The many challenges of working in it

Assignment Help Basic Computer Science
Reference no: EM13943487

Please read the case and answer 3 questions at the end:

Ethics, Moral Dilemmas, and Tough Decisions: The Many Challenges of Working in IT.

What Bryan found on an executive's computer six years ago still weighs heavily on his mind. He's particularly troubled that the man he discovered using a company PC to view pornography of Asian women and of children was subsequently promoted and moved to China to run a manufacturing plant. "To this day, I regret not taking that stuff to the FBI." It happened when Bryan, who asked that his last name not be published, was IT director at the U.S. division of a $500 million multinational corporation based in Germany.

The company's Internet usage policy, which Bryan helped develop with input from senior management, prohibited the use of company computers to access pornographic or adult-content Web sites. One of Bryan's duties was to use products from SurfControl PLC to monitor employee Web surfing and to report any violations to management.

Bryan knew that the executive, who was a level above him in another department, was popular within both the U.S. division and the German parent. Yet when the tools turned up dozens of pornographic Web sites visited by the executive's computer, Bryan followed the policy.

"That's what it's there for. I wasn't going to get into trouble for following the policy," he reasoned. Bryan's case is a good example of the ethical dilemmas that IT workers may encounter on the job. IT employees have privileged access to digital information, both personal and professional, throughout the company, and they have the technical prowess to manipulate that information. That gives them both the power and responsibility to monitor and report employees who break company rules. IT professionals may also uncover evidence that a coworker is, say, embezzling funds, or they could be tempted to peek at private salary information or personal e-mails. There's little guidance, however, on what to do in these uncomfortable situations.

In the case of the porn-viewing executive, Bryan didn't get into trouble, but neither did the executive, who came up with "a pretty outlandish explanation" that the company accepted, Bryan says. He considered going to the FBI, but the Internet bubble had just burst and jobs were hard to come by. "It was a tough choice," Bryan says. "But I had a family to feed."

Perhaps it would ease Bryan's conscience to know that he did just what labor attorney Linn Hynds, a senior partner at Honigman Miller Schwartz and Cohn LLP, would have advised in his case. "Let the company handle it," she says. "Make sure you report violations to the right person in your company, and show them the evidence. After that, leave it to the people who are supposed to be making that decision." Ideally, corporate policy takes over where the law stops, governing workplace ethics to clear up gray areas and remove personal judgment from the equation as much as possible.

"If you don't set out your policy and your guidelines, if you don't make sure that people know what they are and understand them, you're in no position to hold workers accountable," says John Reece, a former chief information officer at the Internal Revenue Service and Time Warner Inc. Having clear ethical guidelines also lets employees off the hook emotionally if the person they discover breaking the policy is a friend, someone who reports to them directly, or a supervisor, says Reece, who is now head of consultancy at John C. Reece and Associates LLC. Organizations that have policies in place often focus on areas where they had trouble in the past or emphasize whatever they are most worried about. When Reece was at the IRS, for example, the biggest emphasis was on protecting the confidentiality of taxpayer information.

At the U.S. Department of Defense, policies usually emphasize procurement rules, notes Stephen Northcutt, president of the SANS Technology Institute and author of IT Ethics Handbook: Right and Wrong for IT Professionals. Adding to the complexity, an organization that depends on highly skilled workers might be more lenient. When Northcutt worked in IT security at the Naval Surface Warfare Center in Virginia, it was a rarefied atmosphere of highly sought-after PhDs. "I was told pretty clearly that if I made a whole lot of PhDs very unhappy so that they left, the organization wouldn't need me anymore," says Northcutt.

Of course, that wasn't written in any policy manual, so Northcutt had to read between the lines. "The way I interpreted it was: Child pornography, turn that in," he says. "But if the leading mathematician wants to download some pictures of naked girls, they didn't want to hear from me." Northcutt says that he did find child porn on two occasions and that both events led to prosecution. As for other offensive photos that he encountered, Northcutt pointed out to his superiors that there might be a legal liability, citing a Supreme Court decision that found that similar pictures at a military installation indicated a pervasive atmosphere of sexual harassment. That did the trick. "Once they saw that law was involved, they were more willing to change culture and policy," Northcutt says.

When policies aren't clear, ethical decisions are left to the judgment of IT employees, which varies by person and the particular circumstances. For example, Gary, a director of technology at a nonprofit organization in the Midwest, flat-out refused when the assistant chief executive officer wanted to use a mailing list that a new employee had stolen from her former employer. Yet Gary, who asked that his last name not be used, didn't stop his boss from installing unlicensed software on PCs for a short time, although he refused to do it himself. "The question is, how much was it really going to hurt anybody? We were still going to have 99.5 percent compliant software. I was OK with that."

He says he uninstalled it, with his boss's approval, as soon as he could, which was about a week later. Northcutt argues that the IT  profession should have two things that professions such as law or accounting have had for years: a code of ethics and standards of practice. That way, when company policy is nonexistent or unclear, IT professionals still have standards to follow.

That might be useful for Tim, a systems administrator who works at a Fortune 500 agricultural business. When Tim, who asked that his last name not be published, happened across an unencrypted spreadsheet of salary information on a manager's PC, he copied it. He didn't share the information with anyone or use it to his advantage. It was an impulsive act, he admits, that stemmed from frustration with his employer. "I didn't take it for nefarious reasons; I just took it to prove that I could," he says.

Tim's actions point to a disturbing trend: IT workers are justifying their ethically questionable behavior. That path can end in criminal activity, says fraud investigator Chuck Martell. "We started seeing a few cases about seven or eight years ago," says Martell, managing director of investigative services at Veritas Global LLC, a security firm in Southfield, Michigan. "Now we're investigating a tremendous amount of them." Whole Foods Market Chairman and CEO John Mackey spent years earning a positive reputation as a corporate leader who was not afraid to take a stand on ethics issues. Before other companies figured out that it pays to be environmentally friendly, Whole Foods led by setting standards for humane animal treatment. In 2006, Mackey took the bold step of reducing his own annual salary to one dollar, pledging money instead for an emergency fund for his staff. Not shy about expressing his views, Mackey challenged leading thinkers, like Nobel Prize-inner Milton Friedman, on business ethics issues. Like many leaders, Mackey seemed to relish the public spotlight.

On July 20, 2007, however, Mackey got more than he bargained for in terms of publicity.The Wall Street Journal reported that Mackey had long used the pseudonym "Rahodeb" to make postings in Yahoo Finance forums that flattered his own company and leveled criticisms against the competition. Serious financial and possibly legal repercussions continue to unfold from this incident, and the final consequences may not be known for some time.

Amid the furor that followed this disclosure of Mackey's secret online alias, it is vital that we not lose sight of the critical issues it raises about ethics and leadership in a rapidly evolving business world. There is no question that the current climate has prompted many more companies to tackle ethics issues.

By now, "business ethics" is an established part of doing business, not just in the United States, but also increasingly around the world. People no longer joke that "business ethics is an oxymoron," as society has come not merely to expect, but to demand, that business conduct itself according to basic rules of ethics and integrity. Business will always need to pay attention to ethics and leadership, but these lessons are continually challenged by new developments, including technological advances that promote new kinds of communication online. Business leaders cannot afford to overlook these challenges, as even a single misstep can be enough to undo a reputation for ethical leadership.

QUESTIONS:

1. Companies are developing ethical policies and guidelines for legal reasons, but also to clarify what is acceptable and what is not. Do you think any of the issues raised in the case required clarification? Would you take exception to any of them being classified as inappropriate behavior? Why do you think these things happen anyway?

2. In the first example (Bryan's), it is apparent that he did not believe justice had been ultimately served by the decision his company made. Should he have taken the issue to the authorities? Or was it enough that he reported the problem through the proper channels and let the organization handle it, as was the recommendation if Linn Hynds? Provide a rationale for the position you are willing to take on this matter.

3. In the case, Gary chose not to stop his boss from installing unlicensed software, although he refused to do it himself. If installing unlicensed software is wrong, is there any difference between refusing to do it versus not stopping somebody else? Do you buy his argument that it was not really going to hurt anybody? Why or why not?

Reference no: EM13943487

Questions Cloud

Winans corporation acquired amount enterprises : Winans Corporation acquired Amount Enterprises for a cash payment of $709,730
Find out how properties are assessed for tax purposes : Find out how properties are assessed for tax purposes and how property taxes are computed on them. Then, using a $100,000 valued house, go through the calculations. In addition, find out how a property owner can challenge the assessment if he or s..
How do values associated with indulgence differ : Using Hofstede's dimensions, how do values associated with indulgence differ between your country of origin and your chosen country? How are these differences relevant to T&H?
Melting point at standard conditions for ammonia : What is the melting point at standard conditions for ammonia? Boling point is given -33.4C.
The many challenges of working in it : What Bryan found on an executive's computer six years ago still weighs heavily on his mind. He's particularly troubled that the man he discovered using a company PC to view pornography of Asian women and of children was subsequently promoted and m..
What role do real estate agents and brokers play in business : Locate a real estate appraiser. Research to find out how properties are appraised. How do methods differ when the appraiser is looking at residential, multifamily, or commercial properties? What role do real estate agents and brokers play in the a..
Gordon company sponsors a defined benefit pension : Gordon Company sponsors a defined benefit pension plan Prepare the journal entries to record the pension expense and the company's funding of the pension plan for both years
Familarity with the stages of change : Learning Outcomes* Deemonstrate Familarity with the stages of change and how the process of change my breakdown* Appraise the way in which clients progress through the stages of change *
Strategies used by amazon to build competitive advantage : Analyse the strategies used by Amazon to build and sustain competitive advantage. What are the strategic issues currently facing the organisation?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Simpl program prove by structural induction

Let c be an arbitrary SIMPL program and assume that judgment ßs' holds for some store s'. Prove by structural induction that x Î pre(s'), where pre(s') denotes the preimage of s'.

  According to the environmental protection agency

According to the Environmental Protection Agency, "rigid containers have definite retained shape and form and that are self-supporting" (EPA, n.d.) Some of the differences between rigid and non-rigid containers, according to this week's reading, "Rid..

  Write a journal entry that reviews the process states

Write a journal entry that reviews the process states for your preferred operating system and prepares you for the process management requirements of your final project. First, research and then describe the scheduling algorithm used by your operatin..

  Checking parity scheme of packet with bit data

Suppose the information content of a packet is the bit pattern 1011011011101011, and an even parity scheme is being used. What would the value of the checksum field be for the case of a two-dimensional parity scheme?

  Storage of a large number of items in main memory

Storage of a large number of items in main memory, where accessing an item by its position, and avoiding problems caused by memory fragmentation, are important.

  Write a c++ code for sum of two large integers

Write a C++ code for sum of two large integers. User have to enter two integers one by one.

  Write method called swappairs accepts string as parameters

Write a method called swapPairs that accepts a String as a parameter

  Use bcd to encode the decimal number

Find the decimal integer that corresponds to each interpretation and Perform the subsequent operations:

  Research and the development of a summary of 5 it

Clarification: These systems are out of date, are not running virus software, and users all have administrative rights to the server and workstations. The website is also out of date and the website front end allows users to input data.

  Term paper-information technology strategic plan

Imagine that a company has recently hired you as a senior business consultant. The company is seeking to gain better traction with regard to customer satisfaction and loyalty. The company hired you because of your expertise with mobile apps, socia..

  Explain what is meant by wear-leveling in flash drives?

Explain what is meant by wear-leveling in Flash drives?

  Mobile technologies in a user-friendly manner

The items need to be easily searchable and of sufficiently high resolution for details to be viewed. They need to be accessible through mobile technologies in a user-friendly manner. The University also wants a way to protect the copyright of the ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd