SlideShare a Scribd company logo
1 of 4
Download to read offline
TFW LTE 10:32 ANM Assignments Position Paper Detail Submission Grade Position Paper
Due: Jul 25, 2018 at 11:59 PM Topics for Final Paper-choose a topic from the following options
. Examine the issue of insider trading Analyze the ethical issues at stake (be sure to look at the
issue from both Utilitarian and Kantian perspectives). Do you believe insider trading is ethical?
Why or why not? Be sure to support your position with reasoned argumentation (including
showing why the alternative positions are ethically weaker than your own) Write a critical essav
(either in sunnort of Previous Next Dashboard Calendar To Do Notifications Inbox
Solution
Answer ) Insider Trading and Business Ethics
Many people are complaining insider trading since it is unfair for some people who do not have
confidential information about a certain company. People who do not have information that is
not yet into the public lose their confidence and trust towards the company. Therefore, many
companies lose potential investor from insider trading. Insider trading is a huge issue among
people. Insider trading can be an unethical; yet sometimes it can be ethical.
What is Insider Trading :Insider trading is a word that has many definitions and connotations and
which includes both legal and illegal activities. It can also be described as an insider trading of a
company’s stock, securities, bonds and stock options by persons with possible access to non-
public information about the company. Nevertheless, insider trading can take place lawfully
every day, when trading by the corporate insiders such as officers, directors, employees and large
shareholders to buy or sell stock in their own companies if this trading will not be taking
advantage of the non-public information and also be within the boundaries of the company’s
policies and the rules governing this trading. However, the term “insider trading" is mostly used
to describe a practice in which an insider party trades based on non-public material information
gained through the performance of the insider’s obligation at the company, in violation of other
relationships of faith and assurance or otherwise when the non-public information was stolen
from the company. In other words, insider trading is buying, selling or dealing in securities,
bonds, and stocks of a company by a director, manager, or employee of the company who has
confidential information that is not accessible to the public.
Who is an Insider:An insider is a person who has entrée to the confidential information about a
company or corporation that will affect the stock price or might manipulate investors’ decisions.
This is “material information". Moreover, most company executives clearly have important
information about the company. For example, the manager of sales knows how much the
company has sold and if it rallies, the estimates provided with the investors. Moreover, others
who work with the company also have material information; for instance, the accountants and
auditors who do the sales forecast spreadsheets and the administrative associates who type up the
press releases are also insiders. Furthermore, other people who do not work in the company, but
with whom the company requires to allocate material information, are also insiders. Insiders
could include brokers, bankers, lawyers and much more. In an attempt to limit the risks of being
involved in legalities, a company may perform actions to restrict the number of people who have
an entrée to the material information. Regardless of these attempts, there will still be people who
are considered to be insiders.
Performing such actions will be beneficial for the company on several different levels. First, they
will restrict a person’s ability to leak information to others. Second, as an insider, certain limits
have to be placed on what that person can and cannot trade in the company’s stock and so on.
The Two Types of Insider Trading: There are two types of insider trading, legal and illegal
activities. Legal traders are performed by insiders who are familiar with the company, such as
employees of publicly traded companies often buy or sell their stocks. When insiders either buy
or sell in their own securities, they must state their actions to the SEC (Security and Exchange
Commission). Various shareholders and dealers use the information to classify companies with
their potential investment. If the insiders are buying the stock, they probably know more about
their company or corporation than anyone else, so it is a superior thing to buy stocks from the
company. To maintain the legality of the employees buying and selling, as of December 2005,
employers are obliged to announce to their employees when it is safe for them to trade without
being accused of insider trading. This is to avoid the legality issue of an insider making a buy
specifically to increase investor confidence or for reasons unrelated to the company’s health.
On the other hand, illegal traders are those who trade material information to the non-public
around the world, while the information and the efforts to impose them differ significantly.
However, the SEC’s job is to make sure that all shareholders are making choices based on
similar information. In addition, insider trading can be illegal because it ruins all choices and
confidence investors have for the company. Therefore, when investors hear of any stories about
the company’s performance, they will act based on the information acquired. In other words,
either sell their stock, or buy more depending on how well or bad the company’s performance is.
Insider trading occurs when a trade such as the selling or buying of a stock, security or bond has
been affected by the leakage of confidential information that the company has not made public.
Because this confidential information is not accessible to other shareholders and investors, a
person who uses such information is trying to expand unfair advantage over the rest of the
market. Using this important information for either buying or selling breaches clarity- the
essential foundation of a capital market. Confidential information in a clear market has to be
distributed in a way in which all market contributors receive it at more or less the same time.
Under these circumstances, one investor can have a benefit over another investor only by
acknowledging the confidential information that spread to the public. If an individual trades with
non-public information, they will gain an advantage that would be impossible for the other
investors to attain. This act is substantially prejudiced for an adequately functioning market. If
the insider trading were to be illegal, shareholders would lose their trust in the company, which
would lead to a decline in investments thus causing a great disadvantage to the company or
corporation.
The arguments fall in to two main ethical theories: Kant’s approach and utilitarian approach.
First of all, it is needed to begin by looking at utilitarian approach to moral decision making.
Utilitarianism is a general term for any view that holds that actions and policies should be
evaluated on the basis of the benefits and costs they will impose on society People should look at
the various alternatives and make cost-benefit analysis to decide a value judgment. It should
provide a common and acceptable norm for society. One problem with the utilitarian approach is
that it is impossible to precisely measure gains and losses. Several studies show that insider
trading results in a positive-sum game. There are more winners than losers. Thus, it is ethically
justified from a utilitarian perspective, at least in the cases where the result is a positive-sum
game. In the respect of Kant’s categorical imperative approach, intention is more important than
result while we behave in an action. There are some universal rules for goodness, equality and
justice of people and these rules are categorical. Kant emphasized the use of reason to work out a
consistent set of moral principles that cannot be overridden. Kant is so a deontologist.
Deontology focuses strongly on the ethical act and most deontologists have been rule
deontologists who believe that there are universal rules that provide standards of right and wrong
behavior .Deontology requires ordinarily a person may be penalized for an act only when that act
involves committing a wrong against someone.
The Ethics Involved in Insider Trading: Insider trading has managed to earn itself a dreadful
name in the recent years. People who engage in insider trading are thought to be completely
devoid of ethical values. However, not all individuals who engage in insiders trading are
unethical; studies have shown that some insider trading is useful to the investment society. Some
researchers in philosophy, law and economics have not decided whether insider trading should
be penalized at all while others state that it should be illegal in all situations. The best thing to do
is to detach those who are illegally harmed by insider trading. If such people exist, then
obviously worded legislation could be passed to stop any scheme from being faithful against
these people and groups, while allowing non- fraudulent transactions to be completed without
dread of action. Until it can obviously be shown that an insider trading fraudulently harms an
individual, there should be no law or regulation limiting the practice, since such limitations
breach individual rights, it will also destroy the competition between the people and the
company, and will most likely have a negative market response.
People often confuse the marketplace with a game in which rules of play are set and put into
action so that everyone involved gets an even chance. The market is more similar to life itself in
the sense that diverse people come with special assets, talents, looks, genetic makeup, economic
and climactic conditions; and the people have to do their best with what they have. In reality,
however, the theory of “insider trading“ used in business ethics has a wider meaning, which
includes anyone’s capability to make agreements based on not yet publicized information of the
company’s opportunities. Insider trading per se, apart from its association with fraud or violation
of fiduciary duty, involves engaging in financial investments based on information others do not
know about. It is apparent that such actions should be considered to be ethically immoral since
they affect others unfairly. The fact that some people, or to say, insiders, have information that
others don’t have, therefore, can be at a great disadvantage to the rest of the stakeholders since
they cannot make use of this possibly valuable information. If the other stakeholders had
knowledge of this information, they may have possibly acted in a different way and enjoyed the
same advantage as the insiders.
At times, one may overhear information from someone having a conversation nearby, possibly in
an elevator, bar, restaurant, or even at the barber shop. Is it wrong for others to make use of this
confidential information that they overheard? In this situation, they are considered to be insiders;
going back to the concept of life, people will do anything to live successfully. Unfortunately, by
overhearing this important piece of information, this would still result in unfairness to others.
Moreover, when a person knows confidential information about a company, they tend to become
greedy and choose to keep the information to themselves which may lead to overlooking
sensibility and rationality which is, after all the first of the cardinal virtues. Some people are pro
insider trading because it contributes to the overall effectiveness of the market’s transactions.
Those people argue that the insiders send signals to other people whose reactions can help boost
the marketplace to a higher level of effectiveness and efficiency. There might be some sense to
this line of argument, although it comes dangerously close to arguing that the end justifies the
means. Unless the actions of the person who engages in insider trading can themselves be shown
to be defensible, such arguments are no good. Insider trading, furthermore, is held ethically
suspect not because of its maximum worth to the society is denied yet, but because many
markets regard to fairness and equality which are the most vital criteria for an ethically decent
marketplace. The marketplace is engaged by the respect of people’s rights. Within the
marketplace, considering the respect of an individual’s rights insider trading is perfectly
unobjectionable.

More Related Content

Similar to TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdf

Chapter IntroductionDitty_about_summer Shutterstock.comLe
Chapter IntroductionDitty_about_summer Shutterstock.comLeChapter IntroductionDitty_about_summer Shutterstock.comLe
Chapter IntroductionDitty_about_summer Shutterstock.comLeJinElias52
 
AlyousifName Mohammed AlyousifProfessor Conne FarrelCour.docx
AlyousifName Mohammed AlyousifProfessor Conne FarrelCour.docxAlyousifName Mohammed AlyousifProfessor Conne FarrelCour.docx
AlyousifName Mohammed AlyousifProfessor Conne FarrelCour.docxnettletondevon
 
Ethics in finance
Ethics in financeEthics in finance
Ethics in financeRavi Kumar
 
Ethics 4 kerala university mba
Ethics 4 kerala university mbaEthics 4 kerala university mba
Ethics 4 kerala university mbaPOOJA UDAYAN
 
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley
 
NetZealous LLC: Ethics and Compliance Training
NetZealous LLC: Ethics and Compliance Training NetZealous LLC: Ethics and Compliance Training
NetZealous LLC: Ethics and Compliance Training NetZealous LLC
 
Law governing insider trading
Law governing insider tradingLaw governing insider trading
Law governing insider tradingPunith Manupati
 
Type Discussion BoardUnit Career TracksDue Date Tue, 3317.docx
Type Discussion BoardUnit Career TracksDue Date Tue, 3317.docxType Discussion BoardUnit Career TracksDue Date Tue, 3317.docx
Type Discussion BoardUnit Career TracksDue Date Tue, 3317.docxmarilucorr
 
30-536 Healthcare InformaticsWeek 3 Create a Database Assign.docx
30-536 Healthcare InformaticsWeek 3 Create a Database Assign.docx30-536 Healthcare InformaticsWeek 3 Create a Database Assign.docx
30-536 Healthcare InformaticsWeek 3 Create a Database Assign.docxtamicawaysmith
 
Corporate governance
Corporate governance Corporate governance
Corporate governance Tanvir Omi
 
INSIDER TRADING research paper
INSIDER TRADING research paperINSIDER TRADING research paper
INSIDER TRADING research paperManikantaARIKAPUDI
 
Mergers gibson d ip3
Mergers gibson d ip3Mergers gibson d ip3
Mergers gibson d ip3Dm Gibson
 
Insider trading ( case study : HLL v/s SEBI )
Insider trading ( case study : HLL v/s SEBI )Insider trading ( case study : HLL v/s SEBI )
Insider trading ( case study : HLL v/s SEBI )Hemita Dua
 

Similar to TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdf (15)

Chapter IntroductionDitty_about_summer Shutterstock.comLe
Chapter IntroductionDitty_about_summer Shutterstock.comLeChapter IntroductionDitty_about_summer Shutterstock.comLe
Chapter IntroductionDitty_about_summer Shutterstock.comLe
 
AlyousifName Mohammed AlyousifProfessor Conne FarrelCour.docx
AlyousifName Mohammed AlyousifProfessor Conne FarrelCour.docxAlyousifName Mohammed AlyousifProfessor Conne FarrelCour.docx
AlyousifName Mohammed AlyousifProfessor Conne FarrelCour.docx
 
Ethics in finance
Ethics in financeEthics in finance
Ethics in finance
 
Ethics 4 kerala university mba
Ethics 4 kerala university mbaEthics 4 kerala university mba
Ethics 4 kerala university mba
 
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015Dave Stampley - Reasonable Security - Security BSides NOLA 2015
Dave Stampley - Reasonable Security - Security BSides NOLA 2015
 
NetZealous LLC: Ethics and Compliance Training
NetZealous LLC: Ethics and Compliance Training NetZealous LLC: Ethics and Compliance Training
NetZealous LLC: Ethics and Compliance Training
 
Presentation2
Presentation2Presentation2
Presentation2
 
Law governing insider trading
Law governing insider tradingLaw governing insider trading
Law governing insider trading
 
Chapter # 8
Chapter # 8Chapter # 8
Chapter # 8
 
Type Discussion BoardUnit Career TracksDue Date Tue, 3317.docx
Type Discussion BoardUnit Career TracksDue Date Tue, 3317.docxType Discussion BoardUnit Career TracksDue Date Tue, 3317.docx
Type Discussion BoardUnit Career TracksDue Date Tue, 3317.docx
 
30-536 Healthcare InformaticsWeek 3 Create a Database Assign.docx
30-536 Healthcare InformaticsWeek 3 Create a Database Assign.docx30-536 Healthcare InformaticsWeek 3 Create a Database Assign.docx
30-536 Healthcare InformaticsWeek 3 Create a Database Assign.docx
 
Corporate governance
Corporate governance Corporate governance
Corporate governance
 
INSIDER TRADING research paper
INSIDER TRADING research paperINSIDER TRADING research paper
INSIDER TRADING research paper
 
Mergers gibson d ip3
Mergers gibson d ip3Mergers gibson d ip3
Mergers gibson d ip3
 
Insider trading ( case study : HLL v/s SEBI )
Insider trading ( case study : HLL v/s SEBI )Insider trading ( case study : HLL v/s SEBI )
Insider trading ( case study : HLL v/s SEBI )
 

More from tesmondday29076

Dividing a linked list into two sublists of almost equal sizesa. A.pdf
Dividing a linked list into two sublists of almost equal sizesa. A.pdfDividing a linked list into two sublists of almost equal sizesa. A.pdf
Dividing a linked list into two sublists of almost equal sizesa. A.pdftesmondday29076
 
in experiment simple staining what other dyes can be used for direct.pdf
in experiment simple staining what other dyes can be used for direct.pdfin experiment simple staining what other dyes can be used for direct.pdf
in experiment simple staining what other dyes can be used for direct.pdftesmondday29076
 
Discuss techniques and methods of presenting financial data for non-.pdf
Discuss techniques and methods of presenting financial data for non-.pdfDiscuss techniques and methods of presenting financial data for non-.pdf
Discuss techniques and methods of presenting financial data for non-.pdftesmondday29076
 
How many Translational and how many Rotational DOF(s) are in this sy.pdf
How many Translational and how many Rotational DOF(s) are in this sy.pdfHow many Translational and how many Rotational DOF(s) are in this sy.pdf
How many Translational and how many Rotational DOF(s) are in this sy.pdftesmondday29076
 
fundamentals of taxation.pdf
fundamentals of taxation.pdffundamentals of taxation.pdf
fundamentals of taxation.pdftesmondday29076
 
Data Project 1-use a significance level of 0.05Companies in the Do.pdf
Data Project 1-use a significance level of 0.05Companies in the Do.pdfData Project 1-use a significance level of 0.05Companies in the Do.pdf
Data Project 1-use a significance level of 0.05Companies in the Do.pdftesmondday29076
 
Define relational database. Why has it been predicted that the relat.pdf
Define relational database. Why has it been predicted that the relat.pdfDefine relational database. Why has it been predicted that the relat.pdf
Define relational database. Why has it been predicted that the relat.pdftesmondday29076
 
Check ALL of the following characteristics that make animals differen.pdf
Check ALL of the following characteristics that make animals differen.pdfCheck ALL of the following characteristics that make animals differen.pdf
Check ALL of the following characteristics that make animals differen.pdftesmondday29076
 
A blood clot had been silently forming in Adam Parkers left anterio.pdf
A blood clot had been silently forming in Adam Parkers left anterio.pdfA blood clot had been silently forming in Adam Parkers left anterio.pdf
A blood clot had been silently forming in Adam Parkers left anterio.pdftesmondday29076
 
what does it takes to be a living organ Assignment Please answer th.pdf
what does it takes to be a living organ Assignment Please answer th.pdfwhat does it takes to be a living organ Assignment Please answer th.pdf
what does it takes to be a living organ Assignment Please answer th.pdftesmondday29076
 
6. How many 6-symbol computer passwords can be formed if the first t.pdf
6. How many 6-symbol computer passwords can be formed if the first t.pdf6. How many 6-symbol computer passwords can be formed if the first t.pdf
6. How many 6-symbol computer passwords can be formed if the first t.pdftesmondday29076
 
What is a SIFI and how does it related to “too big to fail” Describ.pdf
What is a SIFI and how does it related to “too big to fail” Describ.pdfWhat is a SIFI and how does it related to “too big to fail” Describ.pdf
What is a SIFI and how does it related to “too big to fail” Describ.pdftesmondday29076
 
The clade afrotheria includes a diverse variety of species, but are .pdf
The clade afrotheria includes a diverse variety of species, but are .pdfThe clade afrotheria includes a diverse variety of species, but are .pdf
The clade afrotheria includes a diverse variety of species, but are .pdftesmondday29076
 
The enrollment in a certain course is 10 first year students, 30 s.pdf
The enrollment in a certain course is 10 first year students, 30 s.pdfThe enrollment in a certain course is 10 first year students, 30 s.pdf
The enrollment in a certain course is 10 first year students, 30 s.pdftesmondday29076
 
Summarize the main characteristic of insectsSolution1.Insects .pdf
Summarize the main characteristic of insectsSolution1.Insects .pdfSummarize the main characteristic of insectsSolution1.Insects .pdf
Summarize the main characteristic of insectsSolution1.Insects .pdftesmondday29076
 
Put the following taxonomic hierarchy of classification groups in ord.pdf
Put the following taxonomic hierarchy of classification groups in ord.pdfPut the following taxonomic hierarchy of classification groups in ord.pdf
Put the following taxonomic hierarchy of classification groups in ord.pdftesmondday29076
 
please help in microprocessor course (NO handwriting) What is multi-.pdf
please help in microprocessor course (NO handwriting) What is multi-.pdfplease help in microprocessor course (NO handwriting) What is multi-.pdf
please help in microprocessor course (NO handwriting) What is multi-.pdftesmondday29076
 
List some applications of surveying in Geology, Forestry, and archeo.pdf
List some applications of surveying in Geology, Forestry, and archeo.pdfList some applications of surveying in Geology, Forestry, and archeo.pdf
List some applications of surveying in Geology, Forestry, and archeo.pdftesmondday29076
 
- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf
- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf
- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdftesmondday29076
 
1 List the basic steps in securing an operating system. Assume that.pdf
1 List the basic steps in securing an operating system. Assume that.pdf1 List the basic steps in securing an operating system. Assume that.pdf
1 List the basic steps in securing an operating system. Assume that.pdftesmondday29076
 

More from tesmondday29076 (20)

Dividing a linked list into two sublists of almost equal sizesa. A.pdf
Dividing a linked list into two sublists of almost equal sizesa. A.pdfDividing a linked list into two sublists of almost equal sizesa. A.pdf
Dividing a linked list into two sublists of almost equal sizesa. A.pdf
 
in experiment simple staining what other dyes can be used for direct.pdf
in experiment simple staining what other dyes can be used for direct.pdfin experiment simple staining what other dyes can be used for direct.pdf
in experiment simple staining what other dyes can be used for direct.pdf
 
Discuss techniques and methods of presenting financial data for non-.pdf
Discuss techniques and methods of presenting financial data for non-.pdfDiscuss techniques and methods of presenting financial data for non-.pdf
Discuss techniques and methods of presenting financial data for non-.pdf
 
How many Translational and how many Rotational DOF(s) are in this sy.pdf
How many Translational and how many Rotational DOF(s) are in this sy.pdfHow many Translational and how many Rotational DOF(s) are in this sy.pdf
How many Translational and how many Rotational DOF(s) are in this sy.pdf
 
fundamentals of taxation.pdf
fundamentals of taxation.pdffundamentals of taxation.pdf
fundamentals of taxation.pdf
 
Data Project 1-use a significance level of 0.05Companies in the Do.pdf
Data Project 1-use a significance level of 0.05Companies in the Do.pdfData Project 1-use a significance level of 0.05Companies in the Do.pdf
Data Project 1-use a significance level of 0.05Companies in the Do.pdf
 
Define relational database. Why has it been predicted that the relat.pdf
Define relational database. Why has it been predicted that the relat.pdfDefine relational database. Why has it been predicted that the relat.pdf
Define relational database. Why has it been predicted that the relat.pdf
 
Check ALL of the following characteristics that make animals differen.pdf
Check ALL of the following characteristics that make animals differen.pdfCheck ALL of the following characteristics that make animals differen.pdf
Check ALL of the following characteristics that make animals differen.pdf
 
A blood clot had been silently forming in Adam Parkers left anterio.pdf
A blood clot had been silently forming in Adam Parkers left anterio.pdfA blood clot had been silently forming in Adam Parkers left anterio.pdf
A blood clot had been silently forming in Adam Parkers left anterio.pdf
 
what does it takes to be a living organ Assignment Please answer th.pdf
what does it takes to be a living organ Assignment Please answer th.pdfwhat does it takes to be a living organ Assignment Please answer th.pdf
what does it takes to be a living organ Assignment Please answer th.pdf
 
6. How many 6-symbol computer passwords can be formed if the first t.pdf
6. How many 6-symbol computer passwords can be formed if the first t.pdf6. How many 6-symbol computer passwords can be formed if the first t.pdf
6. How many 6-symbol computer passwords can be formed if the first t.pdf
 
What is a SIFI and how does it related to “too big to fail” Describ.pdf
What is a SIFI and how does it related to “too big to fail” Describ.pdfWhat is a SIFI and how does it related to “too big to fail” Describ.pdf
What is a SIFI and how does it related to “too big to fail” Describ.pdf
 
The clade afrotheria includes a diverse variety of species, but are .pdf
The clade afrotheria includes a diverse variety of species, but are .pdfThe clade afrotheria includes a diverse variety of species, but are .pdf
The clade afrotheria includes a diverse variety of species, but are .pdf
 
The enrollment in a certain course is 10 first year students, 30 s.pdf
The enrollment in a certain course is 10 first year students, 30 s.pdfThe enrollment in a certain course is 10 first year students, 30 s.pdf
The enrollment in a certain course is 10 first year students, 30 s.pdf
 
Summarize the main characteristic of insectsSolution1.Insects .pdf
Summarize the main characteristic of insectsSolution1.Insects .pdfSummarize the main characteristic of insectsSolution1.Insects .pdf
Summarize the main characteristic of insectsSolution1.Insects .pdf
 
Put the following taxonomic hierarchy of classification groups in ord.pdf
Put the following taxonomic hierarchy of classification groups in ord.pdfPut the following taxonomic hierarchy of classification groups in ord.pdf
Put the following taxonomic hierarchy of classification groups in ord.pdf
 
please help in microprocessor course (NO handwriting) What is multi-.pdf
please help in microprocessor course (NO handwriting) What is multi-.pdfplease help in microprocessor course (NO handwriting) What is multi-.pdf
please help in microprocessor course (NO handwriting) What is multi-.pdf
 
List some applications of surveying in Geology, Forestry, and archeo.pdf
List some applications of surveying in Geology, Forestry, and archeo.pdfList some applications of surveying in Geology, Forestry, and archeo.pdf
List some applications of surveying in Geology, Forestry, and archeo.pdf
 
- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf
- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf
- -0+00- 1+00_ 1+40_ 2 +00 2+40 3+00 Solution1) Chang.pdf
 
1 List the basic steps in securing an operating system. Assume that.pdf
1 List the basic steps in securing an operating system. Assume that.pdf1 List the basic steps in securing an operating system. Assume that.pdf
1 List the basic steps in securing an operating system. Assume that.pdf
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

TFW LTE 1032 ANM Assignments Position Paper Detail Submission Grade .pdf

  • 1. TFW LTE 10:32 ANM Assignments Position Paper Detail Submission Grade Position Paper Due: Jul 25, 2018 at 11:59 PM Topics for Final Paper-choose a topic from the following options . Examine the issue of insider trading Analyze the ethical issues at stake (be sure to look at the issue from both Utilitarian and Kantian perspectives). Do you believe insider trading is ethical? Why or why not? Be sure to support your position with reasoned argumentation (including showing why the alternative positions are ethically weaker than your own) Write a critical essav (either in sunnort of Previous Next Dashboard Calendar To Do Notifications Inbox Solution Answer ) Insider Trading and Business Ethics Many people are complaining insider trading since it is unfair for some people who do not have confidential information about a certain company. People who do not have information that is not yet into the public lose their confidence and trust towards the company. Therefore, many companies lose potential investor from insider trading. Insider trading is a huge issue among people. Insider trading can be an unethical; yet sometimes it can be ethical. What is Insider Trading :Insider trading is a word that has many definitions and connotations and which includes both legal and illegal activities. It can also be described as an insider trading of a company’s stock, securities, bonds and stock options by persons with possible access to non- public information about the company. Nevertheless, insider trading can take place lawfully every day, when trading by the corporate insiders such as officers, directors, employees and large shareholders to buy or sell stock in their own companies if this trading will not be taking advantage of the non-public information and also be within the boundaries of the company’s policies and the rules governing this trading. However, the term “insider trading" is mostly used to describe a practice in which an insider party trades based on non-public material information gained through the performance of the insider’s obligation at the company, in violation of other relationships of faith and assurance or otherwise when the non-public information was stolen from the company. In other words, insider trading is buying, selling or dealing in securities, bonds, and stocks of a company by a director, manager, or employee of the company who has confidential information that is not accessible to the public. Who is an Insider:An insider is a person who has entrée to the confidential information about a company or corporation that will affect the stock price or might manipulate investors’ decisions. This is “material information". Moreover, most company executives clearly have important information about the company. For example, the manager of sales knows how much the company has sold and if it rallies, the estimates provided with the investors. Moreover, others who work with the company also have material information; for instance, the accountants and
  • 2. auditors who do the sales forecast spreadsheets and the administrative associates who type up the press releases are also insiders. Furthermore, other people who do not work in the company, but with whom the company requires to allocate material information, are also insiders. Insiders could include brokers, bankers, lawyers and much more. In an attempt to limit the risks of being involved in legalities, a company may perform actions to restrict the number of people who have an entrée to the material information. Regardless of these attempts, there will still be people who are considered to be insiders. Performing such actions will be beneficial for the company on several different levels. First, they will restrict a person’s ability to leak information to others. Second, as an insider, certain limits have to be placed on what that person can and cannot trade in the company’s stock and so on. The Two Types of Insider Trading: There are two types of insider trading, legal and illegal activities. Legal traders are performed by insiders who are familiar with the company, such as employees of publicly traded companies often buy or sell their stocks. When insiders either buy or sell in their own securities, they must state their actions to the SEC (Security and Exchange Commission). Various shareholders and dealers use the information to classify companies with their potential investment. If the insiders are buying the stock, they probably know more about their company or corporation than anyone else, so it is a superior thing to buy stocks from the company. To maintain the legality of the employees buying and selling, as of December 2005, employers are obliged to announce to their employees when it is safe for them to trade without being accused of insider trading. This is to avoid the legality issue of an insider making a buy specifically to increase investor confidence or for reasons unrelated to the company’s health. On the other hand, illegal traders are those who trade material information to the non-public around the world, while the information and the efforts to impose them differ significantly. However, the SEC’s job is to make sure that all shareholders are making choices based on similar information. In addition, insider trading can be illegal because it ruins all choices and confidence investors have for the company. Therefore, when investors hear of any stories about the company’s performance, they will act based on the information acquired. In other words, either sell their stock, or buy more depending on how well or bad the company’s performance is. Insider trading occurs when a trade such as the selling or buying of a stock, security or bond has been affected by the leakage of confidential information that the company has not made public. Because this confidential information is not accessible to other shareholders and investors, a person who uses such information is trying to expand unfair advantage over the rest of the market. Using this important information for either buying or selling breaches clarity- the essential foundation of a capital market. Confidential information in a clear market has to be distributed in a way in which all market contributors receive it at more or less the same time. Under these circumstances, one investor can have a benefit over another investor only by
  • 3. acknowledging the confidential information that spread to the public. If an individual trades with non-public information, they will gain an advantage that would be impossible for the other investors to attain. This act is substantially prejudiced for an adequately functioning market. If the insider trading were to be illegal, shareholders would lose their trust in the company, which would lead to a decline in investments thus causing a great disadvantage to the company or corporation. The arguments fall in to two main ethical theories: Kant’s approach and utilitarian approach. First of all, it is needed to begin by looking at utilitarian approach to moral decision making. Utilitarianism is a general term for any view that holds that actions and policies should be evaluated on the basis of the benefits and costs they will impose on society People should look at the various alternatives and make cost-benefit analysis to decide a value judgment. It should provide a common and acceptable norm for society. One problem with the utilitarian approach is that it is impossible to precisely measure gains and losses. Several studies show that insider trading results in a positive-sum game. There are more winners than losers. Thus, it is ethically justified from a utilitarian perspective, at least in the cases where the result is a positive-sum game. In the respect of Kant’s categorical imperative approach, intention is more important than result while we behave in an action. There are some universal rules for goodness, equality and justice of people and these rules are categorical. Kant emphasized the use of reason to work out a consistent set of moral principles that cannot be overridden. Kant is so a deontologist. Deontology focuses strongly on the ethical act and most deontologists have been rule deontologists who believe that there are universal rules that provide standards of right and wrong behavior .Deontology requires ordinarily a person may be penalized for an act only when that act involves committing a wrong against someone. The Ethics Involved in Insider Trading: Insider trading has managed to earn itself a dreadful name in the recent years. People who engage in insider trading are thought to be completely devoid of ethical values. However, not all individuals who engage in insiders trading are unethical; studies have shown that some insider trading is useful to the investment society. Some researchers in philosophy, law and economics have not decided whether insider trading should be penalized at all while others state that it should be illegal in all situations. The best thing to do is to detach those who are illegally harmed by insider trading. If such people exist, then obviously worded legislation could be passed to stop any scheme from being faithful against these people and groups, while allowing non- fraudulent transactions to be completed without dread of action. Until it can obviously be shown that an insider trading fraudulently harms an individual, there should be no law or regulation limiting the practice, since such limitations breach individual rights, it will also destroy the competition between the people and the company, and will most likely have a negative market response.
  • 4. People often confuse the marketplace with a game in which rules of play are set and put into action so that everyone involved gets an even chance. The market is more similar to life itself in the sense that diverse people come with special assets, talents, looks, genetic makeup, economic and climactic conditions; and the people have to do their best with what they have. In reality, however, the theory of “insider trading“ used in business ethics has a wider meaning, which includes anyone’s capability to make agreements based on not yet publicized information of the company’s opportunities. Insider trading per se, apart from its association with fraud or violation of fiduciary duty, involves engaging in financial investments based on information others do not know about. It is apparent that such actions should be considered to be ethically immoral since they affect others unfairly. The fact that some people, or to say, insiders, have information that others don’t have, therefore, can be at a great disadvantage to the rest of the stakeholders since they cannot make use of this possibly valuable information. If the other stakeholders had knowledge of this information, they may have possibly acted in a different way and enjoyed the same advantage as the insiders. At times, one may overhear information from someone having a conversation nearby, possibly in an elevator, bar, restaurant, or even at the barber shop. Is it wrong for others to make use of this confidential information that they overheard? In this situation, they are considered to be insiders; going back to the concept of life, people will do anything to live successfully. Unfortunately, by overhearing this important piece of information, this would still result in unfairness to others. Moreover, when a person knows confidential information about a company, they tend to become greedy and choose to keep the information to themselves which may lead to overlooking sensibility and rationality which is, after all the first of the cardinal virtues. Some people are pro insider trading because it contributes to the overall effectiveness of the market’s transactions. Those people argue that the insiders send signals to other people whose reactions can help boost the marketplace to a higher level of effectiveness and efficiency. There might be some sense to this line of argument, although it comes dangerously close to arguing that the end justifies the means. Unless the actions of the person who engages in insider trading can themselves be shown to be defensible, such arguments are no good. Insider trading, furthermore, is held ethically suspect not because of its maximum worth to the society is denied yet, but because many markets regard to fairness and equality which are the most vital criteria for an ethically decent marketplace. The marketplace is engaged by the respect of people’s rights. Within the marketplace, considering the respect of an individual’s rights insider trading is perfectly unobjectionable.