...1) Although the main reason Mr. Garbo employed Amber was just to build more future business with Amber’s father’s company, Mr. Garbo made few mistakes. He was wrong by giving Amber a boring occupation, paying Amber much than she deserves, and ignoring Amber’s fault. Amber is smart, she was given a chance, she can promote herself anytime to show what she could do. However, she knew that Mr. Garbo employed her was not because of her knowledge background, so she became lazy and was not interested in working. If Mr. Garbo keeps ignoring what Amber is doing and do not make any change, other employees will not work with enthusiasm and dedication attitude as before and his HR Department will be in trouble. This will lead Mr. Garbo’s firm a lot of trouble. 2) The reason Amber is employed was because of her father’s business’s relationship, not because of her ability. She should have understood that and catch the chance to work harder, express herself to the boss, make him feel that he chose the right one. By that way, she can change her colleague’s mind, change the prejudice they had from the beginning. Instead of breaking company’s regulation, she should follow it strictly and respect it. Taking longer break than others, coming to work late and leaving work early are not the right behavior, she just proved that she is not an educated person. This somehow will impact on her father because Mr. Garbo might reason out Amber’s father is the same, an unruly one. Amber worked in accounting...
Words: 285 - Pages: 2
...The Flaw in the Intel Pentium Chip I In late 1994, the media began to report that there was a flaw in the new Pentium microprocessor produced by Intel. A flaw in the Pentium was especially significant since at that time it was the microprocessor used in 80% of the personal computers produced worldwide. Apparently, flaws in a complicated integrated circuit such as the Pentium are not uncommon. Most of these flaws cannot be detected by the user and do not affect the operation of the computer. The flaw that was discovered in 1994 was different. It caused incorrect answers when performing double-precision arithmetic, a very common computer operation. The flaw was easily detected by computer users. In fact, it first came to light when a university researcher noticed that the results of some calculations he was performing using his PC were incorrect. Many daily newspapers across the country carried stories about this problem. Intel’s initial response was that although there was indeed a defect in the chip, the defect was insignificant and the vast majority of users would never even notice it. The chip would be replaced for free only for users who could demonstrate that they needed an unflawed version. Of course, this approach did not satisfy most Pentium owners since no one can predict whether the flaw might be significant in a future application. IBM, a major Pentium user, canceled the sales of all IBM computers containing the flawed chip. Finally, after much negative publicity...
Words: 707 - Pages: 3
...the uninformed. Hacking is bad, and there is no arguing that… Or is there? Most of what people know of hacking comes from the news or Hollywood movies such as Hackers and Swordfish. What they see is only one facet of this fascinating, yet misunderstood world. Hacking is not the evil act that some make it out to be. Hacking can also be a good thing. Enter the White Hat, or Ethical Hackers. These are the network security professionals in which no movies are based. Ethical hacking is used to help analyze networks for security flaws, stop attacks in progress and help keep companies in compliance with government regulations such as PCI or SOX. What is Ethical Hacking? Ethical hacking sounds like an oxymoron, but it does exist and is a very handsomely paying career field. The average ethical hacker can make anywhere from $24,760 a year to $111,502 (InfoSec Institute, n.d.). It does not stop there however. Some contracts can net an ethical hacker up to $17,500 in bonuses. (Computer Hope, n.d.). The main role of the ethical hacker is to penetrate a business network in order to recognize and fix security flaws before a “Black Hat” hacker can get to it. There is no such thing as a “fully secure” network,...
Words: 2096 - Pages: 9
...influenced by business and corporate culture. This is why it is important for all of society that business and corporate leaders understand and manage their firms with the highest ethical respect possible. It is the social responsibility of these companies to be aware that they are accountable for their actions and what they may or may not do can echo an eternity into the world’s future. In 1972, Ford Motor Company released the Ford Pinto, a small cheap car that could financially compete with the new economic cars from Asia. The Ford Pinto got a lot of attention because it was the first American made car to rival the Asia automobiles. However, the Pinto had a design flaw in that the position of the fuel tank was poorly placed and as a result was highly susceptible to car fires. This flaw was recognized by ford but was deemed an economic step backwards. If the production to fix the flaw was put in place, it would raise the overall price of the car. Thus, making the car less attractive to potential buyer. Ford decided to push the car despite the recognition of the fatal flaw. To make this decision Ford ultimately broke it down in terms of money. Ford determined that to go back and fix the design flaw to would cost $137 million as oppose to $49.5 million for those who will lose their life because of the design flaw in the Ford Pinto. (bizcovering) What Ford did in the 1970s was awful and very unethical. Yet, if one is to look at this situation strictly from a business standpoint Ford...
Words: 827 - Pages: 4
...Ethical Egoism We will be discussing the strengths and weaknesses of ethical egoism, but before we begin we first must understand what ethical egoism is and what is involved. Ethical egoism is the normative ethical position that moral agents ought to do what is in their own self-interest. It differs from psychological egoism, which claims that people can only act in their self-interest. Ethical egoism also differs from rational egoism, which holds that it is rational to act in one's self-interest. Ethical egoism contrasts with ethical altruism, which holds that moral agents have an obligation to help others. Egoism and altruism both contrast with ethical utilitarianism, which holds that a moral agent should treat one's self with no higher regard than one has for others as egoism does, by elevating self-interests and the self to a status not granted to others, but that one also should not as altruism does sacrifice one's own interests to help others' interests, so long as one's own interests (i.e. one's own desires or well-being) are substantially equivalent to the others' interests and well-being. Egoism, utilitarianism, and altruism are all forms of consequentialism, but egoism and altruism contrast with utilitarianism, in that egoism and altruism are both agent-focused forms of consequentialism (i.e. subject-focused or subjective), but utilitarianism is called agent-neutral (i.e. objective and impartial) as it does not treat the subject's (i.e...
Words: 433 - Pages: 2
...Name: Ebere Uguru Student ID: 16389756 Course: NT1110T Computer Structure and Logic Unit 5 Analysis THE FLAW IN THE INTEL PROCESSOR CHIP Since computer evolution, various computer companies have made their marks on the shores of revolutionizing computer as we know it. Hence, Intel, one of the world’s computer company giants, is not an exception to the zeal of making computers more efficient as the world evolves with time. However in 1994, Intel was hit by a major setback related to a flaw in its P5 Pentium Floating Point Unit (FPU) rolled out that year. This defect was first discovered by Professor Thomas R. Nicely, a professor of Mathematics at Lynchburg College in Virginia. According to the chronology, Professor Nicely in his quest to perfecting codes to enumerate primes, twin primes, and prime quadruplets unraveled the incoherence in his calculation. This abnormally occurred only after he had added a collection of computers manufactured by Intel to his group of computers. At first, he was unable to eliminate this flaw due to other factors such as: motherboard, programming errors and chiplets. After series of attempts to bring the attention of Intel to this error proved abortive, Professor Nicely then went public with it, and his claim was concurred by other internet users using Intel computers. Out of concern for the ripple effects of admitting to this error as it is, Intel...
Words: 872 - Pages: 4
...Ethics Essay This paper outlines three different ethical theories; deontological, utilitarianism, and virtue theory. It will discuss each theories outlook on ethical decisions, and I will relate one of the theories to personal past experience. Utilitarianism is a theory based on the ability to predict the outcome of a decision. The theory says that typically whatever choice will benefit the most people is the right choice to make, regardless of any constraints like laws, personal feelings, or societal opinions. The utilitarian uses a point system to provide a logical and rational explanation for making a decision. There are two types of utilitarianism, act and rule (Rainbow, 2002). Act adheres strictly to the guidelines of the theory, whereas rule takes into account outside influences like the law and fairness. The flaw of this theory is that over time, the decisions typically prove to be increasingly unethical because it is hard to predict how many people will benefit from a decision. In addition, assuming what the true benefit of the decision is. For example, material results may not mean as much to someone as intangible results do. Another flaw is that this theory rewards the act no matter what the danger. For example, if a delivery driver had to drive 90 mph through town to deliver a package on time and caused a wreck while driving to the location; utilitarianism does not look down upon this because the package being delivered benefited more people than the wreck...
Words: 623 - Pages: 3
...As a previous hiring manager and director of human resources at a firm downtown, I have experienced many ethical situations that require attention. The company I did the hiring for, needed individuals with a complete working knowledge of cable equipment and be able to interact with clients on a daily basis. In order for me to bring them in for an interview, they needed to complete an assessment that I created with a scoring system. One particular instance is when a potential candidate scored a 92% on the assessment, the highest I have ever seen on this rigorous test. I called him in and scheduled an interview for the very next day. I brought in the owner of the company on this interview because I felt the need for this and that I believed that we would hire him on the spot. I waited in my office and the candidate came in on time, introduced himself, and the interview began. Looking at his hygiene, he had a beard that scared me, his finger nails were long, and I smelt his body odor from a distance. He had all the right answers and was very confident in what he could do for our company. He dressed the part and was ready to start immediately. I called in the owner and introduced him to the applicant, and the owner says, “Wow, (cough cough) you understand this is a job that you will have to interact with customers on a daily basis, correct?” The applicant replied, “Yes of course.” The owner could not stand to be in my office and left immediately. I told the applicant...
Words: 646 - Pages: 3
...STUDIES MSC 1 TAKE HOME EXAMINATION TITLED (ETHICAL THEORY CRITICISM) COURSE MAC 851 APPROACHES TO THE STUDY OF MASS COMMUNICATION LECTURER MR. JIMMY KAYODE WRITTEN BY AKIYODE ESTHER OLADUNNI MATRIC NO 01/09/AV/4018 TABLE OF CONTENT INTRODUCTION DEFINITION ETHICAL PRINCIPLES • BENEFICENCE • LEAST HARM • RESPECT FOR AUTONOMY • JUSTICE ETHICAL THEORIES • DEONTOLOGY • UTILITARIASM • RIGHTS • CASUIST • VIRTUE VIEW OR NOTABLE SCHOLARS • PLATO ABSOLUTION • ARISOTLE: EUDEMONISM • ST. THOMAS AQUINESS – NATURAL LAW • IMMANUEL KANT: DEONTOLOGY • JOHN STUART MILL – UTILITARISM • JOHN RAWLS – CONGRATURIANISM • TOM REGAN: RIGHTS THEORY (BONUS THEORY ) • TENTATIVE COMPARISON (TABLE & GRAPH) • CRITICISM AGAINST DEONTOLOGY: “ “ UTILITARIANISM “ “ RIGHTS “ “ CASUIST “ “ VIRTUE • CONCLUSION • REFERENCES CRITICISMS OF ETHICAL THEORIES INTRODUCTION The art of critiquing is basically to appraise a work i.e articles, write-ups, novels etc. Critiquing does not aim to condemn or castigate a paper but to seek the flaws, identify the various meanings, put up better explanations on the subject, seek the weaknesses and strengths and give opinions to enhance the quality of the discourse. The topic of this discourse is ETHICAL THEORIES CRITICISM. We shall examine the definition...
Words: 3492 - Pages: 14
...principles. They may also be interpreted as a branch of philosophy dealing with values relating to human conduct; this is with respect to rightness and wrongness of certain actions as well as the motives of said actions. Ethical issues in regard to informational technology examines this structural belief through the examination of developing an ethical code, societal changes due to Informational technologies, the ethical usage of the technologies, and how these ethics should be enforced. Through the utilization of Brooks (2010) a distinct thesis shall be executed in which ethics and the issues regarding them in relation to information technology shall be portrayed. When developing a code of ethics one must understand where it is this code must derive to be succinct and coherent. There must be an understanding and a comprehension of society’s beliefs and core founding. This is necessary due to the state of moral that ethics must uphold. The moral state of ethics must conform to what is universally agreed upon as right or wrong. Without a mutual agreement among the masses the ideas that may or may not be portrayed are nothing more than biased decisions geared for the betterment of the individual. Technologies other than computers have also posed complex ethical issues. Consider all of the concern that was expressed when discussing the power of the atomic bomb. There were many questions to ask such as, should such a powerful tool be created and ultimately used? What would this mean...
Words: 1580 - Pages: 7
...injured as well as a tremendous oil spill in the Gulf of Mexico. In fact, this case has been described as a complex accident including a variety of issues ranging from environmental to economic, politics and even ethical issues. The goal of our research is to find any ethical issues since this disaster happened is closely related to ethics which is concerned with moral obligation, social responsibility and justice (Carolyn Wiley, 1997) either individual (‘bad apples’) or organizational (‘bad barrels), which should be evaluated to verify this case. Firstly, the ethical issues can largely be divided into three categories, namely (1) technical design which has had some testing flaws before the actual usage and insufficient guidelines against the negative pressure test, (2) human factors including misjudgment, errors and a failure in duty, (3) organizational system such as taking risk procedures to save time and money and refusing the advice of staff and contractors as well as slowness to react in the accident. Thus, the ethical issues in BP oil spill case relevant to the individuals or the organization will be classified in each factor mentioned above by distributing whether it belongs to the individual level or the organizational level based on our judgments along with ethical theory to support our conclusion. 2. The importance of ethics in business world It is easy...
Words: 3144 - Pages: 13
...Decision-Making in Business and the Repercussions of Unethical Choices In business, managers must attempt to take ethical approaches to all areas of work so as not to compromise the company, the employees, or the organization’s consumers. Specific criteria have been established for managers to follow in order to remain ethical, even when faced with unethical situations. Ivancevich, Konopaske and Mattseson identify these criteria as the following: 1. Utilitarian outcomes. The manager’s behavior results in optimization of satisfaction of people inside and outside the organization. In other words, it results in the greatest good for the greatest number of people. 2. Individual rights. The manager’s behavior respects the rights of all affected parties. In other words, it respects basic human rights of free consent, free speech, freedom of conscience, privacy, and due process. 3. Distributive justice. The manager’s behavior respects the rules of justice. It does not treat people arbitrarily but rather equitably and fairly (2012, Pg. 357-358). By following these three criteria managers are able to help the company, respect rights of the companies’ employees and follow the law. These three criteria are what should be the foundation of every business in order to satisfy the needs of the company, its employees and follow the laws created by the government. This is not always the case, as is visible with many companies seeking to circumvent the law, disregard for employee rights...
Words: 1713 - Pages: 7
...understanding of why people make the decisions that they do. First, let’s look at the deontological theory. This theory believes “that a person will follow his or her obligations to another individual or society because upholding one’s duty is what is considered ethically correct.” (Description of Ethical Theories and Principles, 2002) A person who uses deontological theory is always consistent with the decisions he makes. Sometimes, the deontologist goes above his normal duties if he feels strongly about the situation. This is called supererogation. An example of supererogation would be a rescue diver on a mission and a situation arose. He would sacrifice his life to safe the life of another. There are also flaws to the deontological theory. There is no reasoning to determine ones duty or responsibilities nor is there a way to navigate out of a complex situation. For example, a man’s wife has gone into labor. He is across town stuck in traffic. The man becomes torn between his duty to his wife and his moral and ethical responsibility to his community. The second theory is Utilitarianism. This theory “is founded on the ability to predict the consequences of an action.” (Description of Ethical Theories and Principles, 2002) Utilitarians believe that whatever benefits the most people is what would be considered ethically correct. They tend to use experiences along with a grading system to help determine what decision benefits the most people. There are two types of utilitarianism;...
Words: 673 - Pages: 3
...and happy introduction and no superiority before he had a family. Troy Maxson’s characteristic in general is not a moral and ethical person, hence not a person with goodness. According to the play, Troy cheated on Rose and having a baby, and according to Rose, “I planted myself inside you and waited to bloom. And it didn’t take me no eighteen years to find out the soil was hard and rocky and it wasn’t never gonna bloom” (page 71, paragraph 1). In other words Rose expected Troy to be a person she can rely on, but he cheated on her. Another example Troy preventing Cory to become a professional football player. He does this action simply because he didn’t make it to become a professional baseball player because of the Black Discrimination. This shows Troy’s idea of “fences” and his non acceptance to new ideas. These characteristic shows Troy is not a moral and ethical person. Therefore Troy Maxson is not a person with goodness. Although some people may say Troy has many tragic flaw and lead to his own demise. It is true that Troy has many flaws such as cheating on Rose, against Cory to follow his dream, and only follow his beliefs, but it is unclear whether these flaws led to his death. According to the play, Troy died from heart attack while swinging his baseball bat (Act 2 Scene 5). However, there is no clear indication of whether Troy died because of his flaw. According to the play, “[...] he swung it and stood there with this grin on his face”(page 96 paragraph 1). In other word...
Words: 707 - Pages: 3
...Ethical Hacking Computer Ethics – CIS 324 Dr. Nelson Stewart June 7, 2013 INTRODUCTION When most people hear the term “hacker” they think of an evil person committing crimes by hacking into their computers to steal, destroy and/or steal identities. This is so in some cases, but not all hackers are bad. Hackers are merely curious technically skilled individuals who gain unauthorized access to computers, networks of various companies, organizations and individuals. Good hackers are considered white hat hackers. They are the ones that are hired to break into systems as a way of testing the vulnerabilities and security issues that may be present in the computer system. Bad hackers are considered black hat hackers. They are the “evil” hackers, or should I say “crackers” who hack into systems to steal identities, information, crack into software programs and create nasty viruses. What is Ethical Hacking? Ethical hacking provides a way to determine the security of an information technology environment – at least from a technical point of view. As the name ethical hacking already tells, the idea has something to do with hacking. But what does “hacking” mean? The word hacking has two definitions. The first definition refers to the hobby/profession of working with computers. The second definition refers to breaking into computer systems. While the first definition is older and is still used by many computer enthusiasts (who refer to cyber-criminals as “crackers”), the...
Words: 1280 - Pages: 6