How far should you be willing to push the ethical

Assignment Help Computer Engineering
Reference no: EM1327128

Consider the following scenario: you are a field engineer for a software company that provides bespoke accounting programs. Your job entails visiting a customer when they report a problem that can not be replicated without the data they use. Many companies are not willing to transfer their financial information to another company so you must visit their site and work through the problem with their employees demonstrating the problem. As a software engineer in the field, you understand a great deal about taxation rules, accounting regulations, and so on. In tracking down the problem, you realize that the reason the customer has a problem is that they are trying to make your program (written with due respect for accounting standards) support their false accounting procedures. You are completely certain that what this company is doing is illegal. Their attitude while you are there makes you believe that this is a wilful act and not a misunderstanding on their part. There are a number of possible actions you can take, with various possible consequences:

* You might tell the customer that what they are doing is illegal and refuse to provide a fix for their software.
* You might tell the customer that you understand the problem but that you must consult with your colleagues before working on a fix.
* You might consult by phone with your management for advice.
* You might fix their software so that it does what they want.

In any of the first three cases, your company may react in a number of different ways:

* They might decide that they should not support illegal accounting practices and refuse to provide a fix.
* They might order you to provide a fix as requested.
* They might arrange for other programmers to provide a fix.

If you are ordered to provide a fix you might or might not be willing to comply with such a request.

1. How far should you be willing to push the ethical case that you should not be aiding and abetting tax fraud?

2. Would you personally and/or your company be criminally liable if you did?

3. What does due diligence require in this case?

4. In general, what responsibilities do computing professionals have in situations like this?

5. Is it enough to produce (as employees and as companies) what the client requests?

Reference no: EM1327128

Questions Cloud

Express the topic of "ownership of information" : give a code for information technologists with the topic of "ownership of information" designed to provide ethical guidelines in that area.
Difference between vertical and horizontal market software : give the difference between vertical and horizontal market software. Please explain/elaborate in detail.
What is the definition of a crm : What features does the Internet advertising survey recommend for online marketing campaigns.
How personal data can be an overwhelming task : If we are not able to protect our data, and data protection is left to the market, will data protection be possible only for the rich.
How far should you be willing to push the ethical : will you personally and/or your company be criminally liable if you did.
Explain why does the magnitude of price elasticity differ : Explain why does the magnitude of price elasticity differ in a and b above, although the same set of price-quantity combinations are used to compute the price elasticity of demand
Speculate and share the perspective on the factors : Speculate and share your perspective on the factors mobile application developers must consider before deciding to charge or offer free/ad-sponsored products? If you decide to go with ad-support, is this a first release choice or as an update.
How do they differ from the tools you use : What tools do you find most useful in managing projects
How agile processes adapt to embrace : Explain the difference between change control and version control.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Sha-256 and rc4

SHA-256 (with 256-bit output) is more resistant to the attacks based on birthday paradox than SHA-1. Key reuse is deadly for the stream ciphers such as RC4.

  Assume that the cross section of each strand

A regional telephone company has 10 million subscribers. Each of their telephones is connected to a central office by a copper twisted pair. The average length of these twisted pairs is 10 km. How much is the copper in the local loops worth.

  Computer forensics investigation

As a new computer forensics investigator and as a matter of the forensics policy and procedure, you will require to understand the procedures for processing incident scene for the digital and the logical evidence.

  Explain what fields may be used as keys and indexes

select an information system in a health care organization that uses a database. The application can be simple or complex, but it must utilize a database that is part of an overall system to collect, store, process, and disseminate information.

  Contemporary information technology

Explain a contemporary information technology issue for which our society’s moral guidelines appear to be nonexistent or unclear.

  What is an interface

What is an interface

  How to identify areas for improvement

plan a form that you would disseminate to your end user community that will aid in the assessment of a current system to identify areas for improvement.

  Create a compensation structure

Evaluates both approaches (job-based and person-based) and creates a compensation structure based on both approaches. In considering both approaches, what would the compensation structure look like for each position? Justify your recommendations w..

  Regarding level of order traversal

Write down a level order traversal that does every level of the binary tree before moving on to the next level. Starting with the root add the children nodes to list.

  Calculate and show the percentage of calories

Calculate and show the percentage of calories

  State diagram to the design process

Whodunit would like your company to design a system to help them categorize, sort, store, and otherwise manipulate the thousands of artifacts they collect using your well-known expertise in object-oriented analysis and plan . Additional informatio..

  Describing the structure

Suppose that a new type known as POINT has been described-- it is a structure consisting of the two fields, x and y, both of type double. Suppose two variables p1 and p2 of kind POINT have been declared.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd