SlideShare a Scribd company logo
1 of 12
152 Chapter 4 Addressing Individuals’ Common Ethical
Problems
employee’s wrongdoing by supplying
an unfavorable reference? Why or
why not? Discuss the conflict between
community
responsibility and self‐ protection.
11 What conditions would have to be
present for you to blow the whistle
about unethical conduct you
observed at work? How would you
go about it?
12 If Sherron Watkins had blown the
whistle to the Houston Chronicle and
not to Enron’s CEO Ken Lay, do you
think she would have kept her
job at Enron?
13 Research a story about whistle‐
blowing. Relate what “your” whistle‐
blower did with the seven steps
recommended in the chapter. What
have you learned from the
comparison?
14 Do you think that “paying” whistle‐
blowers encourages people to look
for ethical misdeeds or to “game up”
ethical misdeeds? Do you think
people should be willing to report
unethical activities because it is the
right thing to do? What role could
money play in that decision?
SHORT CASES
Think about what you most value. For each
of the ethical dilemmas below, describe at
least two courses of action you might take
and state the pros and cons of each course.
Describe your actions out loud to some-
one else in class or to a friend. What can
you say or do that would be consistent with
your personal values?
Values Issue
You’re a trader who joined a large invest­
ment bank two years ago. Pat, one of
your fellow traders, is well known on the
Street for being a big risk taker and a big
money maker for the firm. Consequently,
he is popular among your firm’s senior
management. You see him at a party one
night and notice that he surreptitiously
used cocaine several times. Several weeks
later in the office, you notice that he seems
exceptionally high‐ spirited and that his
pupils are extremely dilated—you know
that both are signs of drug use. You’re
thinking of mentioning something about
it to his managing director, Bob, when Pat
makes a particularly impressive killing in
the market for your firm’s own account.
Bob jokes that he doesn’t know how Pat
does it, but he doesn’t care. “However he
is pulling this off, it’s great for the firm,”
Bob laughs. You feel strongly that this is
a problem and that it places your firm at
risk. You’ve already raised the issue to Pat’s
manager, Bob, who ignored the issue. Do
you raise it further? How can you voice
your values in this case?
People Issue
Your division has formed a committee of
employees to examine suggestions and
create a strategy for how to reward good
employee ideas. The committee has five
members, but you are the only one who is a
member of a minority group. You’re pleased
to be part of this effort since appointments
to committees such as this one are viewed
generally as a positive reflection on job
performance. At the first meeting, tasks
are assigned, and all the other committee
members think you should survey minority
members for their input. Over the next few
weeks, you discover that several committee
meetings have been held without your
knowledge. When you ask why you weren’t
notified, two committee members tell you
that survey information wasn’t needed at
Notes 153
the meetings and you’d be notified when
a general meeting was scheduled. When
you visit one committee member in his
office, you spot a report on the suggestion
program that you’ve never seen before.
When you ask about it, he says it’s just a
draft he and two others have produced.
Conflict of Interest Issue
You’ve just cemented a deal between a $100
million pension fund and Green Company,
a large regional money manager. You and
your staff put in long hours and a lot of
effort to close the deal and are feeling very
good about it. As you and three of your
direct reports are having lunch in a fancy
restaurant to celebrate a promotion, the
waiter brings you a phone. A senior account
executive from Green is calling and wants
to buy you lunch in gratitude for all your
efforts. “I’ll leave my credit card number
with the restaurant owner,” he says. “You
and your team have a great time on me.”
Customer Confidence Issue
You’re working the breakfast shift at a fast‐
food restaurant when a delivery of milk,
eggs, and other dairy products arrives.
There’s a story in the local newspaper
about contaminated milk distributed by
the dairy that delivers to your restaurant.
Upon reading the article more closely,
you discover that only a small portion of
the dairy’s milk is contaminated, and the
newspaper lists the serial numbers of the
affected containers. When you point out
the article to your manager, he tells you to
forget it. “If you think we’ve got time to go
through every carton of milk to check serial
numbers, you’re crazy,” he says. “The article
says right here that the chances are minus-
cule that anyone has a contaminated car-
ton.” He also explains that he doesn’t have
the workers to check the milk, and what’s
more, destroying the milk would require
him to buy emergency milk supplies at the
retail price. So he tells you to get back to
work and forget about the milk. He says, “I
don’t have the time or the money to worry
about such minor details.”
Use of Corporate Resources Issue
You work for Red Company. You and a col-
league, Pat Brown, are asked by your man-
ager to attend a weeklong conference in Los
Angeles. At least 25 other employees from
Red Co. are attending, as well as many cus-
tomers and competitors from other institu-
tions. At the conference, you attend every
session and see many of the Red Co. peo-
ple, but you never run into Pat. Although
you’ve left several phone messages for her,
her schedule doesn’t appear to allow room
for a meeting. However, when you get
back to the office, the department secre-
tary, who is coordinating expense reports,
mentions to you that your dinner in L.A.
must have been quite the affair. When you
ask, “What dinner?” she describes a dinner
with 20 customers and Red Co. employees
that Pat paid for at a posh L.A. restaurant.
When you explain that you didn’t attend,
she shows you the expense report with your
name listed as one of the attendees.
Notes
1. Mary C. Gentile, “Giving Voice to Values,”
The Aspen Institute, www.aspencbe.org/
teaching/gvv/ index.html.
2. B. George, P. Sims, A. N. McLean, and D.
Mayer, “Discovering Your Authentic Lead­
ership,” Harvard Business Review 85, no. 2
(2007): 1–8.
3. J. Q. Wilson, The Moral Sense (New York: Free
Press, 1993), 55–78.
4. E. A. Lind and T. R. Tyler, The Social Psychol-
ogy of Procedural Justice (New York: Plenum
Press, 1988).
5. B. Sheppard, R. Lewicki, and J. W. Minton,
Organizational Justice: The Search for Fairness in
154 Chapter 4 Addressing Individuals’ Common Ethical
Problems
the Workplace (New York: Lexington Books,
1992).
6. Eduardo Porter, “UBS Ordered to Pay
$29 Million in Sex Bias Lawsuit,” New York
Times, April 7, 2005, www.nytimes.com.
7. Insider Exclusive, “Wall Street Women Win
$70 Million Against Morgan Stanley,” 2013,
http://www.insiderexclusive.com/j ustice‐
in‐ america/legal‐ wall‐ street‐ women‐ win‐ 70‐
million‐ against‐ morgan‐ stanley.
8. Jenny Anderson, “After She Sued Merrill,
It’s Back on the Job,” New York Times, July
22, 2005, www.nytimes.com.
9. “Charges Alleging Sexual Harassment
FY2010–FY2015,” Equal Employment Oppor­
tunity Commission. n.d. Retrieved from
https://www.eeoc.gov/eeoc/statistics/
enforcement/sexual_harassment_new.cfm.
10. D. Schawble, “Daniel Goleman on Lead­
ership and the Power of Emotional Intel-
ligence,” Forbes, September 15, 2011, www.
forbes.com
11. E. Francis, “$168 Million Awarded in Cali­
fornia Sexual Harassment Suit,” ABC News.
March 2, 2012. Retrieved from http://
abcnews.go.com/US/LegalCenter/168‐
million‐ awarded‐ woman‐ harassed‐ raunchy‐
cardiac‐ surgery/story?id=15835342.
12. J. Lever, G. Zellman, and S. J. Hirschfeld,
“Office Romance: Are the Rules Changing?”
Across the Board, March–April 2006, 33–37.
13. C. DeJong, T. Aguilar, C. Tseng, G. A. Lin,
W. J. Boscardin, and R. A. Dudley, “Phar­
maceutical Industry–Sponsored Meals and
Physician Prescribing Patterns for Medi-
care Beneficiaries,” JAMA Internal Medicine
176, no. 8 (2016): 1114–20.
14. J. D. Glater, “University of Texas Fires
Director of Financial Aid,” New York Times,
May 14, 2007.
15. C. Dowd, “Investors Beware: Devil May Be
in the Details of Annuities,” Fox Business.
May 19, 2016. Retrieved from www.foxbusi-
ness.com/features/2016/05/19/investors‐
beware‐ devil‐ may‐ be‐ in‐ details‐ annuities.
html.
16. Paul Sullivan, “In Search of Competent
(and Honest) Advisers,” New York Times,
August 1, 2009, www.nytimes.com.
17. J. Hechinger and S. Craig, “SEC Tells
Fidelity Probe May Yield Civil Com-
plaint,” Wall Street Journal, July 26, 2005, A3.
18. J. A. Byrne, “No Excuses for Enron’s
Board,” Businessweek, July 29, 2002, 50.
19. I. J. Dugan, “Auditing Old‐ Timers Recall
when Prestige Was the Bottom Line,” Wall
Street Journal, July 15, 2002.
20. A. Samuel, “Meet your newest management
headache: the co‐ branded employee,” Wall
Street Journal Online. October 29, 2012.
21. K. Reardon, “Courage as a Skill,” Harvard
Business Review, January 2007, 2–7.
22. H. Wee, “Corporate Ethics: Right Makes
Might,” Businessweek, April 11, 2002.
23. R. Webber, “Whistle Blowing,” Executive Ex-
cellence, July 1989, 9–10.
24. Ibid.
25. A. Dunkin, “Blowing the Whistle without
Paying the Piper,” Businessweek, June 3, 1991,
138–39.
26. W. M. Hoffman and J. M. Moore, Business
Ethics: Readings and Cases in Corporate Morality
(New York: McGraw‐ Hill, 1984), 257.
27. F. Pellegrini, “Person of the Week: ‘Enron
Whistleblower’ Sherron Watkins,” Time,
January 18, 2002.
28. R. Rothracker, “Whistle‐ blower Law Reap
Big Payoffs for U.S. Treasury.” Legi‐ Slate,
August 29, 1997, 1; S. McDonough, “Want­
ed: Snitch for Good Pay.” Centre Daily Times,
November 29, 2004, B9; D. B. Caruso,
“Whistleblowers Help Feds to Build Cases.”
Centre Daily Times, August 25, 2004, B9.
29. K. Thomas and M. Schmidt, “Glaxo Agrees
to Pay $3 Billion in Fraud Settlement,” New
York Times, July 2, 2012, www.nytimes.com
30. P. Dryer, and D. Carney, “Year of the Whistle­
blower,” Businessweek, December 16, 2002,
107–10. T. Wilkinson, “After Eight Years, An
Insider Gets His Reward Thanks to Whistle-
blower’s Efforts, U.S. Government Reaps
You are the first Chief Information Security Officer (CISO) for
your organization, and on your first day, you realize there are
no impactful cybersecurity practices established or
implemented, and decide to submit a white paper to the CEO,
calling for action. Develop a project plan to stand up a brand
new cybersecurity program in the form of a 10-13 page White
Paper, referencing the course material, industry best practices,
and NIST guidance.
Guidelines:
· 10-13 pages of content. In lieu of an abstract, write an
executive summary. The executive summary, title page, and
references page, are not included in the total.
· At a minimum, 10 references should be used. All cited
articles, journals, books, and research, should be from credible
sources and current within the last five years. Note: Wikipedia
or personal blogs are not credible.
· Tables and graphics, if used, will count for no more than 1
page in the total. Anything more is welcome, but the space used
will be deducted from the total page count. Remember that
tables and graphics require in-text citations.
· APA formatting is required throughout - running head, page
numbers, appropriate font, citations, etc.
Content Tips:
· Understand the scope and value of your project.
· Describe the problem you are fixing by proposing this new
cybersecurity program. This would include potential threat,
financial loss, etc, that the organization faces due to lack of
cybersecurity.
· Reference the NIST Cybersecurity Framework (v1.1) to build
the structure of your program. This framework details each vital
function of cybersecurity – Identify, Protect, Detect, Respond,
and Recover – and will guide your research.
· Specifically, incorporate the steps detailed in section 3.2:
Establishing or Improving a cybersecurity program.
· Keep in mind NIST is a starting point, but other resources are
required (see Guidelines below).
· Be sure to include the following details:
· Include methods and best practices that satisfy each function
in the framework. The categories and sub-categories offer more
details for ensuring your program is robust. You do not have to
list out and talk to every single sub-category; view them as data
points to drive your vision.
· Write a security policy for your organization. The purpose of a
security policy is to safeguard the confidentiality, integrity, and
availability, of the organization’s systems and information. Be
sure to include objectives, scope, specific goals, and
consequences in the event of noncompliance.
· Create a team. Define roles and responsibilities of all
stakeholders, including those of the CISO.
· Describe the access control methods you would implement for
your building and network.
· Develop a method to track performance and report metrics.
Use the following references below as 5 sources and add an
additional 5 to make 10 sources
1. The importance on cybersecurity is displayed in this peered
review article, providing a firsthand look at organizations who
have faltered by not having the proper procedures implemented
within their database.
BEDERNA, Z., RAJNAI, Z., & SZADECZKY, T. (2021).
Business Strategy Analysis of Cybersecurity Incidents. Revista
Academiei Fortelor Terestre, 26(2), 139–148. https://doi-
org.library3.webster.edu/10.2478/raft-2021-0020
2. This article presents in depth analysis of distinct
cybersecurity compliance standards and statistics of cyber-
attacks. Evaluations and requirements between the frameworks,
tools, and software available for OS compliance testing.
HAMDANI, S. W. A., ABBAS, H., IEEE, S. M., JANJUA, A.
R., BIN SHAHID, W., AMJAD, M. F., MALIK, J., MURTAZA,
M. H., ATIQUZZAMAN, M., & KHAN, A. W. (2021).
Cybersecurity Standards in the Context of Operating System:
Practical Aspects, Analysis, and Comparisons. ACM Computing
Surveys, 54(3), 1–36. https://doi-
org.library3.webster.edu/10.1145/3442480
3. The article below provides a basic understanding on what a
white paper contains and all aspects that need to be included in
order to provide the most applicable call to action.
Leading Age. (2021). Cybersecurity White Paper.
https://leadingage.org/white-papers/cybersecurity-white-paper.
4. The book provides verbiage that relates to designing proper
cybersecurity program for the CEO
Mattord, H., & Whitman, M. (2018). Introduction to
Cybersecurity (6th ed.). Cengage Learning.
5. This article discusses how build a foundation of trust in
embedded systems within an organization.
Paultre, A. (2020). Establishing Trust in Cybersecurity for
Embedded Systems. EE: Evaluation Engineering, 59(10), 20–23.

More Related Content

Similar to 152 Chapter 4 Addressing Individuals’ Common Ethical Problems

001 Common Application Essays Luxury Sample Tra
001 Common Application Essays Luxury Sample Tra001 Common Application Essays Luxury Sample Tra
001 Common Application Essays Luxury Sample TraMyel Ramos
 
Dunkin DonutsMy nameInstitutionCourseInstructorDate.docx
Dunkin DonutsMy nameInstitutionCourseInstructorDate.docxDunkin DonutsMy nameInstitutionCourseInstructorDate.docx
Dunkin DonutsMy nameInstitutionCourseInstructorDate.docxinfantkimber
 
Person Writing On Paper Using Yellow And Black Pen Creazilla
Person Writing On Paper Using Yellow And Black Pen CreazillaPerson Writing On Paper Using Yellow And Black Pen Creazilla
Person Writing On Paper Using Yellow And Black Pen CreazillaIoulia King
 
Contoh Soal Essay Lingkungan Hidup. Online assignment writing service.
Contoh Soal Essay Lingkungan Hidup. Online assignment writing service.Contoh Soal Essay Lingkungan Hidup. Online assignment writing service.
Contoh Soal Essay Lingkungan Hidup. Online assignment writing service.Kris Hallengren
 
How To Write A 5 Paragraph Essay In 5Th Grade - How T
How To Write A 5 Paragraph Essay In 5Th Grade - How THow To Write A 5 Paragraph Essay In 5Th Grade - How T
How To Write A 5 Paragraph Essay In 5Th Grade - How TMia Gordon
 
Can You Help Me Write My Research Paper Fast
Can You Help Me Write My Research Paper FastCan You Help Me Write My Research Paper Fast
Can You Help Me Write My Research Paper FastKatie Parker
 
Chapter 8 Manager’s Ethics Getting, Promoting, and Firing Wo.docx
Chapter 8 Manager’s Ethics Getting, Promoting, and Firing Wo.docxChapter 8 Manager’s Ethics Getting, Promoting, and Firing Wo.docx
Chapter 8 Manager’s Ethics Getting, Promoting, and Firing Wo.docxtiffanyd4
 
Argumentative Paper Example. How To Write An
Argumentative Paper Example. How To Write AnArgumentative Paper Example. How To Write An
Argumentative Paper Example. How To Write AnJill Crawford
 
Love Letter Pad Stationery Free Printable Stationery, L
Love Letter Pad Stationery Free Printable Stationery, LLove Letter Pad Stationery Free Printable Stationery, L
Love Letter Pad Stationery Free Printable Stationery, LJill Turner
 
English Essay Form 1 - JerryldOneal. Online assignment writing service.
English Essay Form 1 - JerryldOneal. Online assignment writing service.English Essay Form 1 - JerryldOneal. Online assignment writing service.
English Essay Form 1 - JerryldOneal. Online assignment writing service.Lori Mitchell
 
The Lottery By Shirley Jackson Essay Topics
The Lottery By Shirley Jackson Essay TopicsThe Lottery By Shirley Jackson Essay Topics
The Lottery By Shirley Jackson Essay TopicsSamantha Hall
 
Scholarships For Writing Essays
Scholarships For Writing EssaysScholarships For Writing Essays
Scholarships For Writing EssaysRobyn Martin
 
How To Read And Understand A Book Thesi
How To Read And Understand A Book ThesiHow To Read And Understand A Book Thesi
How To Read And Understand A Book ThesiCindy Ashworth
 
Types Of Composition Writing And Examples - Lessons F
Types Of Composition Writing And Examples - Lessons FTypes Of Composition Writing And Examples - Lessons F
Types Of Composition Writing And Examples - Lessons FElizabeth Allen
 
How To Write About Methodology In A Res
How To Write About Methodology In A ResHow To Write About Methodology In A Res
How To Write About Methodology In A ResYolanda Jenkins
 
My House Essay In English Essay On My House 20 Lines Essay On My House
My House Essay In English  Essay On My House  20 Lines Essay On My HouseMy House Essay In English  Essay On My House  20 Lines Essay On My House
My House Essay In English Essay On My House 20 Lines Essay On My HouseSandy Simonsen
 
University Of Oregon Essay Question
University Of Oregon Essay QuestionUniversity Of Oregon Essay Question
University Of Oregon Essay QuestionShelly Quandt
 
English Charts T38128 Types Of Writing Learni
English Charts T38128 Types Of Writing LearniEnglish Charts T38128 Types Of Writing Learni
English Charts T38128 Types Of Writing LearniMelissa Dudas
 
Extended Essay Cover Page. Online assignment writing service.
Extended Essay Cover Page. Online assignment writing service.Extended Essay Cover Page. Online assignment writing service.
Extended Essay Cover Page. Online assignment writing service.Emily Custard
 
Website Writes Essays For You. Online assignment writing service.
Website Writes Essays For You. Online assignment writing service.Website Writes Essays For You. Online assignment writing service.
Website Writes Essays For You. Online assignment writing service.Monica Rivera
 

Similar to 152 Chapter 4 Addressing Individuals’ Common Ethical Problems (20)

001 Common Application Essays Luxury Sample Tra
001 Common Application Essays Luxury Sample Tra001 Common Application Essays Luxury Sample Tra
001 Common Application Essays Luxury Sample Tra
 
Dunkin DonutsMy nameInstitutionCourseInstructorDate.docx
Dunkin DonutsMy nameInstitutionCourseInstructorDate.docxDunkin DonutsMy nameInstitutionCourseInstructorDate.docx
Dunkin DonutsMy nameInstitutionCourseInstructorDate.docx
 
Person Writing On Paper Using Yellow And Black Pen Creazilla
Person Writing On Paper Using Yellow And Black Pen CreazillaPerson Writing On Paper Using Yellow And Black Pen Creazilla
Person Writing On Paper Using Yellow And Black Pen Creazilla
 
Contoh Soal Essay Lingkungan Hidup. Online assignment writing service.
Contoh Soal Essay Lingkungan Hidup. Online assignment writing service.Contoh Soal Essay Lingkungan Hidup. Online assignment writing service.
Contoh Soal Essay Lingkungan Hidup. Online assignment writing service.
 
How To Write A 5 Paragraph Essay In 5Th Grade - How T
How To Write A 5 Paragraph Essay In 5Th Grade - How THow To Write A 5 Paragraph Essay In 5Th Grade - How T
How To Write A 5 Paragraph Essay In 5Th Grade - How T
 
Can You Help Me Write My Research Paper Fast
Can You Help Me Write My Research Paper FastCan You Help Me Write My Research Paper Fast
Can You Help Me Write My Research Paper Fast
 
Chapter 8 Manager’s Ethics Getting, Promoting, and Firing Wo.docx
Chapter 8 Manager’s Ethics Getting, Promoting, and Firing Wo.docxChapter 8 Manager’s Ethics Getting, Promoting, and Firing Wo.docx
Chapter 8 Manager’s Ethics Getting, Promoting, and Firing Wo.docx
 
Argumentative Paper Example. How To Write An
Argumentative Paper Example. How To Write AnArgumentative Paper Example. How To Write An
Argumentative Paper Example. How To Write An
 
Love Letter Pad Stationery Free Printable Stationery, L
Love Letter Pad Stationery Free Printable Stationery, LLove Letter Pad Stationery Free Printable Stationery, L
Love Letter Pad Stationery Free Printable Stationery, L
 
English Essay Form 1 - JerryldOneal. Online assignment writing service.
English Essay Form 1 - JerryldOneal. Online assignment writing service.English Essay Form 1 - JerryldOneal. Online assignment writing service.
English Essay Form 1 - JerryldOneal. Online assignment writing service.
 
The Lottery By Shirley Jackson Essay Topics
The Lottery By Shirley Jackson Essay TopicsThe Lottery By Shirley Jackson Essay Topics
The Lottery By Shirley Jackson Essay Topics
 
Scholarships For Writing Essays
Scholarships For Writing EssaysScholarships For Writing Essays
Scholarships For Writing Essays
 
How To Read And Understand A Book Thesi
How To Read And Understand A Book ThesiHow To Read And Understand A Book Thesi
How To Read And Understand A Book Thesi
 
Types Of Composition Writing And Examples - Lessons F
Types Of Composition Writing And Examples - Lessons FTypes Of Composition Writing And Examples - Lessons F
Types Of Composition Writing And Examples - Lessons F
 
How To Write About Methodology In A Res
How To Write About Methodology In A ResHow To Write About Methodology In A Res
How To Write About Methodology In A Res
 
My House Essay In English Essay On My House 20 Lines Essay On My House
My House Essay In English  Essay On My House  20 Lines Essay On My HouseMy House Essay In English  Essay On My House  20 Lines Essay On My House
My House Essay In English Essay On My House 20 Lines Essay On My House
 
University Of Oregon Essay Question
University Of Oregon Essay QuestionUniversity Of Oregon Essay Question
University Of Oregon Essay Question
 
English Charts T38128 Types Of Writing Learni
English Charts T38128 Types Of Writing LearniEnglish Charts T38128 Types Of Writing Learni
English Charts T38128 Types Of Writing Learni
 
Extended Essay Cover Page. Online assignment writing service.
Extended Essay Cover Page. Online assignment writing service.Extended Essay Cover Page. Online assignment writing service.
Extended Essay Cover Page. Online assignment writing service.
 
Website Writes Essays For You. Online assignment writing service.
Website Writes Essays For You. Online assignment writing service.Website Writes Essays For You. Online assignment writing service.
Website Writes Essays For You. Online assignment writing service.
 

More from MatthewTennant613

Assignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docxAssignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docxMatthewTennant613
 
Assignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docxAssignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docxMatthewTennant613
 
ASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docxASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docxMatthewTennant613
 
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docxAssignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docxMatthewTennant613
 
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxAssignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxMatthewTennant613
 
Assignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docxAssignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docxMatthewTennant613
 
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docxAssignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docxMatthewTennant613
 
Assignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docxAssignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docxMatthewTennant613
 
Assignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docxAssignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docxMatthewTennant613
 
Assignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docxAssignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docxMatthewTennant613
 
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docxAssignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docxMatthewTennant613
 
Assignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docxAssignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docxMatthewTennant613
 
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docxAssignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docxMatthewTennant613
 
Assignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docxAssignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docxMatthewTennant613
 
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docxAssignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docxMatthewTennant613
 
Assignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docxAssignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docxMatthewTennant613
 
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docxAssignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docxMatthewTennant613
 
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docxAssignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docxMatthewTennant613
 
Assignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docxAssignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docxMatthewTennant613
 
Assignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docxAssignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docxMatthewTennant613
 

More from MatthewTennant613 (20)

Assignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docxAssignment Application Adoption of New Technology SystemsAs a nu.docx
Assignment Application Adoption of New Technology SystemsAs a nu.docx
 
Assignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docxAssignment Accreditation and Quality EnhancementThe purpose of ac.docx
Assignment Accreditation and Quality EnhancementThe purpose of ac.docx
 
ASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docxASSIGNMENT AOperationsManagement- Y.docx
ASSIGNMENT AOperationsManagement- Y.docx
 
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docxAssignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
Assignment Adaptive ResponseAs an advanced practice nurse, you wi.docx
 
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docxAssignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
Assignment 5 Senior Seminar Project Due Week 10 and worth 200 poi.docx
 
Assignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docxAssignment 5 Federal Contracting Activities and Contract Types Du.docx
Assignment 5 Federal Contracting Activities and Contract Types Du.docx
 
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docxAssignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
Assignment 5 CrowdsourcingDue 06102017 At 1159 PMCrowdso.docx
 
Assignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docxAssignment 4What are the power motivators of police leaders Expla.docx
Assignment 4What are the power motivators of police leaders Expla.docx
 
Assignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docxAssignment 4Project ProgressDue Week 9 and worth 200 points.docx
Assignment 4Project ProgressDue Week 9 and worth 200 points.docx
 
Assignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docxAssignment 4 PresentationChoose any federal statute that is curre.docx
Assignment 4 PresentationChoose any federal statute that is curre.docx
 
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docxAssignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
Assignment 4 The Perfect ManagerWrite a one to two (1–2) page pap.docx
 
Assignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docxAssignment 4 Presentation Choose any federal statute that is cu.docx
Assignment 4 Presentation Choose any federal statute that is cu.docx
 
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docxAssignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
Assignment 4 Inmates Rights and Special CircumstancesDue Week 8 a.docx
 
Assignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docxAssignment 4 Part D Your Marketing Plan – Video Presentation.docx
Assignment 4 Part D Your Marketing Plan – Video Presentation.docx
 
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docxAssignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
Assignment 4 DUE Friday 72117 @ 1100amTurn in a written respon.docx
 
Assignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docxAssignment 4 Database Modeling and NormalizationImagine that yo.docx
Assignment 4 Database Modeling and NormalizationImagine that yo.docx
 
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docxAssignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
Assignment 3 Inductive and Deductive ArgumentsIn this assignment,.docx
 
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docxAssignment 3 Wireless WorldWith the fast-moving technology, the w.docx
Assignment 3 Wireless WorldWith the fast-moving technology, the w.docx
 
Assignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docxAssignment 3 Web Design Usability Guide PresentationBefore you .docx
Assignment 3 Web Design Usability Guide PresentationBefore you .docx
 
Assignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docxAssignment 3 Understanding the Prevalence of Community PolicingAs.docx
Assignment 3 Understanding the Prevalence of Community PolicingAs.docx
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 

152 Chapter 4 Addressing Individuals’ Common Ethical Problems

  • 1. 152 Chapter 4 Addressing Individuals’ Common Ethical Problems employee’s wrongdoing by supplying an unfavorable reference? Why or why not? Discuss the conflict between community responsibility and self‐ protection. 11 What conditions would have to be present for you to blow the whistle about unethical conduct you observed at work? How would you go about it? 12 If Sherron Watkins had blown the whistle to the Houston Chronicle and not to Enron’s CEO Ken Lay, do you think she would have kept her job at Enron? 13 Research a story about whistle‐ blowing. Relate what “your” whistle‐ blower did with the seven steps recommended in the chapter. What have you learned from the comparison? 14 Do you think that “paying” whistle‐ blowers encourages people to look for ethical misdeeds or to “game up” ethical misdeeds? Do you think
  • 2. people should be willing to report unethical activities because it is the right thing to do? What role could money play in that decision? SHORT CASES Think about what you most value. For each of the ethical dilemmas below, describe at least two courses of action you might take and state the pros and cons of each course. Describe your actions out loud to some- one else in class or to a friend. What can you say or do that would be consistent with your personal values? Values Issue You’re a trader who joined a large invest­ ment bank two years ago. Pat, one of your fellow traders, is well known on the Street for being a big risk taker and a big money maker for the firm. Consequently, he is popular among your firm’s senior management. You see him at a party one night and notice that he surreptitiously used cocaine several times. Several weeks later in the office, you notice that he seems exceptionally high‐ spirited and that his pupils are extremely dilated—you know that both are signs of drug use. You’re thinking of mentioning something about it to his managing director, Bob, when Pat makes a particularly impressive killing in the market for your firm’s own account. Bob jokes that he doesn’t know how Pat
  • 3. does it, but he doesn’t care. “However he is pulling this off, it’s great for the firm,” Bob laughs. You feel strongly that this is a problem and that it places your firm at risk. You’ve already raised the issue to Pat’s manager, Bob, who ignored the issue. Do you raise it further? How can you voice your values in this case? People Issue Your division has formed a committee of employees to examine suggestions and create a strategy for how to reward good employee ideas. The committee has five members, but you are the only one who is a member of a minority group. You’re pleased to be part of this effort since appointments to committees such as this one are viewed generally as a positive reflection on job performance. At the first meeting, tasks are assigned, and all the other committee members think you should survey minority members for their input. Over the next few weeks, you discover that several committee meetings have been held without your knowledge. When you ask why you weren’t notified, two committee members tell you that survey information wasn’t needed at Notes 153 the meetings and you’d be notified when a general meeting was scheduled. When you visit one committee member in his
  • 4. office, you spot a report on the suggestion program that you’ve never seen before. When you ask about it, he says it’s just a draft he and two others have produced. Conflict of Interest Issue You’ve just cemented a deal between a $100 million pension fund and Green Company, a large regional money manager. You and your staff put in long hours and a lot of effort to close the deal and are feeling very good about it. As you and three of your direct reports are having lunch in a fancy restaurant to celebrate a promotion, the waiter brings you a phone. A senior account executive from Green is calling and wants to buy you lunch in gratitude for all your efforts. “I’ll leave my credit card number with the restaurant owner,” he says. “You and your team have a great time on me.” Customer Confidence Issue You’re working the breakfast shift at a fast‐ food restaurant when a delivery of milk, eggs, and other dairy products arrives. There’s a story in the local newspaper about contaminated milk distributed by the dairy that delivers to your restaurant. Upon reading the article more closely, you discover that only a small portion of the dairy’s milk is contaminated, and the newspaper lists the serial numbers of the affected containers. When you point out the article to your manager, he tells you to forget it. “If you think we’ve got time to go
  • 5. through every carton of milk to check serial numbers, you’re crazy,” he says. “The article says right here that the chances are minus- cule that anyone has a contaminated car- ton.” He also explains that he doesn’t have the workers to check the milk, and what’s more, destroying the milk would require him to buy emergency milk supplies at the retail price. So he tells you to get back to work and forget about the milk. He says, “I don’t have the time or the money to worry about such minor details.” Use of Corporate Resources Issue You work for Red Company. You and a col- league, Pat Brown, are asked by your man- ager to attend a weeklong conference in Los Angeles. At least 25 other employees from Red Co. are attending, as well as many cus- tomers and competitors from other institu- tions. At the conference, you attend every session and see many of the Red Co. peo- ple, but you never run into Pat. Although you’ve left several phone messages for her, her schedule doesn’t appear to allow room for a meeting. However, when you get back to the office, the department secre- tary, who is coordinating expense reports, mentions to you that your dinner in L.A. must have been quite the affair. When you ask, “What dinner?” she describes a dinner with 20 customers and Red Co. employees that Pat paid for at a posh L.A. restaurant. When you explain that you didn’t attend, she shows you the expense report with your name listed as one of the attendees.
  • 6. Notes 1. Mary C. Gentile, “Giving Voice to Values,” The Aspen Institute, www.aspencbe.org/ teaching/gvv/ index.html. 2. B. George, P. Sims, A. N. McLean, and D. Mayer, “Discovering Your Authentic Lead­ ership,” Harvard Business Review 85, no. 2 (2007): 1–8. 3. J. Q. Wilson, The Moral Sense (New York: Free Press, 1993), 55–78. 4. E. A. Lind and T. R. Tyler, The Social Psychol- ogy of Procedural Justice (New York: Plenum Press, 1988). 5. B. Sheppard, R. Lewicki, and J. W. Minton, Organizational Justice: The Search for Fairness in 154 Chapter 4 Addressing Individuals’ Common Ethical Problems the Workplace (New York: Lexington Books, 1992). 6. Eduardo Porter, “UBS Ordered to Pay $29 Million in Sex Bias Lawsuit,” New York Times, April 7, 2005, www.nytimes.com. 7. Insider Exclusive, “Wall Street Women Win $70 Million Against Morgan Stanley,” 2013,
  • 7. http://www.insiderexclusive.com/j ustice‐ in‐ america/legal‐ wall‐ street‐ women‐ win‐ 70‐ million‐ against‐ morgan‐ stanley. 8. Jenny Anderson, “After She Sued Merrill, It’s Back on the Job,” New York Times, July 22, 2005, www.nytimes.com. 9. “Charges Alleging Sexual Harassment FY2010–FY2015,” Equal Employment Oppor­ tunity Commission. n.d. Retrieved from https://www.eeoc.gov/eeoc/statistics/ enforcement/sexual_harassment_new.cfm. 10. D. Schawble, “Daniel Goleman on Lead­ ership and the Power of Emotional Intel- ligence,” Forbes, September 15, 2011, www. forbes.com 11. E. Francis, “$168 Million Awarded in Cali­ fornia Sexual Harassment Suit,” ABC News. March 2, 2012. Retrieved from http:// abcnews.go.com/US/LegalCenter/168‐ million‐ awarded‐ woman‐ harassed‐ raunchy‐ cardiac‐ surgery/story?id=15835342. 12. J. Lever, G. Zellman, and S. J. Hirschfeld, “Office Romance: Are the Rules Changing?” Across the Board, March–April 2006, 33–37. 13. C. DeJong, T. Aguilar, C. Tseng, G. A. Lin, W. J. Boscardin, and R. A. Dudley, “Phar­ maceutical Industry–Sponsored Meals and Physician Prescribing Patterns for Medi- care Beneficiaries,” JAMA Internal Medicine 176, no. 8 (2016): 1114–20.
  • 8. 14. J. D. Glater, “University of Texas Fires Director of Financial Aid,” New York Times, May 14, 2007. 15. C. Dowd, “Investors Beware: Devil May Be in the Details of Annuities,” Fox Business. May 19, 2016. Retrieved from www.foxbusi- ness.com/features/2016/05/19/investors‐ beware‐ devil‐ may‐ be‐ in‐ details‐ annuities. html. 16. Paul Sullivan, “In Search of Competent (and Honest) Advisers,” New York Times, August 1, 2009, www.nytimes.com. 17. J. Hechinger and S. Craig, “SEC Tells Fidelity Probe May Yield Civil Com- plaint,” Wall Street Journal, July 26, 2005, A3. 18. J. A. Byrne, “No Excuses for Enron’s Board,” Businessweek, July 29, 2002, 50. 19. I. J. Dugan, “Auditing Old‐ Timers Recall when Prestige Was the Bottom Line,” Wall Street Journal, July 15, 2002. 20. A. Samuel, “Meet your newest management headache: the co‐ branded employee,” Wall Street Journal Online. October 29, 2012. 21. K. Reardon, “Courage as a Skill,” Harvard Business Review, January 2007, 2–7. 22. H. Wee, “Corporate Ethics: Right Makes Might,” Businessweek, April 11, 2002.
  • 9. 23. R. Webber, “Whistle Blowing,” Executive Ex- cellence, July 1989, 9–10. 24. Ibid. 25. A. Dunkin, “Blowing the Whistle without Paying the Piper,” Businessweek, June 3, 1991, 138–39. 26. W. M. Hoffman and J. M. Moore, Business Ethics: Readings and Cases in Corporate Morality (New York: McGraw‐ Hill, 1984), 257. 27. F. Pellegrini, “Person of the Week: ‘Enron Whistleblower’ Sherron Watkins,” Time, January 18, 2002. 28. R. Rothracker, “Whistle‐ blower Law Reap Big Payoffs for U.S. Treasury.” Legi‐ Slate, August 29, 1997, 1; S. McDonough, “Want­ ed: Snitch for Good Pay.” Centre Daily Times, November 29, 2004, B9; D. B. Caruso, “Whistleblowers Help Feds to Build Cases.” Centre Daily Times, August 25, 2004, B9. 29. K. Thomas and M. Schmidt, “Glaxo Agrees to Pay $3 Billion in Fraud Settlement,” New York Times, July 2, 2012, www.nytimes.com 30. P. Dryer, and D. Carney, “Year of the Whistle­ blower,” Businessweek, December 16, 2002, 107–10. T. Wilkinson, “After Eight Years, An Insider Gets His Reward Thanks to Whistle- blower’s Efforts, U.S. Government Reaps
  • 10. You are the first Chief Information Security Officer (CISO) for your organization, and on your first day, you realize there are no impactful cybersecurity practices established or implemented, and decide to submit a white paper to the CEO, calling for action. Develop a project plan to stand up a brand new cybersecurity program in the form of a 10-13 page White Paper, referencing the course material, industry best practices, and NIST guidance. Guidelines: · 10-13 pages of content. In lieu of an abstract, write an executive summary. The executive summary, title page, and references page, are not included in the total. · At a minimum, 10 references should be used. All cited articles, journals, books, and research, should be from credible sources and current within the last five years. Note: Wikipedia or personal blogs are not credible. · Tables and graphics, if used, will count for no more than 1 page in the total. Anything more is welcome, but the space used will be deducted from the total page count. Remember that tables and graphics require in-text citations. · APA formatting is required throughout - running head, page numbers, appropriate font, citations, etc. Content Tips: · Understand the scope and value of your project. · Describe the problem you are fixing by proposing this new cybersecurity program. This would include potential threat, financial loss, etc, that the organization faces due to lack of cybersecurity. · Reference the NIST Cybersecurity Framework (v1.1) to build the structure of your program. This framework details each vital function of cybersecurity – Identify, Protect, Detect, Respond, and Recover – and will guide your research. · Specifically, incorporate the steps detailed in section 3.2: Establishing or Improving a cybersecurity program. · Keep in mind NIST is a starting point, but other resources are
  • 11. required (see Guidelines below). · Be sure to include the following details: · Include methods and best practices that satisfy each function in the framework. The categories and sub-categories offer more details for ensuring your program is robust. You do not have to list out and talk to every single sub-category; view them as data points to drive your vision. · Write a security policy for your organization. The purpose of a security policy is to safeguard the confidentiality, integrity, and availability, of the organization’s systems and information. Be sure to include objectives, scope, specific goals, and consequences in the event of noncompliance. · Create a team. Define roles and responsibilities of all stakeholders, including those of the CISO. · Describe the access control methods you would implement for your building and network. · Develop a method to track performance and report metrics. Use the following references below as 5 sources and add an additional 5 to make 10 sources 1. The importance on cybersecurity is displayed in this peered review article, providing a firsthand look at organizations who have faltered by not having the proper procedures implemented within their database. BEDERNA, Z., RAJNAI, Z., & SZADECZKY, T. (2021). Business Strategy Analysis of Cybersecurity Incidents. Revista Academiei Fortelor Terestre, 26(2), 139–148. https://doi- org.library3.webster.edu/10.2478/raft-2021-0020 2. This article presents in depth analysis of distinct cybersecurity compliance standards and statistics of cyber- attacks. Evaluations and requirements between the frameworks, tools, and software available for OS compliance testing. HAMDANI, S. W. A., ABBAS, H., IEEE, S. M., JANJUA, A.
  • 12. R., BIN SHAHID, W., AMJAD, M. F., MALIK, J., MURTAZA, M. H., ATIQUZZAMAN, M., & KHAN, A. W. (2021). Cybersecurity Standards in the Context of Operating System: Practical Aspects, Analysis, and Comparisons. ACM Computing Surveys, 54(3), 1–36. https://doi- org.library3.webster.edu/10.1145/3442480 3. The article below provides a basic understanding on what a white paper contains and all aspects that need to be included in order to provide the most applicable call to action. Leading Age. (2021). Cybersecurity White Paper. https://leadingage.org/white-papers/cybersecurity-white-paper. 4. The book provides verbiage that relates to designing proper cybersecurity program for the CEO Mattord, H., & Whitman, M. (2018). Introduction to Cybersecurity (6th ed.). Cengage Learning. 5. This article discusses how build a foundation of trust in embedded systems within an organization. Paultre, A. (2020). Establishing Trust in Cybersecurity for Embedded Systems. EE: Evaluation Engineering, 59(10), 20–23.