they were segmented and transmitted? Why or why not? Describe how segmented packets are rearranged or reassembled at the packets' destination to ensure that received segmented packets ..
Ability to communicate effectively both verbally : Resources: "Presentation Fundamentals" with Tatiana Kolovou on Lynda.com, Instructions for Completing a Video Technology managers look for three critical fundamental skills from the IT professions hired today:
Analyze the opinion about the given case : There are two links below for Supreme Court case. The link from Cornell Law School provides you with full opinion and any concurring or dissenting opinions that the justices wrote. Analyze the opinion about the given case.
Engineer for a hospital group based in cincinnati : You are a security engineer for a hospital group based in Cincinnati, OH. Your group has just acquired a small hospital in Alba, IA. Currently, everything except insurance billing is done on paper forms.

Reviews

Write a Review

Other Subject Questions & Answers

  Was paul a christian

Was Paul a Christian? Research on whether 1 Thessalonians and Galatians prove or disprove the author's argument in her book that Paul was not a Christian.

  Interpretaton of a stratigraphy cross-section

Apply the scientific method to interpret geologic data/information in this exercise.  The student should review and the topics covered on rocks (igneous, sedimentary, and metamorphic rocks) and geologic time from your previous assignments

  Issues in case of Kelo vs. City

What were the main issues that the court dealt with in that case How did the court resolve the issue?

  Explain the role of the kinetoscope during the period of

explain the role of the kinetoscope during the period of cinemas invention. how did the kinetoscope modify the

  Multinational performance management context

Analyze the value of hard, soft, and contextual goals when assessing managerial performance, and determine which is the most essential to address within a multinational performance management context. Explain your rationale.

  Do you think the use of visual logos and imagery for artwork

Do you think the use of visual logos and imagery for artwork, at least, should be considered "fair use" under property law? What do you think?

  Election process for the house and the senate

1. Identify who makes up Congress and how many members. 2. Describe the election process for the House and the Senate.

  Calculate the crude odds ratio

The relationship between cigarette smoking and lung cancer was conducted in a case-control study with 700 cases and 425 controls. Using the results below, calculate the crude odds ratio and explain what the ratio means: Heavy Smoking—Cases: 450; Cont..

  State the problem clearly what are the ethical issues raise

State the problem clearly. What are the ethical issues raised

  Understanding and managing diabetes

I know nutrition is really important for me, but i don't really understand how diabetes work or how to manage it.

  Determine the heat transfer for the process

A vessel having a volume of 5 m^3 contains 0.05 m^3 of saturated liquid water and 4.95 m^3 of saturated water vapor at 0.1 MPa. Heat is transferred until the vessel is filled with saturated vapor. Determine the heat transfer for the process, Q?

  The national association for stock car auto racing

The National Association for Stock Car Auto Racing,Inc.(NASCAR), sanctions stock car races. NASCAR and Sprint Nextel Corp. agreed that Sprint would become the official series sponsor of the NASCAR NEXTEL Cup series in 2004.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd