Evaluation of a business code of ethics

Assignment Help Basic Computer Science
Reference no: EM13916810

Evaluation of a Business Code of Ethics

Instructions:

The purpose of this assignment is to assist you in refining problem-solving capabilities that organizations already possess for use in business ethics applications. This paper uses a structured, objective format sometimes called a system of inquiry. This assignment is a systematic formalized inquiry into, or examination of, the code of ethics of an organization and its effects to achieve a specific level of ethical behavior in employees, management, and executives. Each business should have a framework for ensuring ethical behavior. The structure, format, and scope of codes vary depending on the company's business. An oil company's code, for example, would probably have different criteria and emphases than a health care provider's code of ethics. Sometimes, codes of ethics are called by other names, such as an employee code of conduct. A code of ethics, though, should be differentiated from standard good operating practices. Evaluation and analysis includes problem solving and behavior in assessing organizational ethics along with decision-making processes. In this case, you are evaluating your own company's code of ethics, or that of another company if your employer does not have a code of ethics.

Write a 1,200- to 1,400-word paper, one not using question-and-answer format, discussing your organization's code of ethics in detail. Perform the following steps:

  • Obtain a copy of your employer's code of ethics or find an example on the Internet from a major corporation, such as Shell Oil Company's Statement of Ethics. This is the document upon which to base your inquiry.
  • Write a general information paragraph on the company, including its mission statement.
  • Determine the type of ethical system used by the firm and reasons or examples upon which you based your decisions. Ethical systems

include ends-driven, relativistic, entitlement, and duty-driven (legal or religious) ethics.

  • Identify and discuss how the code of ethics is used. Include several paragraphs on each use: one for employees, one for management, one for the board of directors, and so forth. Some of this information comes from the company's code of ethics. Others may be available through an

Internet search. Consider the following:

  • Why it is used-the general or special circumstances
  • How it is used
  • When it is used

Note. You may not be able to find all the information. In that case, state this fact and indicate which sources were examined with no results.

  • Why might the organization need to modify their existing code of ethics? Consider how you might modify the code if you were the new CEO and how you would implement the changes.
  • What possible reactions to the code are to be expected from

employees and managers? What effects does the organizational culture have on the acceptance of the code?

  • What is the effect of the code on the organization?
  • Summarize the results of your systematic analysis or inquiry into the

code of ethics of this organization. Format your paper consistent with APA guidelines.

  • Prepare an introduction and use section headings identifying each of the steps with information and discussion following. Summarize your findings in the conclusion.
  • Do not include paragraphs directly from your company's code.

Reference no: EM13916810

Questions Cloud

Probability that a randomly selected child : You flip a coin three times. (a) What is the probability of getting heads on only one of your flips? (b) What is the probability of getting heads on at least one flip?
What is the probability of a customer ordering chicken : Jack in the Box offers hamburgers, turkey burgers, and chicken. They also offer two kinds of drinks Pepsi and ice tea and two flavors of ice cream vanilla and strawberry. What is the probability of a customer ordering chicken, an ice tea and strawb..
Which cash receipt controls may be hardest : Betty's Bakery is a start-up bakery that employs Betty, the owner, as well as one sales clerk, and one baker. Which cash receipt controls may be hardest to enforce in this environment
Relationship between degree fahrenheit and degree celsius : It is well-known that the relationship between degree Fahrenheit (F) and degree Celsius(C) is, F = (9/5)*C + 32
Evaluation of a business code of ethics : The purpose of this assignment is to assist you in refining problem-solving capabilities that organizations already possess for use in business ethics applications. This paper uses a structured, objective format sometimes called a system of inquiry. ..
Discuss the alignment of costco mission and strategy : Discuss the alignment of Costco's mission and strategy. Evaluate whether or not the strategy supports the mission. Discuss the company's business philosophy, values and code of ethics. Evaluate how these might give Costco a competitive advantage.
Macrs : 1. What is MACRS? In your explanation, please describe the recovery periods, depreciation methods and depreciation conventions. 2. What is the difference between a recognized gain/loss and a realized gain/loss?
How some organizations can catch the wave of change : Identify two examples of this kind of change. An example is a well-known historic example: beer. Consumers developed a preference for "light" beer and now light beer controls a good deal of the market, replacing "heavy" beer.
Ability to predict the future : A person claims to be able to predict the outcome of flipping a coin. This person is correct 16/25 times. Compute the 95% confidence interval on the proportion of times this person can predict coin flips correctly. What Conclusion can you draw abo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The case sstudy on an digital forensic investigation plan

As part of the auditing team in capacity of a Digital Forensics expert, your task is to prepare a report explaining the possible methods that can be adopted in this particular scenario, resources required for the methods chosen for this investigat..

  Which vulnerability be evaluated for extra controls first

If organization has three information assets to evaluate for risk management as shown in accompanying data, which vulnerability must be evaluated for additional controls first? Which one must be evaluated last?

  Draw the final figure in red-black tree

Draw the final figure in Red-black tree by inserting the abbreviations of states NY, IL, GA, RI, MA, PA, DE, IN, VT, TX, OH, and WY into an empty tree in that order. Describe those steps where red-black rules are violated and what actions you have..

  Recursive multiplication

Recursive Multiplication Write a main program that uses a recursive function. This function accepts two arguments into the parameters x and y.

  Problem about arrays

Initialize the array with the appropriate number of values.

  Provide a money transfer system using sms technology

Instructions: Your financial firm has a contract to provide a money transfer system using SMS technology for a global retail outlet chain. You have been selected to create a draft security policy for the new system utilizing the CIAA strategy. ..

  Create a comprehensive slideshow

Create a comprehensive slideshow according to the following directions: Explain the following list of components: Hard drive

  Tour operator agency database

The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.

  Draw an e- r data model

Draw an E- R data model for the Garden Glory database schema shown in Chapter 3' s " Garden Glory Project Questions." Use the IE Crow's Foot E- R model for your E- R diagrams. Justify the decisions you make regarding minimum and maximum ­cardinali..

  Explain the uses and advantages of the chips

Explain the uses and advantages of the chips. Mention likely privacy objections and refute them - making a presentation to a large retail chain to convince them to buy the chips to install in their products.

  Write a turing machine that takes as input

Write a Turing machine that takes as input the unary representation of any two different numbers, separated by a blank, and halts with the representation of the larger of the two numbers on the tape.

  What to consider before selecting product for system

National Information Assurance Partnership website, why is this not enough to just say "this product meets our security requirements"? Discuss what else you have to consider before selecting such a product for a system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd