Analyze the actions of the students from kantian perspective

Assignment Help Other Subject
Reference no: EM131248081

Hacking Into Harvard" Please respond to the following:

• Read Case 2.1: Hacking into Harvard, located here or on page 71 in your textbook. As applicants began to defend themselves against the penalties handed out by the business schools, they appealed to both consequentialist and nonconsequentialist criteria to support their actions. Some responded by pointing out that their intentions were never malicious, while others argued they did not think checking their application statuses would cause any real harm. Review the case study and analyze the actions of the students from a Kantian perspective. Consider whether the actions taken by the hackers were permissible according the standard of universal acceptability.

CASE 2.1

Hacking into Harvard

EVERYONE WHO HAS EVER APPLIED FOR ADMISSION to a selective college or who has been interviewed for a highly desired job knows the feeling of waiting impatiently to learn the result of one's application. So it's not hard to identify with those applicants to some of the nation's most prestigious MBA programs who thought they had a chance to get an early glimpse at whether their ambition was to be fulfilled. While visiting a Businessweek Online message board, they found instructions, posted by an anonymous hacker, explaining how to find out what admission decision the business schools had made in their case. Doing so wasn't hard. The universities in question-Harvard, Dartmouth, Duke, Carnegie Mellon, MIT, and Stanford-used the same application software from Apply Yourself, Inc. Essentially, all one had to do was change the very end of the applicant-specific URL to get to the supposedly restricted page containing the verdict on one's application. In the nine hours it took Apply Yourself programmers to patch the security flaw after it was posted, curiosity got the better of about two hundred applicants, who couldn't resist the temptation to discover whether they had been admitted.19

Some of them got only blank screens. But others learned that they had been tentatively accepted or tentatively rejected. What they didn't count on, however, were two things: first, that it wouldn't take the business schools long to learn what had happened and who had done it and, second, that the schools in question were going to be very unhappy about it. Harvard was perhaps the most outspoken. Kim B. Clark, dean of the business school, said, "This behavior is unethical at best-a serious breach of trust that cannot be countered by rationalization." In a similar vein, Steve Nelson, the executive director of Harvard's MBA program, stated, "Hacking into a system in this manner is unethical and also contrary to the behavior we expect of leaders we aspire to develop."

It didn't take Harvard long to make up its mind what to do about it. It rejected all 119 applicants who had attempted to access the information. In an official statement, Dean Clark wrote that the mission of the Harvard Business School "is to educate principled leaders who make a difference in the world. To achieve that, a person must have many skills and qualities, including the highest standards of integrity, sound judgment and a strong moral compass-an intuitive sense of what is right and wrong. Those who have hacked into this web site have failed to pass that test." Carnegie Mellon and MIT quickly followed suit. By rejecting the ethically challenged, said Richard L. Schmalensee, dean of MIT's Sloan School of Management, the schools are trying to "send a message to society as a whole that we are attempting to produce people that when they go out into the world, they will behave ethically."

Duke and Dartmouth, where only a handful of students gained access to their files, said they would take a case-by-case approach and didn't publicly announce their individualized determinations. But, given the competition for places in their MBA programs, it's a safe bet that few, if any, offending applicants were sitting in classrooms the following semester. Forty-two applicants attempted to learn their results early at Stanford, which took a different tack. It invited the accused hackers to explain themselves in writing. "In the best case, what has been demonstrated here is a lack of judgment; in the worst case, a lack of integrity," said Derrick Bolton, Stanford's director of MBA admissions. "One of the things we try to teach at business schools is making good decisions and taking responsibility for your actions." Six weeks later, however, the dean of Stanford Business School, Robert Joss, reported, "None of those who gained unauthorized access was able to explain his or her actions to our satisfaction." He added that he hoped the applicants "might learn from their experience."

Given the public's concern over the wave of corporate scandals in recent years and its growing interest in corporate social responsibility, business writers and other media commentators warmly welcomed Harvard's decisive response. But soon there was some sniping at the decision by those claiming that Harvard and the other business schools had overreacted. Although 70 percent of Harvard's MBA students approved the decision, the undergraduate student newspaper, The Crimson, was skeptical. "HBS [Harvard Business School] has scored a media victory with its hard-line stance," it said in an editorial. "Americans have been looking for a sign from the business community, particularly its leading educational institutions, that business ethics are a priority. HBS's false bravado has given them one, leaving 119 victims in angry hands."

As some critics pointed out, Harvard's stance overlooked the possibility that the hacker might have been a spouse or a parent who had access to the applicant's password and personal identification number. In fact, one applicant said that this had happened to him. His wife found the instructions at Businessweek Online and tried to check on the success of his application. "I'm really distraught over this," he said. "My wife is tearing her hair out." To this, Harvard's Dean Clark responds, "We expect applicants to be personally responsible for the access to the website, and for the identification and passwords they receive."

Critics also reject the idea that the offending applicants were "hackers." After all, they used their own personal identification and passwords to log on legitimately; all they did was to modify the URL to go to a different page. They couldn't change anything in their files or view anyone else's information. In fact, some critics blamed the business schools and Apply Yourself more than they did the applicants. If those pages were supposed to be restricted, then it shouldn't have been so easy to find one's way to them.

In an interview, one of the Harvard applicants said that although he now sees that what he did was wrong, he wasn't thinking about that at the time-he just followed the hacker's posted instructions out of curiosity. He didn't consider what he did to be "hacking," because any novice could have done the same thing. "I'm not an IT person by any stretch of the imagination," he said. "I'm not even a great typist." He wrote the university a letter of apology. "I admitted that I got curious and had a lapse in judgment," he said. "I pointed out that I wasn't trying to harm anyone and wasn't trying to get an advantage over anyone." Another applicant said that he knew he had made a poor judgment but he was offended by having his ethics called into question. "I had no idea that they would have considered this a big deal." And some of those posting messages at Businessweek Online and other MBA-related sites believe the offending applicants should be applauded. "Exploiting weaknesses is what good business is all about. Why would they ding you?" wrote one anonymous poster.

Dean Schmalensee of MIT, however, defends Harvard and MIT's automatically rejecting everyone who peeked "because it wasn't an impulsive mistake." "The instructions are reasonably elaborate," he said. "You didn't need a degree in computer science, but this clearly involved effort. You couldn't do this casually without knowing that you were doing something wrong. We 've always taken eth ics seriously, and this is a serious matter." To those applicants who say that they didn't do any harm, Schmalensee replies, "Is there nothing wrong with going through files just because you can?"

To him and others, seeking unauthorized access to restricted pages is as wrong as snooping through your boss's desk to see whether you've been recommended for a raise. Some commentators, however, suggest there may be a generation gap here. Students who grew up with the Internet, they say, tend to see it as wide-open territory and don't view this level of web snooping as indicating a character flaw.

Reference no: EM131248081

Questions Cloud

How has the program raised racial profiling issues : By Saturday, October 15, 2016, in a minimum of 250 words, post to the Discussion Area your response to the following:Research the New York stop and frisk program. What laws, statutes, or cases are the basis for the program?
Meant by the term digital divide : 1) What is meant by the term "Digital Divide" in relation to the Internet? Which groups of people are most negatively affected by the Digital Divide, and why? What are some of the consequences of the Digital Divide to both individuals and society?
Compares international and domestic terrorist events : Write a 750- to 1,200-word paper that compares international and domestic terrorist events. Justification showing how each terrorism event meets the allocated definition (international or domestic terrorism).
Who will you contact to assist in the investigation : When would you seek to interview Mr. Dume in relationship to this  investigation?
Analyze the actions of the students from kantian perspective : Review the case study and analyze the actions of the students from a Kantian perspective. Consider whether the actions taken by the hackers were permissible according the standard of universal acceptability.
Segmented packets are rearranged or reassembled : Do all packets arrive at their destination in the order in which they were segmented and transmitted? Why or why not? Describe how segmented packets are rearranged or reassembled at the packets' destination to ensure that received segmented packets ..
Ability to communicate effectively both verbally : Resources: "Presentation Fundamentals" with Tatiana Kolovou on Lynda.com, Instructions for Completing a Video Technology managers look for three critical fundamental skills from the IT professions hired today:
Analyze the opinion about the given case : There are two links below for Supreme Court case. The link from Cornell Law School provides you with full opinion and any concurring or dissenting opinions that the justices wrote. Analyze the opinion about the given case.
Engineer for a hospital group based in cincinnati : You are a security engineer for a hospital group based in Cincinnati, OH. Your group has just acquired a small hospital in Alba, IA. Currently, everything except insurance billing is done on paper forms.

Reviews

Write a Review

Other Subject Questions & Answers

  Apply the biology concepts of autoimmunity

Apply the biology concepts of autoimmunity and inflammatory response to understanding pathophysiological differences between rheumatoid arthritis, osteoarthritis, and gouty arthritis.

  Evaluating the quality of the news between the two venues

Watch a nightly news broadcast by a major network and then thirty minutes of a cable news show. Track the number of different stories, the subjects, and the time spent on them and compare the two shows to each other. Compose a short 300-word essay..

  What concerns would you have about anton''s eating habits

Anton grew up in France and has come to America for college. He lived with an French family during his freshman year, but then he moved into an apartment with two other students, all from different countries. They all study very hard and do not ..

  According to the research a number of critical factors are

according to the research a number of critical factors are important for a new ventures success and must be assessed

  A tax on an imported good is called a

A tax on an imported good is called a

  What is the pooled variance estimate

Marks: 2 A physical therapist is interested in whether people with different bone structures will be affected differently by her new therapy program. She randomly chooses two groups of patients based on bone type: small-boned frame (XS) and large-..

  What is the role of the victim in investigating crime?

What is the role of the victim in investigating crime?

  Favorable environment for the development of sociology

social and historical trends was instrumental in creating a favorable environment for the development of sociology.

  Detected the deception of the pseudopatients

In Rosenhan's study, the _____ detected the deception of the pseudopatients.

  Consumer adoption process the consumer decides

At which of the following stage of consumer adoption process the consumer decides whether to use the product or not?

  How does atomism account for things like soul

Atomism is often described as a form of materialism, that is, the theory that all things that are real must be physical or material. Being a materialist doctrine, how does Atomism account for things like soul

  Finding the interview room

Describe what one would find in an interview room. Why would these items be in that room? If there is another person in the room (officer witness), where should he or she sit?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd