Reference no: EM131310608
Assignment
During the global recession of 2008 and 2009, there were many accusations of unethical behavior by Wall Street executives, financial managers, and other corporate officers. At that time, an article appeared that suggested that part of the reason for such unethical business behavior may stem from the fact that cheating has become more prevalent among business students. The article reported that 86% of business students admitted to cheating at some time during their academic career as compared to 77% of non-business students.
Cheating has been a concern of the dean of the College of Business at RockyUniversity for several years. Some faculty members in the college believe that cheating is more widespread at Rocky than at other universities, while other faculty members think that cheating is not a major problem in the college. To resolve some of these issues, the dean commissioned a study to assess the current ethical behavior of business students at Rocky. As part of this study, an anonymous exit survey was administered to a sample of 90 business students from this year's graduating class. Responses to the following questions were used to obtain data regarding three types of cheating.
During your time at Rocky, did you ever present work copied off the Internet as your own? Yes/No
During your time at Rocky, did you ever copy answers off another student's exam? Yes/No
During your time at Rocky, did you ever collaborate with other students on projects that were supposed to be completed individually? Yes/No
Any student who answered yes to one or more of these questions was considered to have been involved in some type of cheating. The complete data set is in the file named Rocky.
Managerial Report
Prepare a report (see below) for the dean of the college that summarizes your assessment of the nature of cheating by business students at RockyUniversity. Be sure to include the following seven (7) items in your report.
1. To summarize the data, compute the proportion of all students, the proportion of all male students, and the proportion of all female students that presented
a. Work copied off the internet as their own
b. Copied answers off another student's exam
c. Collaborated with other students on projects that were supposed to be completed individually.
Then comment on your findings.
Evaluate mass transfer coefficient using correlation
: Develop a material balance model to predict the mole fraction of naphthalene vapor exiting the tube.- Based on your model and the data given in the problem statement, estimate kc.
|
Evaluate the impact of lateral segmentation in encouraging
: Evaluate the impact of lateral segmentation in encouraging marketing managers to look broadly at markets in order to identify previously overlooked opportunities.
|
Analyze the security features of linux
: Analyze the security features of Linux, Macintosh, and Windows operating systems, and decide which you believe is the most susceptible to hackers based on hacking techniques and attack vectors. Justify your response.
|
Predict concentration of fa in solution exiting tube
: Develop a material balance to predict the concentration of FA in the solution exiting the tube.- From this data, using your model, back out the molecular diffusion coefficient of FA in the solution.
|
Did you ever present work copied off internet as your own
: During your time at Rocky, did you ever present work copied off the Internet as your own? Yes/No. During your time at Rocky, did you ever copy answers off another student's exam? Yes/No
|
Discuss some of the considerations for responders
: Elaborate on and explain some of the delivery systems that can be used to deploy WMD. Provide some examples of WMD.Analyze and explain the counterterrorism tactics the United States can employ to evade the detonation of a WMD.Discuss some of the cons..
|
Traditional outsourcing with the software as a service
: Compare and contrast traditional outsourcing with the Software as a Service. Under what conditions do you think a company should choose SaaS over traditional outsourcing? Explain your views and discuss them with your peers.
|
Why are there so many versions of os
: As a system administrator who is responsible for your company's network, you understand that operating systems (OS) are various. Discuss the following queries: Why are there so many versions of OS
|
What action should gloria take involving john
: What action should Gloria take involving John? When preparing your responses, please use the facts provided in the You Decide and the following resources: (a) the assigned reading and (b) the Library.
|