Explaining ethical or unethical actions

Assignment Help Computer Networking
Reference no: EM1368724

Henry Magruder made a mistake-he left a CD at the coffee station. Later, when Iris Majwubu was topping off her mug with fresh tea, hoping to wrap up her work on the current SQL code module before it was time to go home, she saw the unlabeled CD on the counter. Being the helpful sort, she picked it up, intending to return it to the person who'd left it behind.

Expecting to find perhaps the latest device drivers, or someone's work from the development team's office, Iris slipped the disk into the drive of her computer and ran a virus scan on its contents before opening the file explorer program. She had been correct in assuming the CD contained data files, and lots of them. She opened a file at random: names, addresses, and Social Security numbers appeared on her screen. These were not the test records she expected; they looked more like critical payroll data. Concerned, she found a readme.txt file
and opened it. It read:

Jill, see files on this disc. Hope they meet your expectations. Wire money to account as arranged. Rest of data sent on payment. Iris realized that someone was selling sensitive company data to an outside information broker. She looked back at the directory listing and saw that the files spanned the range of 89 © Cengage Learning. All rights reserved. No distribution allowed without express authorization. every department at Sequential Label and Supply-everything from customer lists to shipping invoices. She saw one file that appeared to contain the credit card numbers of every Web customer the company supplied. She opened another file and saw that it only contained about half of the relevant data. Whoever did this had split the data into two parts. That made sense: payment on delivery of the first half. Now, who did this belong to? She opened up the file properties option on the readme.txt file. The file owner was listed as "hmagruder." That must be Henry Magruder, the developer two cubes over in the next aisle. Iris pondered her next action.Case Exercises Iris called the company security hotline. The hotline was an anonymous way to report any suspicious activity or abuse of company policy, although Iris chose to identify herself. The next morning, she was called to a meeting with an investigator from corporate security, which led to more meetings with others in corporate security, and then finally a meeting with the director of human resources and Gladys Williams, the CIO of SLS.

Questions:

1. Why was Iris justified in determining who the owner of the CD was?

2. Should Iris have approached Henry directly, or was the hotline the most effective way to take action? Why do you think so?

3. Should Iris have placed the CD back at the coffee station and forgotten the whole thing? Explain why that action would have been ethical or unethical.

Reference no: EM1368724

Questions Cloud

Statement to assig nnew value to first element of array : Suppose that array of integers named a has been declared and initialized. Write single statement which assigns a new value to first element of the array.
Question about expected value : Outdoor Sports Corporation, with its main office in Iowa, is considering opening a branch office in Los Angeles. Under normal economic conditions, which have a 45 percent chance of occurring,
Write pseudocode of thread with and without semaphores : Assume we have two threads A and B A and B are to repeatedly print out ping and pong. Write down pseudocode of thread A and B How can this be solved with and without semaphores.
Calculate the current eps and pe ratio : Aero Company currently has net income of $3 million and 1. million common shares outstanding which sell for $20 per share. Aero has decided to issue new stock to raise $4,000,000 to expand its operations.
Explaining ethical or unethical actions : Should Iris have placed CD back at coffee station and forgotten entire thing? Describe why that action would have been ethical or unethical.
Conduct observation used in business or organization : Conduct the observation to someone involved in procedure which is used in a business or organization. This person could be someone at university, in small business in your neighborhood.
Abstract syntax for interpretation in haskell or prolog : State an abstract syntax of the while language appropriate for interpretation in either Haskell or Prolog. In Haskell, the definition must be the code of a few data types.
Adapting messages to audiences : How will you need to adapt your communication style and message to communicate effectively with this audience?
Management - supermarket and grocery market : Why is the layout of the supermarket so important to the overall delivery of the products and services provided and what recommendations would you make to the layout of the supermarket to make the layout more effective or efficient.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Why is it critical to label patch cables-ports and data jack

What do you consider the single most important reason to pay attention to faulty terminations and excessive horizontal wiring spans? Why is it critical to label patch cables, ports, and data jacks?

  Subnets diagram working lan depicting network subnets

Subnet classful Class C network into 2 subnets Diagram working LAN depicting two network subnets (can be in Word of Visio) Network should include

  Explain sliding window sizes seem very restrictive

Given today's networking technology; 3-bit and 7-bit sliding window sizes seem very restrictive. What would be a more reasonable size today? Describe your reasoning.

  Explaining social networking in knowledge management

Social Networking is one of the hottest topics in knowledge management. Is it knowledge management?

  Process by which ip addresses are assigned to computers

How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions."

  Explaining sliding window protocol with the window size

Terminal A is sending data to terminal B using a sliding window protocol with the window size equal to 5 and the maximum sequence number equal to 6.

  Research and recommend writing guide-forensics organization

Your manager has asked you to research and recommend a writing guide that examiners in your computer forensics organization will use for all official written reports.

  Basic requirements for data communications and networking

List some of the basic requirements for the data communications and networking required to support the business information needs? Discuss in scholarly detail. Your answer should be of 300 words.

  Write primary advantage of deterministic local area network

Write the primary advantage of a deterministic local area network protocol over a nondeterministic local area network protocol.Give a real-life example of this advantage.

  Design ip network based on requirements for company

XYZ is multi-billion company having 24 departments and each department consisting no more than 750 hosts. Design the IP network based on the requirements stated above.

  Explaining role of antennas in transmitting radio waves

Explain role of antennas in transmitting radio waves. What kind of antenna is typically used in wireless LAN?

  Analogous steps in dimensioning computer network

Write down the analogous steps in dimensioning a computer network?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd