Free Essay

Case Study Week 3

In:

Submitted By theanh289
Words 949
Pages 4
Question 1: Identify the stakeholders and how they were affected by Heene's actions?
The stakeholders in the “Balloon Ball Hoax” are the boy, Falcon Heene; the parents, Richard and Mayumi Heene, brothers, Bradford and Ryo Heene; Larimer County sheriff; Jim Alderman; Denver International Airport travelers and employees; National Guard unit; local police; search and rescue teams; media and news services; Colorado taxpayers; and the public.
The public through the media watched and worried about the fate of the boy in the balloon. Colorado taxpayers footed the bill for the 50,000 USD cost of personnel time, equipment and other incidentals to track the balloon, search the rescue mission, and investigation of the hoax. Denver International Airport closed to avoid collision with the balloon. Travelers were delayed and flights rerouted and rescheduled. Airport employees had to remain calm and courteous as travelers became frustrated with delays, missed flight times and rescheduling.
Local police, the National Guard unit, and search and rescue teams spent hours and used expensive equipment to track and hunt for the balloon and boy while Falcon was safe the whole time. Sheriff Jim Alderman had to conduct investigation under intense media scrutiny. At first, the media was incredulous that the parents were being questioned and investigated. Then Mr. Alderman was ridiculed for not detecting the hoax sooner.
Falcon Heene was used by his parents to pull out the hoax that he was on a hot air balloon that had escaped it tether. Falcon was expected to lie and help his parent with the hoax. His brothers, Bradford and Ryo, were also expected to lie and help the parents. Media attention was forcused on all of the sons as the story played out. Falcon explained on CNN Larry King Live in responses to a question from Wolf Blitzer that he was hiding and not responding to his name being called for show. The media attention on the young boy did cause his to vomit on television twice in one day
The parents , Richard and Mayumi Heene, used the hoax to create and garner attention so that they could get their own reality television show. Their actions were a result of egoism. The need for media attention was the utmost reason the hoax, and the hoax was carried out without regard for any one else or cost to the taxpayers. Richard Heene had called the media and Federal Aviation Administration ( FAA) twice while the balloon was aloft.
The media and news services followed the story in detail. Journalism ethics and skepticism were forgotten in the thrill of chasing the story and being the first to report updates.
As a result of the hoax, Sheriff Jim Alderman considered charges against the Heene for conspiracy, contributing to the delinquency of a minor, making a false report to authorities, and attempting to influence a public servant. Some of these charges are felonies and carry a maximum sentences of six years in prison.
Richard Heen pled guilty to the felony charge of attempting to influence a public servant and received four years probation, was prohibited from receiving and financial benefit from the case during the period of the probation; and received 90 days of jail time with 60 days being work release time. Richard pled to more serve felony charge so that his wife could be charged with misdemeanor, a lesser charge. She, thereby, could avoid deportation back to Japan. Mayumi pled guilty to false reporting to authorities. She was sentenced to 20 days in jail, which she can serve on weekends after her husband’s release
Sheriff Aderman was seeking full restitution of approximately 50,000 USD for the cost of investing the hoax. The FAA planned to seek a fine of 11,000

Question 2: What stage of moral reasoning is exhibited by Richard Heene's actions? Do you believe the punishment fit the crime? Why or why not?
Richard Heene was reasoning at stage 2 in the pleading guilty to a felony charge, Richard was reasoning at stage 3 (fairness to others) and showing loyalty to his wife.
Question 3 :Explain how the cognitive-developmental approach influences one's ability to make ethical judgments?
Cognitive development approach assumes that individuals construct a system of moral reasoning. Moral development proceeds through successive stages, each stage involves more complex judgment processes. Movement from one stage to another stage is dependent on the increasing capacity of the individual to synthesize complicated cognitive reasoning when confronted with more complex social situations. This approach suggests that people continue to change their decision priorities over time and with additional education and experience. In the context of business, an individual moral development can be influenced by corporate culture and ethics training.
Question 4 : How do you assess at what stage of moral development in Kohlberg's model you reason at in making decisions? Are you satisfied with that stage? Do you believe there are factors or forces preventing you from reasoning at a higher level? If so, what are they?
There are several approaches to the study of moral development, which are categorized in a variety of ways. Briefly, the social learning theory approach claims that humans develop morality by learning the rules of acceptable behavior from their external environment (an essentially behaviorist approach). Psychoanalytic theory proposes instead that morality develops through humans' conflict between their instinctual drives and the demands of society. Cognitive development theories view morality as an outgrowth of cognition, or reasoning, whereas personality theories are holistic in their approach, taking into account all the factors that contribute to human development.
The hardest part of moving up Kohlberg scale might be impartially. Nearly all ethical systems make difficult demands of treating other as if we loved them.

Similar Documents

Premium Essay

Case Study Week 3

...Case Study Week 3 Principles of Info System Security Professor Gross by Nick Post Concerning the research collaboration of ABC Institute of Research and XYZ Inc., there are two standard methods that shall be considered for the encryption of all sensitive data being transmitted over the Internet. There is symmetric encryption and asymmetric encryption. It is the intention of this paper to describe both methods and give an opinion on which method to use to secure the sensitive date. When a symmetric encrypted key is used, both parties share the same key to both encrypt and decrypt data. Since symmetric encryption's use-case is to share information between users, each has to posses a shared key. Although a symmetric key requires less computer resources, is simplistic and easy to understand, the utmost security measures should be set in place to ensure the safety and secrecy of the shared key by all collaborators. Should the key become compromised in some way, all sensitive data will be compromised. Also, exchanging the secret key over the Internet or over a large network is extremely risky because it can become intercepted by an attacker who could then use that key to decrypt the shared data. There is an alternative to this type of encryption, however, that could be more secure, though it poses its own disadvantages: asymmetric encryption. An asymmetric encrypted method relies on a public and private key. The public key is available to anyone who might wish...

Words: 451 - Pages: 2

Premium Essay

Week 3 Case Study

...Week 3 Case study BYOD has the potential for big cost savings because organizations that let employees bring their own devices to work don't waste money on corporate phones. Plus, when an employee can work from a device of his own choosing, it's more enjoyable than being forced to use a corporate-issued device. That means happier and more productive users. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. From their personal mobile devices, employees can access their work in the cloud, further improving productivity. The overall BYOD benefits are that they save the company money and they make workers happy. There are however four big BYOD risks. Think about how you'll pay for services. Users might pay for devices, but who's going to pay for the voice and data plans? There are a couple of ways you can handle cost-sharing, but it's important to pick one and get users to agree to it.  You're going to have to draft acceptable use and security policies that include the consequences of violation. Then you need to train users and help desk staff on best practices and support. You'll have to know how to handle the biggest  BYOD challenges, security. At a urban health plan inc their doctors travel a large hospital with their iThings, recording patient information, diagnostic data and preparing reports. The network travels with the doctor, following him or her throughthe building. When it’s time to print, the request is sent to the closest printer where...

Words: 341 - Pages: 2

Premium Essay

Week 3 Case Study

...Petrie’s Electronics Chapter 5 Case Questions 1. What do you think are the sources of the information Jim and his team collected? How do you think they collected all of that information? Conducted interviews with key stakeholders inside the company, He had also worked with the marketing group to put together some focus groups made up of loyal customers, to get some ideas about what they would value in a customer loyalty program. Jim had also spent some time studying customer loyalty programs at other big retail chains and those in other industries as well, such as the airlines, known for their extensive customer loyalty programs. 2. If you were looking for alternative approaches for Petrie’s customer loyalty program, where would you look for information? Where would you start? How would you know when you were done? An alternative approach would be by Business Process Reengineering. It is the search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services. The first step would be to identify key business processes which are the structured set of measurable activities designed to produce a specific output for a particular customer or market. 3. Why shouldn’t Petrie’s staff build their own unique system in-house? From the list of requirements, it was clear that Petrie’s staff should seek outside IT consulting to build their system. It would be too expensive and time consuming, not to mention, building a system...

Words: 486 - Pages: 2

Free Essay

Week 7- Case Study #3

...What to do with Howard? Week 7- case study #3 Synopsis: Agrigreen, Inc. is a company that manufactures a verity of agricultural fertilizer. With plants located in the western United States and Canada, Agrigreen employees are certified surveyors to make sure the quality and safety of every project is correct. Tad Pierson position at one of Agrigreen plants is a project engineer which he enjoys being. As project engineer Tad is put over the operation of the plant surveying group. Since being there Tad Pierson is becoming more aware of some performance, safety, and conflict issues within the surveyor group. These issues are beginning to escalate in and is causing Tad to become worried and concern in regards to the safety of the employees, the issues are also interfering with the production schedules leaving Tad Pierson to consider possible actions that he may need to take to resolve the issue within the organization. After receiving his surveyor’s certificate from the local civil technologies college, Howard Lineberry had gone to work for the State Highway Department as a chainman but the job hadn’t paid him very well So, when a job for a lead surveyor had opened up at Agrigreen eighteen years ago, Lineberry had been glad to get it. Howard Lineberry became a lead surveyor and has been employed with Agrigreen for eighteen years. Over the years working at Agrigreen he has been supervised by five different managers, and a total of three surveyor helpers. Over the years of...

Words: 288 - Pages: 2

Free Essay

Ctts Case Study Week 3

...|Milestone 1, 2, 3, 4_Week 3 Assignment | | | | | |Class Project: CSC - Coastline Systems Consulting | |Sunset Blvd, Los Angeles, CA | | | | | |IS581_Systems Analysis, Planning, and Control - 7th Edition | | | |Keller Graduate School (DeVry University) | |9/19/2010...

Words: 1716 - Pages: 7

Free Essay

Busn 258 Week 3 Case Study

...BUSN 258 Week 3 Case Study Consolidated Edison company of New York or Con Ed is a utility company that services the five boroughs of New York City and parts of Westchester County. Con Ed supplies electric, gas and steam to over three million customers and prides itself on its reliability. While Con Ed does hold a positive image in their customers’ eyes some incidents recently have left a negative image in many customers’ eyes. Con Ed has been in the news due to two gas explosions in New York City where there have been fatalities as well. These come at a time when Con Ed is trying to persuade customers to covert from oil to gas through incentives. Customers feel oil is safer due to recent events they see on the news. I interviewed Mr. Stampfel a Specialist from the call center to ask him some question s on the importance of customer service and relations. Michael has 9 Customer Service Representatives reporting directly to him, and has been a Customer Service Representative himself before being promoted into management. When Mr. Stampfel was asked about the role and importance of Customer Service to the organization he replied, “ Look around, this whole floor is dedicated to customer service, without customers there would be no Con Edison. We take customer service and satisfaction very seriously. Our CEO even added enhancing the customer experience into our principles.” (Stampfel, personal interview 2015). When asked the three most common issues faced by the organization...

Words: 950 - Pages: 4

Premium Essay

Acc 349 Week 3 Case Study

...Learning Team C Week 3 Case Study BYP 4-2 ACC349 April 4, 2011 Learning Team C Week 3 Case Study BYP 4-2 [pic] [pic] (a) |Activity cost pool |Estimated overhead |Cost drivers per activity |Total cost driver activity |Activity-based overhead rate | |Market analysis |$1,050,000 |Hours of analysis |15,000 hrs |$1,050,000 =$70 | | | | | |15,000 hrs | |Product design |2,280,000 |Number of designs |2,500 designs |2,280,000 =$912 | | | | | |2,500 designs | |Product development |3,600,000 |Number of products |90 products |3,600,000 =$40,000 | | | | | |90 products | |Prototype testing |1,400,000 |Number of tests |700 tests |1,400,000 =$2,000 | | | | | |700 tests | (b) ...

Words: 424 - Pages: 2

Free Essay

Week 3 Case Study 2 Submission

...Week 3 Case Study 2 Submission Asa J Opie Sec 310 Professor Nerove Strayer 7-20-2014 Week 3 Case Study 2 Submission A critical infrastructure is defined as any facility, system, or function which provides the foundation for national security, governance, economic vitality, reputation, and way of life. (http://www.dhs.gov/xlibrary/assets/NIPP_InfoSharing.pdf)In short, critical infrastructure is by definition essential for the survival of the nation. The USA PATRIOT Act specifically defines critical infrastructure as "systems and assets, whether physical or virtual, (Jena Baker McNeill and Richard Weitz, 2010) so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters." FEMA defines critical infrastructure as "personnel, physical assets, and communication (cyber) systems that must be intact and operational 24x7x365 in order to ensure survivability, continuity of operations, and mission success, or in other words, the essential people, equipment, and systems needed to deter or mitigate the catastrophic results of disasters." (http://www.dhs.gov/xlibrary/assets/NIPP_InfoSharing.pdf) The DHS Daily Open Source Infrastructure Reports specify the following sectors as part of critical infrastructure: Energy, Chemicals, Nuclear Reactors, Materials and Waste, Defense Industrial Base, Dams; Banking...

Words: 1253 - Pages: 6

Premium Essay

Bus 250 Week 3 Assignment Case Study

...BUS 250 WEEK 3 ASSIGNMENT CASE STUDY TO purchase this tutorial visit following link: http://wiseamerican.us/product/bus-250-week-3-assignment-case-study-2/ Contact us at: SUPPORT@WISEAMERICAN.US BUS 250 WEEK 3 ASSIGNMENT CASE STUDY Case Study: Government Regulation of Tobacco Products 1. Would you describe the orientation of Reynolds toward tobacco regulation as cooperative or at arm’s length? How about the attitude of Altria? What do you think explains the differences between the two company’s positions? BUS 250 Week 3 Assignment Case Study Government Regulation of Tobacco Products Answer The Family Smoking Prevention and Tobacco Control Act that was signed by the President allowed the Food and Drugs Association to have control over cigarette production and its ingredients as well as the way it should be advertised…….. BUS 250 WEEK 3 ASSIGNMENT CASE STUDY Case Study: Government Regulation of Tobacco Products 1. Would you describe the orientation of Reynolds toward tobacco regulation as cooperative or at arm’s length? How about the attitude of Altria? What do you think explains the differences between the two company’s positions? BUS 250 Week 3 Assignment Case Study Government Regulation of Tobacco Products Answer The Family Smoking Prevention and Tobacco Control Act that was signed by the President allowed the Food and Drugs Association to have control over cigarette production and its ingredients as well as the way it should be advertised…….. BUS 250 WEEK 3 ASSIGNMENT...

Words: 433 - Pages: 2

Premium Essay

Cis 502 Week 3 Case Study

...RUNNING HEAD: Advanced Persistent Threats Against RSA Tokens 1 Advanced Persistent Threats Against RSA Tokens McQuinda Johnson Dr. Al Oluyomi CIS 502 January 27, 2014 Advanced Persistent Threats Against RSA Tokens 2 An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for the threats facing many modern networked organizations. A new class of adversaries, appropriately dubbed the “Advanced Persistent Threat” (APT), represents well-resourced and trained adversaries that conduct multi-year intrusion campaigns targeting highly sensitive and valuable data in an attempt to gain a competitive edge, particularly in international business and law, or nation-state political and military affairs. These adversaries accomplish their goals using advanced tools and techniques designed to circumvent most conventional computer network defense mechanisms and remain undetected in their intrusion efforts or presence on networks over long periods of time. Network defense techniques which leverage knowledge about these adversaries can enable defenders to establish a state of information superiority which decreases the adversary’s likelihood of success with each subsequent intrusion attempt. Threat intelligence can be a force multiplier as organizations look to update their security programs and defenses to deal with increasingly sophisticated advanced persistent threats. Security managers need accurate, timely...

Words: 1313 - Pages: 6

Premium Essay

Cis 524 Week 7 Case Study 3

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-7-case-study-3/ CIS 524 WEEK 7 CASE STUDY 3 CIS 524 Week 7 Case Study 3, Case Study 3: Security Due Week 7 and worth 100 points A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register. The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart. After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive. Write a five to eight (5-8)...

Words: 638 - Pages: 3

Premium Essay

Crj 311 Week 3 Assignment Case Study Analysis

...CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-3-assignment-case-study-analysis/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS CIS 329 Week 4 Quiz 1 CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-3-assignment-case-study-analysis/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS CIS 329 Week 4 Quiz 1 CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-3-assignment-case-study-analysis/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS CIS 329 Week 4 Quiz 1 CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-3-assignment-case-study-analysis/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS CIS 329 Week 4 Quiz 1 CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS To purchase this visit following link: http://www.activitymode.com/product/crj-311-week-3-assignment-case-study-analysis/ Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS CIS 329 Week 4 Quiz 1 CRJ 311 WEEK 3 ASSIGNMENT CASE STUDY ANALYSIS To purchase this...

Words: 517 - Pages: 3

Premium Essay

Qrb 501 Week 3 Leaning Team Case Studies

...QRB 501 WEEK 3 LEANING TEAM CASE STUDIES A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=qrb-501-week-3-leaning-team-case-studies Visit Our website: http://hwsoloutions.com/ Product Description PRODUCT DESCRIPTION QRB 501 WEEK 3 LEANING TEAM CASE STUDIES 8-3 The Artist’s Palette Question One The team obtained the trade discount for each supplier and used it to determine the Net List Price for each supplier. The List Price less the trade discount provided the Net List Price. We then compared the two prices to determine that Parma would save $3.87 if they purchase from supplier two. The team did not experience issues completing this question. Question Two The team did not have any issues with this question. The team was able to easily calculate the net decimal equivalent by first finding the complement of each of the discount rates for each supplier (20/10/5 and 18/12/7). To do this the team subtracts each of them from 100% (i.e. 100-.20=.80). After this we multiplied each of the complement to find the net decimal equivalent (i.e. .80*.90*.95=.684). Question Three After finding the net decimal equivalent in question two, the team was able to multiply that number by the Parama minimum supply purchase price of 300 by (1-the net decimal equivalent) to find the trade discount. The team had to place a formula under the nde cell so the template would calculate the correct trade discount. There were no further issues with this problem. Question Four ...

Words: 519 - Pages: 3

Premium Essay

Mgt 311 Week 3 Math Case Study

...Case 3 In this case study, we look at four Year 4 students, Jake, Remy, Molly and Eliza, who have been given the task of problem-solving. They are making a square-based pyramid with 140 oranges. Each student has taken on a different job. They will be using materials to construct the pyramid to get the answer to their questions. Theories from both Piaget and Vygotsky will play part in their thinking. As well as help from the teacher. Using manipulatives allow the students to create their own cognitive models. Not only do the use of mathematical manipulatives have the advantage of engaging students, it also heightens the interest and enjoyment of mathematics. (hand2mind, 2017). The National Council of Teachers of Mathematics (NCTM) (as cited in hand2mind, 2017) advocate the use of manipulates within the classroom, they believe this...

Words: 539 - Pages: 3

Premium Essay

Nivedita Swaroop Cawand Week 3 Case Studies

...In addition to the three case studies, Nivedita Swaroop Cawand conducted a comparative study between children using an adaptive seating device during therapy sessions, and those who did not. This study focused on the impact of including the newly designed adaptive seating device, known as the D chair, during occupational therapy sessions for children with Down syndrome (Cawand, 2014). The D chair was redesigned to provide comfort and proximal stability at the child’s trunk, allowing the child to focus on developing fine motor skills (Cawand, 2014). Twenty-eight children were evenly split into an experimental group and a control group; the main focus of both groups focused on improving fine motor skills. The fourteen children in the experimental...

Words: 364 - Pages: 2