SlideShare a Scribd company logo
1 of 10
chapter two Normative theories of ethics 71
• the deathbed-promise example (pp. 50–51)
• business as combining self-interest and social
good
(or egoism and utilitarianism) (pp. 52–53)
• the convenience store owner and acting from a
sense of
duty (p. 54)
• Martin’s promise as an illustration of the
categorical
imperative (p. 55)
• hypothetical imperatives vs. the categorical
imperative
(p. 56)
• two alternative formulations of the categorical
imperative
(pp. 56–57)
• three features of Kant’s ethics in an
organizational context
(pp. 57–58)
• three critical inquiries of Kant’s ethics
(pp. 58–59)
• how Ross’s theory differs from utilitarianism
and from
Kant’s categorical imperative (p. 61)
• four important characteristics of human rights (p.
63)
• the difference between negative and positive rights
(p. 63)
• how rule utilitarianism differs from act
utilitarianism
(p. 66)
• the optimal moral code and the analogy with
traffic rules
(p. 67)
• two objectionsto rule utilitarianism (p. 67)
• two points drawn from Chapter 1 that can
help moral
discussions (p. 68)
• two-step procedure for morally evaluating actions
and
choices (p. 70)
for furtHer refLeCtion
1. What value, if any, do you see in
business students studying the basics of ethical
theory?
2. Which normative theory or general approach to
ethics do you find the most plausible or
attractive, and why?
3. Can people who disagree about normative ethical
theory still reach agreementon practical ethical
questions in the business
world? If so, how?
everyone WHo Has ever appLied for admission
to a selective college or who has been interviewed for a
highly desired job knows the feeling of waiting impatiently
to learn the result of one’s application. So it’s not hard to
identify with those applicants to some of the nation’s most
prestigious MBA programs who thought they had a chance
to get an early glimpse at whether their ambition was to be
fulfilled. While visiting a Businessweek Online message
board, they found instructions, posted by an anonymous
hacker, explaining how to find out what admission decision
the business schools had made in their case. Doing so wasn’t
hard. The universities in question—Harvard, Dartmouth,
Duke, Carnegie Mellon, MIT, and Stanford—used the same
application software from Apply Yourself, Inc. Essentially, all
Case 2.1
Hacking into Harvard
43075_ch02_ptg01_hr_040-079.indd 71 8/13/12 1:01 PM
72 part one moral philosophy aNd busiNess
one had to do was change the very end of the applicant-
specific URL to get to the supposedly restricted page contain-
ing the verdict on one’s application. In the nine hours it took
Apply Yourself programmers to patch the security flaw after
it was posted, curiosity got the better of about two hundred
applicants, who couldn’t resist the temptation to discover
whether they had been admitted.19
Some of them got only blank screens. But others learned
that they had been tentatively accepted or tentatively
rejected. What they didn’t count on, however, were two
things: first, that it wouldn’t take the business schools long to
learn what had happened and who had done it and, second,
that the schools in question were going to be very unhappy
about it. Harvard was perhaps the most outspoken. Kim B.
Clark, dean of the business school, said, “This behavior is
unethical at best—a serious breach of trust that cannot be
countered by rationalization.” In a similar vein, Steve Nelson,
the executive director of Harvard’s MBA program, stated,
“Hacking into a system in this manner is unethical and also
contrary to the behavior we expect of leaders we aspire to
develop.”
It didn’t take Harvard long to make up its mind what to do
about it. It rejected all 119 applicants who had attempted to
access the information. In an official statement, Dean Clark
wrote that the mission of the Harvard Business School “is to
educate principled leaders who make a difference in the
world. To achieve that, a person must have many skills and
qualities, including the highest standards of integrity, sound
judgment and a strong moral compass—an intuitive sense of
what is right and wrong. Those who have hacked into this
web site have failed to pass that test.” Carnegie Mellon and
MIT quickly followed suit. By rejecting the ethically chal-
lenged, said Richard L. Schmalensee, dean of MIT’s Sloan
School of Management, the schools are trying to “send a
message to society as a whole that we are attempting to
produce people that when they go out into the world, they will
behave ethically.”
Duke and Dartmouth, where only a handful of students
gained access to their files, said they would take a case-by-
case approach and didn’t publicly announce their individual-
ized determinations. But, given the competition for places in
their MBA programs, it’s a safe bet that few, if any, offending
applicants were sitting in classrooms the following semester.
Forty-two applicants attempted to learn their results early at
Stanford, which took a different tack. It invited the accused
hackers to explain themselves in writing. “In the best case,
what has been demonstrated here is a lack of judgment; in
the worst case, a lack of integrity,” said Derrick Bolton,
Stanford’s director of MBA admissions. “One of the things we
try to teach at business schools is making good decisions
and taking responsibility for your actions.” Six weeks later,
however, the dean of Stanford Business School, Robert Joss,
reported, “None of those who gained unauthorized access
was able to explain his or her actions to our satisfaction.” He
added that he hoped the applicants “might learn from their
experience.”
Given the public’s concern over the wave of corporate
scandals in recent years and its growing interest in corporate
social responsibility, business writers and other media com-
mentators warmly welcomed Harvard’s decisive response.
But soon there was some sniping at the decision by those
claiming that Harvard and the other business schools had
overreacted. Although 70 percent of Harvard’s MBA students
approved the decision, the undergraduate student newspa-
per, The Crimson, was skeptical. “HBS [Harvard Business
School] has scored a media victory with its hard-line stance,”
it said in an editorial. “Americans have been looking for a sign
from the business community, particularly its leading educa-
tional institutions, that business ethics are a priority. HBS’s
false bravado has given them one, leaving 119 victims in
angry hands.”
As some critics pointed out, Harvard’s stance overlooked
the possibility that the hacker might have been a spouse or a
parent who had access to the applicant’s password and per-
sonal identification number. In fact, one applicant said that
this had happened to him. His wife found the instructions at
Businessweek Online and tried to check on the success of
his application. “I’m really distraught over this,” he said. “My
wife is tearing her hair out.” To this, Harvard’s Dean Clark
responds, “We expect applicants to be personally responsible
for the access to the website, and for the identification and
passwords they receive.”
43075_ch02_ptg01_hr_040-079.indd 72 8/13/12 1:01 PM
chapter two Normative theories of ethics 73
Critics also reject the idea that the offending applicants
were “hackers.” After all, they used their own personal identi-
fication and passwords to log on legitimately; all they did was
to modify the URL to go to a different page. They couldn’t
change anything in their files or view anyone else’s informa-
tion. In fact, some critics blamed the business schools and
Apply Yourself more than they did the applicants. If those
pages were supposed to be restricted, then it shouldn’t have
been so easy to find one’s way to them.
In an interview, one of the Harvard applicants said that
although he now sees that what he did was wrong, he wasn’t
thinking about that at the time—he just followed the hacker’s
posted instructions out of curiosity. He didn’t consider what
he did to be “hacking,” because any novice could have done
the same thing. “I’m not an IT person by any stretch of the
imagination,” he said. “I’m not even a great typist.” He wrote
the university a letter of apology. “I admitted that I got curious
and had a lapse in judgment,” he said. “I pointed out that I
wasn’t trying to harm anyone and wasn’t trying to get an
advantage over anyone.” Another applicant said that he knew
he had made a poor judgment but he was offended by having
his ethics called into question. “I had no idea that they would
have considered this a big deal.” And some of those posting
messages at Businessweek Online and other MBA-related
sites believe the offending applicants should be applauded.
“Exploiting weaknesses is what good business is all about.
Why would they ding you?” wrote one anonymous poster.
Dean Schmalensee of MIT, however, defends Harvard and
MIT’s automatically rejecting everyone who peeked “because
it wasn’t an impulsive mistake.” “The instructions are reason-
ably elaborate,” he said. “You didn’t need a degree in compu-
ter science, but this clearly involved effort. You couldn’t do
this casually without knowing that you were doing something
wrong. We’ve always taken ethics seriously, and this is a seri-
ous matter.” To those applicants who say that they didn’t do
any harm, Schmalensee replies, “Is there nothing wrong with
going through files just because you can?”
To him and others, seeking unauthorized access to
restricted pages is as wrong as snooping through your
boss’s desk to see whether you’ve been recommended
for a raise. Some commentators, however, suggest there
may be a generation gap here. Students who grew up
with the Internet, they say, tend to see it as wide-open
territory and don’t view this level of web snooping as
indicating a character flaw.
disCussion Questions
1. Suppose that you had been one of the MBA applicants
who stumbled across an opportunity to learn your results
early. What would you have done, and why? Would you
have considered it a moral decision? If so, on what basis
would you have made it?
2. Assess the morality of what the curious applicants did
from the point of view of egoism, utilitarianism, Kant’s
ethics, Ross’s pluralism, and rule utilitarianism.
3. In your view, was it wrong for the MBA applicants to take
an unauthorized peek at their application files? Explain why
you consider what they did morally permissible or imper-
missible. What obligations, ideals, and effects should the
applicants have considered? Do you think, as some have
suggested, that there is a generation gap on this issue?
4. Did Harvard and MIT overreact, or was it necessary for
them to respond as they did in order to send a strong
message about the importance of ethics? If you were a
business-school admissions official, how would you have
handled this situation?
5. Assess the argument that the applicants who snooped
were just engaging in the type of bold and aggressive
behavior that makes for business success. In your view,
are these applicants likely to make good business lead-
ers? What about the argument that it’s really the fault of
the universities for not having more secure procedures,
not the fault of the applicants who took advantage of
that fact?
6. One of the applicants admits that he used poor judg-
ment but believes that his ethics should not be ques-
tioned. What do you think he means? If he exercised
poor judgment on a question of right and wrong, isn’t
that a matter of his ethics? Stanford’s Derrick Bolton
distinguishes between a lapse of judgment and a
lack of integrity. What do you see as the difference?
Based on this episode, what, if anything, can we say
about the ethics and the character of the curious
applicants?
43075_ch02_ptg01_hr_040-079.indd 73 8/13/12 1:01 PM
Please see down few hints about W2 HW
Hint for A) select two stocks. one from each stock exchange.
Hint for B) calculate FCF years 2013 and 2014. So go to the
website of each company and get the annual reports of year
2014. (part B) and year 2017 (Part C)
· FCF = NOPAT - additional investment in operational capital
· NOPAT = EBIT (1-Tax rate) use 2014 data.
· Additional operational capital = AAA ---- BBB
· AAA = [ (cash+inventory+Account Rec) -- (Accounts
payable + Accruals) ] + Net Fixed assets
all from 2014 data
· BBB = [ (cash+inventory+Account Rec) -- (Accounts
payable + Accruals) ] + Net Fixed assets
all from 2013 data
Hint for C) get the annual reports of 2018. You have the
financial statement of 2017 and 2018.
Calculate two ratios of each category (3 categories) for each
company for each year.
Go to the income statement.
· go down to see the following:
EBIT Earnings before INTEREST and TAXES
- -
I Interest
------------------------------------------------------
EBT Earnings before taxes
- -
T Taxes
------------------------------------------------------
NI Net income
-------------------------------------------------------
to get the Tax rate = Taxes/Earnings before taxes =
T/EBT

More Related Content

Similar to chapter two  Normative theories of ethics      71• thede.docx

Cover and Thank You Letters assignment Find a job ad for a posi.docx
Cover and Thank You Letters assignment Find a job ad for a posi.docxCover and Thank You Letters assignment Find a job ad for a posi.docx
Cover and Thank You Letters assignment Find a job ad for a posi.docx
faithxdunce63732
 
Social Media's Impact on Pre-Screening
Social Media's Impact on Pre-ScreeningSocial Media's Impact on Pre-Screening
Social Media's Impact on Pre-Screening
SSDlaw
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issues
Errol A. Adams, J.D., M.L.S.
 
A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issues
Andres Baytelman
 
INSTRUCTIONS1. Read Chapter Twelve Christianity” in Invitat.docx
INSTRUCTIONS1. Read Chapter Twelve Christianity” in Invitat.docxINSTRUCTIONS1. Read Chapter Twelve Christianity” in Invitat.docx
INSTRUCTIONS1. Read Chapter Twelve Christianity” in Invitat.docx
carliotwaycave
 
New- Business Ethics Paper-6
New- Business Ethics Paper-6New- Business Ethics Paper-6
New- Business Ethics Paper-6
Morgan Kimbarow
 
REL134 v6Religion AnalysisREL134 v6Page 2 of 2Religion Ana.docx
REL134 v6Religion AnalysisREL134 v6Page 2 of 2Religion Ana.docxREL134 v6Religion AnalysisREL134 v6Page 2 of 2Religion Ana.docx
REL134 v6Religion AnalysisREL134 v6Page 2 of 2Religion Ana.docx
carlt3
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
AlexNemiroff
 

Similar to chapter two  Normative theories of ethics      71• thede.docx (20)

Handwriting Paper Roote. Online assignment writing service.
Handwriting Paper  Roote. Online assignment writing service.Handwriting Paper  Roote. Online assignment writing service.
Handwriting Paper Roote. Online assignment writing service.
 
Cover and Thank You Letters assignment Find a job ad for a posi.docx
Cover and Thank You Letters assignment Find a job ad for a posi.docxCover and Thank You Letters assignment Find a job ad for a posi.docx
Cover and Thank You Letters assignment Find a job ad for a posi.docx
 
Social Media's Impact on Pre-Screening
Social Media's Impact on Pre-ScreeningSocial Media's Impact on Pre-Screening
Social Media's Impact on Pre-Screening
 
NALP Bulletin November 2022
NALP Bulletin November 2022NALP Bulletin November 2022
NALP Bulletin November 2022
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issues
 
A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issues
 
#Legal social
#Legal social#Legal social
#Legal social
 
Ohio Means Jobs: Background Checks 101
Ohio Means Jobs: Background Checks 101Ohio Means Jobs: Background Checks 101
Ohio Means Jobs: Background Checks 101
 
INSTRUCTIONS1. Read Chapter Twelve Christianity” in Invitat.docx
INSTRUCTIONS1. Read Chapter Twelve Christianity” in Invitat.docxINSTRUCTIONS1. Read Chapter Twelve Christianity” in Invitat.docx
INSTRUCTIONS1. Read Chapter Twelve Christianity” in Invitat.docx
 
New- Business Ethics Paper-6
New- Business Ethics Paper-6New- Business Ethics Paper-6
New- Business Ethics Paper-6
 
Help to find out the facts of the above case and comment on the unethical issues
Help to find out the facts of the above case and comment on the unethical issuesHelp to find out the facts of the above case and comment on the unethical issues
Help to find out the facts of the above case and comment on the unethical issues
 
Binge drinking and partying—just a part of college, right nowadays, when env...
Binge drinking and partying—just a part of college, right  nowadays, when env...Binge drinking and partying—just a part of college, right  nowadays, when env...
Binge drinking and partying—just a part of college, right nowadays, when env...
 
Annapolis, sept. 9 nudists not only get more complete sun tans but seem to ha...
Annapolis, sept. 9 nudists not only get more complete sun tans but seem to ha...Annapolis, sept. 9 nudists not only get more complete sun tans but seem to ha...
Annapolis, sept. 9 nudists not only get more complete sun tans but seem to ha...
 
Discuss the ethics of product usage
Discuss the ethics of product usageDiscuss the ethics of product usage
Discuss the ethics of product usage
 
Do you agree with the above case what are your viewpoints for the same on th...
Do you agree with the above case  what are your viewpoints for the same on th...Do you agree with the above case  what are your viewpoints for the same on th...
Do you agree with the above case what are your viewpoints for the same on th...
 
Give an overview of the case.
Give an overview of the case.Give an overview of the case.
Give an overview of the case.
 
REL134 v6Religion AnalysisREL134 v6Page 2 of 2Religion Ana.docx
REL134 v6Religion AnalysisREL134 v6Page 2 of 2Religion Ana.docxREL134 v6Religion AnalysisREL134 v6Page 2 of 2Religion Ana.docx
REL134 v6Religion AnalysisREL134 v6Page 2 of 2Religion Ana.docx
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation Online
 

More from tiffanyd4

CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docxCHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
tiffanyd4
 
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docxChapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
tiffanyd4
 
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docxCHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
tiffanyd4
 
Chapter 4Legal Construction of the Employment Environment©vi.docx
Chapter 4Legal Construction of the Employment Environment©vi.docxChapter 4Legal Construction of the Employment Environment©vi.docx
Chapter 4Legal Construction of the Employment Environment©vi.docx
tiffanyd4
 
Chapter 2 The Law of EducationIntroductionThis chapter describ.docx
Chapter 2 The Law of EducationIntroductionThis chapter describ.docxChapter 2 The Law of EducationIntroductionThis chapter describ.docx
Chapter 2 The Law of EducationIntroductionThis chapter describ.docx
tiffanyd4
 
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docxCHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
tiffanyd4
 
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docxCHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
tiffanyd4
 
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docxCHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
tiffanyd4
 
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docxChapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
tiffanyd4
 
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docxCHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
tiffanyd4
 
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docxCHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
tiffanyd4
 
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docxChapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
tiffanyd4
 
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docxChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
tiffanyd4
 
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docxCHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
tiffanyd4
 
Chapter 10. Political Socialization The Making of a CitizenLear.docx
Chapter 10. Political Socialization The Making of a CitizenLear.docxChapter 10. Political Socialization The Making of a CitizenLear.docx
Chapter 10. Political Socialization The Making of a CitizenLear.docx
tiffanyd4
 
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docxChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
tiffanyd4
 
Chapters 4-6 Preparing Written MessagesPrepari.docx
Chapters 4-6  Preparing Written MessagesPrepari.docxChapters 4-6  Preparing Written MessagesPrepari.docx
Chapters 4-6 Preparing Written MessagesPrepari.docx
tiffanyd4
 

More from tiffanyd4 (20)

CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docxCHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
CHAPTER 3Understanding Regulations, Accreditation Criteria, and .docx
 
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docxChapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
Chapter 3 Human RightsINTERNATIONAL HUMAN RIGHTS–BASED ORGANIZ.docx
 
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docxCHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
CHAPTER 13Contributing to the ProfessionNAEYC Administrator Co.docx
 
Chapter 4Legal Construction of the Employment Environment©vi.docx
Chapter 4Legal Construction of the Employment Environment©vi.docxChapter 4Legal Construction of the Employment Environment©vi.docx
Chapter 4Legal Construction of the Employment Environment©vi.docx
 
Chapter 2 The Law of EducationIntroductionThis chapter describ.docx
Chapter 2 The Law of EducationIntroductionThis chapter describ.docxChapter 2 The Law of EducationIntroductionThis chapter describ.docx
Chapter 2 The Law of EducationIntroductionThis chapter describ.docx
 
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docxCHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
CHAPTER 1 Legal Heritage and the Digital AgeStatue of Liberty,.docx
 
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docxCHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
CHAPTER 1 BASIC CONCEPTS AND DEFINITIONS OF HUMAN SERVICESPAUL F.docx
 
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docxCHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
CHAPTER 20 Employment Law and Worker ProtectionWashington DC.docx
 
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docxChapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
Chapter 1 Global Issues Challenges of GlobalizationA GROWING .docx
 
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docxCHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
CHAPTER 23 Consumer ProtectionRestaurantFederal and state go.docx
 
Chapter 18 When looking further into the EU’s Energy Security and.docx
Chapter 18 When looking further into the EU’s Energy Security and.docxChapter 18 When looking further into the EU’s Energy Security and.docx
Chapter 18 When looking further into the EU’s Energy Security and.docx
 
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docxCHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
CHAPTER 17 Investor Protection and E-Securities TransactionsNe.docx
 
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docxChapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
Chapter 13 Law, Ethics, and Educational Leadership Making the Con.docx
 
Chapter 12 presented strategic planning and performance with Int.docx
Chapter 12 presented strategic planning and performance with Int.docxChapter 12 presented strategic planning and performance with Int.docx
Chapter 12 presented strategic planning and performance with Int.docx
 
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docxChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
ChapterTool KitChapter 7102715Corporate Valuation and Stock Valu.docx
 
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docxCHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
CHAPTER 12Working with Families and CommunitiesNAEYC Administr.docx
 
Chapter 10. Political Socialization The Making of a CitizenLear.docx
Chapter 10. Political Socialization The Making of a CitizenLear.docxChapter 10. Political Socialization The Making of a CitizenLear.docx
Chapter 10. Political Socialization The Making of a CitizenLear.docx
 
Chapters one and twoAnswer the questions in complete paragraphs .docx
Chapters one and twoAnswer the questions in complete paragraphs .docxChapters one and twoAnswer the questions in complete paragraphs .docx
Chapters one and twoAnswer the questions in complete paragraphs .docx
 
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docxChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
ChapterTool KitChapter 1212912Corporate Valuation and Financial .docx
 
Chapters 4-6 Preparing Written MessagesPrepari.docx
Chapters 4-6  Preparing Written MessagesPrepari.docxChapters 4-6  Preparing Written MessagesPrepari.docx
Chapters 4-6 Preparing Written MessagesPrepari.docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Krashi Coaching
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

chapter two  Normative theories of ethics      71• thede.docx

  • 1. chapter two Normative theories of ethics 71 • the deathbed-promise example (pp. 50–51) • business as combining self-interest and social good (or egoism and utilitarianism) (pp. 52–53) • the convenience store owner and acting from a sense of duty (p. 54) • Martin’s promise as an illustration of the categorical imperative (p. 55) • hypothetical imperatives vs. the categorical imperative (p. 56) • two alternative formulations of the categorical imperative (pp. 56–57) • three features of Kant’s ethics in an organizational context (pp. 57–58) • three critical inquiries of Kant’s ethics (pp. 58–59) • how Ross’s theory differs from utilitarianism
  • 2. and from Kant’s categorical imperative (p. 61) • four important characteristics of human rights (p. 63) • the difference between negative and positive rights (p. 63) • how rule utilitarianism differs from act utilitarianism (p. 66) • the optimal moral code and the analogy with traffic rules (p. 67) • two objectionsto rule utilitarianism (p. 67) • two points drawn from Chapter 1 that can help moral discussions (p. 68) • two-step procedure for morally evaluating actions and choices (p. 70) for furtHer refLeCtion 1. What value, if any, do you see in business students studying the basics of ethical theory? 2. Which normative theory or general approach to ethics do you find the most plausible or attractive, and why?
  • 3. 3. Can people who disagree about normative ethical theory still reach agreementon practical ethical questions in the business world? If so, how? everyone WHo Has ever appLied for admission to a selective college or who has been interviewed for a highly desired job knows the feeling of waiting impatiently to learn the result of one’s application. So it’s not hard to identify with those applicants to some of the nation’s most prestigious MBA programs who thought they had a chance to get an early glimpse at whether their ambition was to be fulfilled. While visiting a Businessweek Online message board, they found instructions, posted by an anonymous hacker, explaining how to find out what admission decision the business schools had made in their case. Doing so wasn’t hard. The universities in question—Harvard, Dartmouth, Duke, Carnegie Mellon, MIT, and Stanford—used the same application software from Apply Yourself, Inc. Essentially, all Case 2.1 Hacking into Harvard 43075_ch02_ptg01_hr_040-079.indd 71 8/13/12 1:01 PM 72 part one moral philosophy aNd busiNess one had to do was change the very end of the applicant- specific URL to get to the supposedly restricted page contain- ing the verdict on one’s application. In the nine hours it took
  • 4. Apply Yourself programmers to patch the security flaw after it was posted, curiosity got the better of about two hundred applicants, who couldn’t resist the temptation to discover whether they had been admitted.19 Some of them got only blank screens. But others learned that they had been tentatively accepted or tentatively rejected. What they didn’t count on, however, were two things: first, that it wouldn’t take the business schools long to learn what had happened and who had done it and, second, that the schools in question were going to be very unhappy about it. Harvard was perhaps the most outspoken. Kim B. Clark, dean of the business school, said, “This behavior is unethical at best—a serious breach of trust that cannot be countered by rationalization.” In a similar vein, Steve Nelson, the executive director of Harvard’s MBA program, stated, “Hacking into a system in this manner is unethical and also contrary to the behavior we expect of leaders we aspire to develop.” It didn’t take Harvard long to make up its mind what to do about it. It rejected all 119 applicants who had attempted to access the information. In an official statement, Dean Clark wrote that the mission of the Harvard Business School “is to educate principled leaders who make a difference in the world. To achieve that, a person must have many skills and qualities, including the highest standards of integrity, sound judgment and a strong moral compass—an intuitive sense of what is right and wrong. Those who have hacked into this web site have failed to pass that test.” Carnegie Mellon and MIT quickly followed suit. By rejecting the ethically chal- lenged, said Richard L. Schmalensee, dean of MIT’s Sloan School of Management, the schools are trying to “send a message to society as a whole that we are attempting to produce people that when they go out into the world, they will behave ethically.”
  • 5. Duke and Dartmouth, where only a handful of students gained access to their files, said they would take a case-by- case approach and didn’t publicly announce their individual- ized determinations. But, given the competition for places in their MBA programs, it’s a safe bet that few, if any, offending applicants were sitting in classrooms the following semester. Forty-two applicants attempted to learn their results early at Stanford, which took a different tack. It invited the accused hackers to explain themselves in writing. “In the best case, what has been demonstrated here is a lack of judgment; in the worst case, a lack of integrity,” said Derrick Bolton, Stanford’s director of MBA admissions. “One of the things we try to teach at business schools is making good decisions and taking responsibility for your actions.” Six weeks later, however, the dean of Stanford Business School, Robert Joss, reported, “None of those who gained unauthorized access was able to explain his or her actions to our satisfaction.” He added that he hoped the applicants “might learn from their experience.” Given the public’s concern over the wave of corporate scandals in recent years and its growing interest in corporate social responsibility, business writers and other media com- mentators warmly welcomed Harvard’s decisive response. But soon there was some sniping at the decision by those claiming that Harvard and the other business schools had overreacted. Although 70 percent of Harvard’s MBA students approved the decision, the undergraduate student newspa- per, The Crimson, was skeptical. “HBS [Harvard Business School] has scored a media victory with its hard-line stance,” it said in an editorial. “Americans have been looking for a sign from the business community, particularly its leading educa- tional institutions, that business ethics are a priority. HBS’s false bravado has given them one, leaving 119 victims in
  • 6. angry hands.” As some critics pointed out, Harvard’s stance overlooked the possibility that the hacker might have been a spouse or a parent who had access to the applicant’s password and per- sonal identification number. In fact, one applicant said that this had happened to him. His wife found the instructions at Businessweek Online and tried to check on the success of his application. “I’m really distraught over this,” he said. “My wife is tearing her hair out.” To this, Harvard’s Dean Clark responds, “We expect applicants to be personally responsible for the access to the website, and for the identification and passwords they receive.” 43075_ch02_ptg01_hr_040-079.indd 72 8/13/12 1:01 PM chapter two Normative theories of ethics 73 Critics also reject the idea that the offending applicants were “hackers.” After all, they used their own personal identi- fication and passwords to log on legitimately; all they did was to modify the URL to go to a different page. They couldn’t change anything in their files or view anyone else’s informa- tion. In fact, some critics blamed the business schools and Apply Yourself more than they did the applicants. If those pages were supposed to be restricted, then it shouldn’t have been so easy to find one’s way to them. In an interview, one of the Harvard applicants said that although he now sees that what he did was wrong, he wasn’t thinking about that at the time—he just followed the hacker’s posted instructions out of curiosity. He didn’t consider what he did to be “hacking,” because any novice could have done the same thing. “I’m not an IT person by any stretch of the
  • 7. imagination,” he said. “I’m not even a great typist.” He wrote the university a letter of apology. “I admitted that I got curious and had a lapse in judgment,” he said. “I pointed out that I wasn’t trying to harm anyone and wasn’t trying to get an advantage over anyone.” Another applicant said that he knew he had made a poor judgment but he was offended by having his ethics called into question. “I had no idea that they would have considered this a big deal.” And some of those posting messages at Businessweek Online and other MBA-related sites believe the offending applicants should be applauded. “Exploiting weaknesses is what good business is all about. Why would they ding you?” wrote one anonymous poster. Dean Schmalensee of MIT, however, defends Harvard and MIT’s automatically rejecting everyone who peeked “because it wasn’t an impulsive mistake.” “The instructions are reason- ably elaborate,” he said. “You didn’t need a degree in compu- ter science, but this clearly involved effort. You couldn’t do this casually without knowing that you were doing something wrong. We’ve always taken ethics seriously, and this is a seri- ous matter.” To those applicants who say that they didn’t do any harm, Schmalensee replies, “Is there nothing wrong with going through files just because you can?” To him and others, seeking unauthorized access to restricted pages is as wrong as snooping through your boss’s desk to see whether you’ve been recommended for a raise. Some commentators, however, suggest there may be a generation gap here. Students who grew up with the Internet, they say, tend to see it as wide-open territory and don’t view this level of web snooping as indicating a character flaw. disCussion Questions
  • 8. 1. Suppose that you had been one of the MBA applicants who stumbled across an opportunity to learn your results early. What would you have done, and why? Would you have considered it a moral decision? If so, on what basis would you have made it? 2. Assess the morality of what the curious applicants did from the point of view of egoism, utilitarianism, Kant’s ethics, Ross’s pluralism, and rule utilitarianism. 3. In your view, was it wrong for the MBA applicants to take an unauthorized peek at their application files? Explain why you consider what they did morally permissible or imper- missible. What obligations, ideals, and effects should the applicants have considered? Do you think, as some have suggested, that there is a generation gap on this issue? 4. Did Harvard and MIT overreact, or was it necessary for them to respond as they did in order to send a strong message about the importance of ethics? If you were a business-school admissions official, how would you have handled this situation? 5. Assess the argument that the applicants who snooped were just engaging in the type of bold and aggressive behavior that makes for business success. In your view, are these applicants likely to make good business lead- ers? What about the argument that it’s really the fault of the universities for not having more secure procedures, not the fault of the applicants who took advantage of that fact? 6. One of the applicants admits that he used poor judg- ment but believes that his ethics should not be ques- tioned. What do you think he means? If he exercised poor judgment on a question of right and wrong, isn’t
  • 9. that a matter of his ethics? Stanford’s Derrick Bolton distinguishes between a lapse of judgment and a lack of integrity. What do you see as the difference? Based on this episode, what, if anything, can we say about the ethics and the character of the curious applicants? 43075_ch02_ptg01_hr_040-079.indd 73 8/13/12 1:01 PM Please see down few hints about W2 HW Hint for A) select two stocks. one from each stock exchange. Hint for B) calculate FCF years 2013 and 2014. So go to the website of each company and get the annual reports of year 2014. (part B) and year 2017 (Part C) · FCF = NOPAT - additional investment in operational capital · NOPAT = EBIT (1-Tax rate) use 2014 data. · Additional operational capital = AAA ---- BBB · AAA = [ (cash+inventory+Account Rec) -- (Accounts payable + Accruals) ] + Net Fixed assets all from 2014 data · BBB = [ (cash+inventory+Account Rec) -- (Accounts payable + Accruals) ] + Net Fixed assets all from 2013 data Hint for C) get the annual reports of 2018. You have the financial statement of 2017 and 2018. Calculate two ratios of each category (3 categories) for each company for each year. Go to the income statement.
  • 10. · go down to see the following: EBIT Earnings before INTEREST and TAXES - - I Interest ------------------------------------------------------ EBT Earnings before taxes - - T Taxes ------------------------------------------------------ NI Net income ------------------------------------------------------- to get the Tax rate = Taxes/Earnings before taxes = T/EBT