Why was iris justified in determining who the owner

Assignment Help Basic Computer Science
Reference no: EM13862602

Henry Magruder made a mistake-he left a CD at the coffee station. Later, when Iris Majwubu was topping off her mug with fresh tea, hoping to wrap up her work on the current SQL code module before it was time to go home, she saw the unlabeled CD on the counter. Being the helpful sort, she picked it up, intending to return it to the person who'd left it behind.

Expecting to find perhaps the latest device drivers, or someone's work from the development team's office, Iris slipped the disk into the drive of her computer and ran a virus scan on its contents before opening the file explorer program. She had been correct in assuming the CD contained data files, and lots of them. She opened a file at random: names, addresses, and Social Security numbers appeared on her screen. These were not the test records she

expected; they looked more like critical payroll data. Concerned, she found a readme.txt file and opened it.

It read: Jill, see files on this disc. Hope they meet your expectations. Wire money to account as arranged. Rest of data sent on payment.

Iris realized that someone was selling sensitive company data to an outside information broker. She looked back at the directory listing and saw that the files spanned the range of every department at Sequential Label and Supply-everything from customer lists to shipping invoices. She saw one file that appeared to contain the credit card numbers of every Web customer the company supplied. She opened another file and saw that it only contained

about half of the relevant data. Whoever did this had split the data into two parts. That made sense: payment on delivery of the first half.

Now, who did this belong to? She opened up the file properties option on the readme.txt file. The file owner was listed as "hmagruder." That must be Henry Magruder, the developer two cubes over in the next aisle. Iris pondered her next action.

Iris called the company security hotline. The hotline was an anonymous way to report any suspicious activity or abuse of company policy, although Iris chose to identify herself. The next morning, she was called to a meeting with an investigator from corporate security, which led to more meetings with others in corporate security, and then finally a meeting with the director of human resources and Gladys Williams, the CIO of SLS.

Questions:

1. Why was Iris justified in determining who the owner of the CD was?

2. Should Iris have approached Henry directly, or was the hotline the most effective way to take action? Why do you think so?

3. Should Iris have placed the CD back at the coffee station and forgotten the whole thing? Explain why that action would have been ethical or unethical.

4. If you face same situation describe the legal issues around Henry attitude

5. Identify your responsibilities as computing professional to your society

Reference no: EM13862602

Questions Cloud

Explain the specific elements in your chosen commercials : In context of the section on "sticky" advertisements, provide three examples of advertisers' efforts to concretize their advertisements. Television commercials would be a good source of ideas. Explain the specific elements in your chosen commercial..
Business intelligence systems with supply chain management : Read this PDF file which consists of three articles related to Business Intelligence Systems with Supply Chain Management. Critically review these articles, explore the strength and weakness of these articles .
Sketch the hydraulic and energy grade lines : System is 100 L/s, pipe diameters of 100 and 200 mm, and pipe lengths of 50 and 100 in. Pipe roughness ics = 0.06 mm. Assume kinematic viscosity v = 10-6 m2/s. Sketch the hydraulic and energy grade lines showing relative magnitudes and slopes.
Problem regarding the effective communication : Review the article that the authors intended not the article you wish they wrote. Place the APA article reference at the top of the first page, skip a line and begin the review
Why was iris justified in determining who the owner : Why was Iris justified in determining who the owner of the CD was?
How the product is positioned differently in the us : Based on your knowledge and experience, as well as research, describe how the product is positioned differently in the U.S. versus the other country. Explain two cultural and two noncultural reasons for the difference in positioning
Team building and performance standards : Objective: Identify methodologies relevant to team building and performance standards for the functions of HRM as they pertain to organizing, controlling, planning, leading, and staffing
Concentrates on nature of internal environment : This part concentrates on the nature of the internal environment of the company. Here, you should consider the following elements related to company's current status:
Consumer segmentation paper : Consumer Segmentation Paper-For this project, the consumers you will be studying are those in the apartment market for the Spokane metropolitan statistical area (MSA)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Traditional project management approach

Identify the business problems the project team tried to solve and analyze how they applied the agile project management techniques to ensure the project was delivered on time, on budget with good quality.

  What software must be considered to provide adequate

Based on the Vosevich (2012) article, what software must be considered to provide adequate security and risk management across the enterprise?

  The long-standing mubarak regime in egypt

It would have been hard to miss the information had you been scanning the newspapers during the tumultuous February of 2011, when the long-standing Mubarak regime in Egypt was swept from power by a popular uprising ultimately aligned with the militar..

  Decryption algorithm: reverse the encryption algorithm

Decryption algorithm: Reverse the encryption algorithm. The permutation, however, should (circular) shift the bit pattern by 1 bit to the right

  Explain checksum detect all errors caused by odd number

Let the 32-bit hash function defined as concatenation of two 16-bit functions: XOR and RXOR. Will this checksum detect all errors caused by odd number of error bits? Describe.

  Create a florida state information system

Create and use a Microsoft Access Database from which the program will retrieve the city information. Include 1 table with 5 fields per row, and 10 rows of data (cities).

  Discuss windows and mac os

Apple's Mac OS is a major competitor for Windows, and many people feel very strongly about choosing one over the other. For this assignment, locate articles online that discuss the differences between Windows and Mac OS. You may discuss any recent..

  Essay on the topic of digital divide crosses borders

Digital divide crosses all borders, culturally and geographically, discuss how the digital divide affects society in 2014.

  Common network for all onboard systems

What benefits are derived from the using a common network for all onboard systems. Comment on the security concern.

  Query decomposition

Query Decomposition

  Constant gravitational force-neglecting air resistance

Consider the motion of a projectile in 2D under a constant gravitational force, neglecting air resistance. Recall from Euler's method for solving

  Wireless network design paper

Wireless Network Design Paper You will be designing a small wireless network for a small company, based on a given scenario. The scenario will include network assets (hardware and software), building diagrams, a list of users, and requirement ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd