Director of human resources

Assignment Help Basic Computer Science
Reference no: EM131106138

Assignment 1:

Scenario 1:

Sami Mohammad is a software developer working at XYZ corporation. He made a mistake by leaving a CD at the coffee station. Sometime later, Laila, a junior programmer, was topping off her mug with fresh tea at the same coffee station. She was hoping to wrap up her work on the current SQL code module before it was time to go home. She saw the unlabeled CD on the counter. Being the helpful sort, she picked it up, intending to return it to the person

who had left it behind. Expecting to find perhaps the latest device drivers, or someone's work from the development
team's office, Laila put the disk into the drive of her computer and ran a virus scan on its contents before opening the file explorer program. She had been correct in assuming the CD contained data files, and lots of them. She opened a file at random: names, addresses, and Social Security numbers appeared on her screen. These were not the test records she expected; they looked more like critical payroll data. Concerned, she found a readme.txt file

and opened it. It read:

"Jill, see files on this disc. Hope they meet your expectations. Wire money

to account as arranged. Rest of data sent on payment."

Laila realized that someone was selling sensitive company data to an outside information broker. She looked back at the directory listing and saw that the files spanned the range of everything from customer lists to shipping invoices. She saw one file that appeared to contain the credit card numbers of every Web customer the company supplied. She opened another file and saw that it only contained about half of the relevant data. Whoever did this had split the data into two parts. That made sense: payment on delivery of the first half.

Now, who did this belong to? She opened up the file properties option on the readme.txt file. The file owner was listed as "Mohammad" That must be Sami Mohammad, the developer, she thought. Laila pondered over her next action. She called the company security hotline. The hotline was an anonymous way to report any suspicious activity or abuse of company policy, although Laila chose to identify herself. The next morning, she was called to a meeting with an investigator from corporate security, which led to more meetings with others in corporate security, and then finally a meeting with the director of human resources and the CIO of XYZ.

Questions:

1) Was Laila's action of reporting this justified or she should have left the CD back at the coffee table? Is it Ethical? Discuss and support your answer with respect to the four workable theories we have discussed.

2) What would be the legal issues that might be taken against Sami if he is found guilty?

Reference no: EM131106138

Questions Cloud

What is bond discount : Bond interest is shown as a current liability. Did we not pay our trustee, Flagstad Company, the full amount of interest due this period?
Determine segment of the holiday travel vehicles system : a. Develop a structure chart for this segment of the Holiday Travel Vehicles system. b. What type of structure chart have you drawn, a transaction structure or a transform structure? Why?
Manage the user expectations : 1. Identify the major points you would include in a communications plan at this point in the project. 2. What advice would you give your project team to help it manage the user expectations?
Find the following values using the equations : Find the following values using the equations and then a financial calculator. Compounding/discounting occurs annually. a. An initial $500 compounded for 1 year at 6% b. An initial $500 compounded for 2 years at 6% c. The present value of $500 due in..
Director of human resources : The next morning, she was called to a meeting with an investigator from corporate security, which led to more meetings with others in corporate security, and then finally a meeting with the director of human resources and the CIO of XYZ.
What is its present value and its future value : An investment will pay $100 at the end of each of the next 3 years, $200 at the end of Year 4, $300 at the end of Year 5, and $500 at the end of Year 6. If other investments of equal risk earn 8% annually, what is its present value? its future value?
What would its future value be : What's the future value of a 7%, 5-year ordinary annuity that pays $300 each year? If this was an annuity due, what would its future value be?
The effective or yield rate at date of issue : Assuming that a discount rate is needed to compute the carrying value of the obligations arising from a bond issue at any date during the life of the bonds, discuss the conceptual merit(s) of using for this purpose:
The small town credit union experiences : The Small town Credit Union experiences its greatest congestion on paydays from 11:30 A.M. until 1:00 P.M. During these rush periods, customers arrive according to a Poisson process at rate 2.1 per minute.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  World wide trading security-information classification

List and brief the following security policies in around 50 to 100 words each

  Stuxnet and covering tracks

Stuxnet and Covering Tracks

  Scripts to automate user and group maintenance

Need assistance and examples to start a report based upon the following information generated from any UNIX like interface, preferably Ubuntu or Cygwin. Need UNIX scripts for the following actions: (1) A script to automate the shutdown process and a ..

  Which of them is not a step that must occur in every loop

Which of the following is not a step that must occur in every loop?

  Write a mips program to complete the following functions

Write a MIPS program to complete the following functions. You must write comments and follow the register convention.

  Find the decryption exponent d

Encrypt the message m = 9876. Note that evaluating m3 with 32-bit arithmetic results in overflow.

  Evaluate the user dialog strategies used by a menu-driven

Write a four to five (4-5) page paper in which you:Evaluate the user dialog strategies used by a menu-driven interface.Determine why menu-driven interfaces continue to be popular in the modern computing age.

  Write general set of instructions will allow us to change

Write a general set of instructions that will allow us to change any displayed value (from 0 to 9) to any desired value (from 0 to 9) in the least number of steps. For example, if the displayed value is 1 and the desired value is 0,

  Faulty terminations and excessive horizontal wiring spans

What do you consider the single most important reason to pay attention to faulty terminations and excessive horizontal wiring spans?

  Convert the binary number into a hexadecimal number

Pick the amount from one of the checks in your checkbook. ($50.24)1) Convert the decimal number into a binary number with three places to the right of the binary point.2) Convert the binary number into a hexadecimal number.

  There are four conditions that are necessary

There are four conditions that are necessary for a deadlock to occur. Give an example to show that these conditions are not sufficient for a resource deadlock to occur. When are these conditions sufficient for a resource deadlock to occur? Explain..

  Compare and contrast the four levels of protection

Compare and contrast the four levels of protection used during spill response and cleanup activities. In your discussion, provide an example of a spill or cleanup scenario for each level

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd