A programmer at a bank realized

Assignment Help Management Information Sys
Reference no: EM13998109

Review each scenario below carefully.  Choose three and respond to them using the following statement, choosing the description you feel most appropriate:  I feel the actions of this individual were (very ethical / ethical / neither ethical nor unethical / unethical / very unethical).  Then, justify your response.

Scenario 1: 
A programmer at a bank realized that he had accidentally overdrawn his checking account.  He made a small adjustment in the bank's accounting system so that his account would not have the additional service charge assessed.  As soon as he deposited funds that made his balance positive again, he corrected the bank's accounting system. 
The programmer's modification of the accounting system was:

Scenario 2:
A student at a university found out that one of the local computer bulletin boards contained a "pirate" section (a section containing a collection of illegally copied software programs). He subscribed to the board, and proceeded to download several games and professional programs, which he then distributed to several of his friends.
The student's actions in downloading the games were:
The student's actions in downloading the programs were:
The student's actions in sharing the programs and games with his friends were:

Scenario 3:
An engineer needed a program to perform a series of complicated calculations. He found a computer programmer capable of writing the program, but would only hire the programmer if he agreed to share any liability that may result from an error in the engineer's calculations. The programmer said he would be willing to assume any liability due to a malfunction of the program, but was unwilling to share any liability due to an error in the engineer's calculations.
The programmer's position in this situation is:
The engineer's position in this situation is:

Reference no: EM13998109

Questions Cloud

Designers can develop the ability to know : In Security Engineering, it's quite common for designers to secure the wrong things. How do you think that system designers can develop the ability to know what the right thing is?
What is the half-life of the radium nuclei : A sample is being analyzed 5800 years after undergoing an alpha decay process. As the technician is analyzing, he observes the sample contains only 8.5% of the radium nuclei it initially contained. What is the half-life of the radium nuclei?
How can managers promote sound leadership : How can managers promote sound leadership practices and good ethical behavior?  Why are they important and how do you promote an environment where they thrive?
Calculate number of collisions per second for a given atom : In a sample of Ar gas at 24 oC and 5.00 bar, calculate the number of collisions per second for a given atom. The diameter of an atom of Ar is 194 pm.
A programmer at a bank realized : A programmer at a bank realized that he had accidentally overdrawn his checking account.  He made a small adjustment in the bank's accounting system so that his account would not have the additional service charge assessed.  As soon as he deposited f..
Determine the best e-mail policy for an organization : Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.
What is the efficiency of the cycle : From A to B, the pressure increases from 1 atmosphere to PB=3.06 atmospheres and the process is adiabatic; from B to C, it is isobaric with 335.16 kJ of energy entering the system by heat. From C to D, the process is isothermal; from D to A, it is..
When choosing a store or business : When choosing a store or business, select a medium or large operation as it will be easier to complete the assignment. Look at the information the store or business uses in their daily business operations and identity four (4) key security risks to t..
Computer security is not an issue for organizations alone : Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of..

Reviews

Write a Review

Management Information Sys Questions & Answers

  E-commerce offers the promise of conducting business

E-Commerce offers the promise of conducting business on the Internet, via Web-enabled applications. This allows organizations to sell and deliver products and services to customers remotely via the Internet. However, there are security concerns, for ..

  Good and evil on the rails invites debate about the

good and evil on the rails invites debate about the benefits and costs of regulation. after a train crash in california

  Create schematic that represents main elements of it project

Create a schematic that represents the main elements of the IT project below: Implement an online workflow system for use by all departments in the organization to enable routing and approval of controls to replace existing paper based systems, su..

  How would harley-davidson''s business be affected

How would Harley-Davidson's business be affected if it decided to sell accessories directly to its online customers? Include a brief discussion of ethics involved with this decision

  Write a paper on the advantages of the inventory models

Write a 300 to 500 word paper on the advantages and disadvantages of the three different inventory models known as EOQ (economic order quantity).

  Knowledge management amp dynamic managementthe learning

knowledge management amp dynamic managementthe learning organizations uses advance technologies and knowledge

  Federal communications commission

how it regulates or influences use and design of telecommunications data

  Gem infosys, a small software company

Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 ..

  Attackers are becoming more ingenious

Attackers are becoming more ingenious in their attack methods every day. A part of this evolving methodology is the physical aspect of security. Please respond to all of the following prompts:Q - Why are anti-social engineering and dumpster diving sa..

  Solution to information technology questionhow do you use

solution to information technology questionhow do you use information technology to hel track measure and adjust

  Methods for activity defining and activity sequencing

Describe methods for activity defining, activity sequencing, activity duration estimating, schedule development, and schedule control and Develop and apply Gantt Charts, CPM and PERT techniques to project management.

  Describe the main tasks performed by a web server

Describe the main task(s) performed by a Web server. Define the term "static Web page" and outline the disadvantages of building a Web site using such pages.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd