SlideShare a Scribd company logo
Discussion Post 6
Complete the Assurance of Learning Exercise of your text;
“Ethics of Spying on Competitors.”
When complete, select the one ethical choice/example (from
the list) that you struggled with in terms
of determining whether it is ethical or not. Write a short
narrative stating which scenario was the most
difficult to decide, how you made you final decision.
1. Buying competitors’ garbage: U, I
2. Dissecting competitors’ products: E, L
3. taking competitors’ plant tours anonymously: E, L
4. counting tractor-trailer trucks leaving competitors’ loading
bays: E, L
5. Studying aerial photographs of competitors’ facilities: E, L
6. analyzing competitors’ labor contracts: E, L
7. analyzing competitors’ help-wanted ads: E, L
8. Quizzing customers and buyers about the sales of
competitors’ products: E, L
9. infiltrating customers’ and competitors’ business operations:
U, I
10. Quizzing suppliers about competitors’ level of
manufacturing: E, L
11. Using customers to buy out phony bids: U, I
12. encouraging key customers to reveal competitive
information: E, L
13. Quizzing competitors’ former employees: U, L
14. interviewing consultants who may have worked with
competitors: E, L
15. Hiring key managers away from competitors: U, L
16. conducting phony job interviews to get competitors’
employees to reveal information: U, I
17. Sending engineers to trade meetings to quiz competitors’
technical employees: E, L
18. Quizzing potential employees who worked for or with
competitors: E, L
Going through all the scenario’s I would have to say that
number 15, hiring key managers away
from competitors, was the most difficult ethical decision. When
thinking about this scenario, there are
many different possibilities that come to mind, which muddy the
waters. In my mind it would depend
on how you go about doing it, by directly approaching the
managers, or by posting opportunities with
better incentive that draw managers away. If as an
organization, you can offer a more lucrative position
which happens to draw away managers, I don’t see this as
unethical. If you directly approach a key
manager with the intention of undermining the competition, I
would view this as unethical. Ultimately,
the intent behind the action is what determines the whether the
action is ethical or not.
Also, another confounding factor in this scenario is the fact that
most key managers will sign
non-competes as part of their contracts. I do not imagine too
many top managers can be stolen away by
competitors, due to the legal implications of breaking a non-
compete. For this scenario, I ultimately
decided that this was unethical, because the intent is likely to
undermine the competition.
Strategic Management Module 6 - Discussion
Complete the Assurance of Learning Exercise of your text;
“Ethics of Spying on Competitors.”
When complete, select the one ethical choice/example (from the
list) that you struggled with in
terms of determining whether it is ethical or not. Write a short
narrative stating which scenario was
the most difficult to decide, how you made you final decision.
1. Buying competitors’ garbage – U/L
2. Dissecting competitors’ products – E/L
3. taking competitors’ plant tours anonymously – E/L
4. counting tractor-trailer trucks leaving competitors’ loading
bays – E/L
5. Studying aerial photographs of competitors’ facilities – U/L
6. analyzing competitors’ labor contracts – E/L
7. analyzing competitors’ help-wanted ads – E/L
8. Quizzing customers and buyers about the sales of
competitors’ products – E/L
9. infiltrating customers’ and competitors’ business operations
U/L
10. Quizzing suppliers about competitors’ level of
manufacturing – E/L
11. Using customers to buy out phony bids – U/I
12. encouraging key customers to reveal competitive
information – U/L
13. Quizzing competitors’ former employees – E/L
14. interviewing consultants who may have worked with
competitors – E/L
15. Hiring key managers away from competitors – E/L
16. conducting phony job interviews to get competitors’
employees to reveal information – U/I
17. Sending engineers to trade meetings to quiz competitors’
technical employees – E/L
18. Quizzing potential employees who worked for or with
competitors – E/L
I struggled with number three – taking competitor’s pant tours
anonymously. This type of behavior appears
untrustworthy and based on one of the Seven Principles of
Admirable Business Ethics, businesses should
follow the motto, “do unto others as you would have them do
unto you,” (David and David, 2017).
Businesses should remain abreast of competitors’ progress;
however, the knowledge should be researched
and presented within the scope of ethics. I choose this act as
ethical because the competitor may not have
requested information such as name and company information
for tours. However, the organization should
have been transparent with its competitor before initiating the
tour.
#11 & 16
Infiltrating customers’ and competitors’ business operations.
The action that led to the infiltration must be explored
before declaring the act illegal. Illegal activities are defined in
law and punishable.
David, F. R. & David, F. R. (2017). Strategic management: A
competitive advantage approach (16th ed.). Florence,
South Carolina. Pearson

More Related Content

Similar to Discussion Post 6 Complete the Assurance of Learning Exerc

The 2 sides and 4 stages of B2B competitive analysis (1).pptx
The 2 sides and 4 stages of B2B competitive analysis  (1).pptxThe 2 sides and 4 stages of B2B competitive analysis  (1).pptx
The 2 sides and 4 stages of B2B competitive analysis (1).pptx
Viewyonder
 
Top 10 consolidated questions
Top 10 consolidated questionsTop 10 consolidated questions
Top 10 consolidated questionschingmarcial
 
Top 10 Q's: Conducting market research and forecasting demand with reference
Top 10 Q's: Conducting market research and forecasting demand with referenceTop 10 Q's: Conducting market research and forecasting demand with reference
Top 10 Q's: Conducting market research and forecasting demand with reference
Mark Anthony
 
Top 10 Improved Learning Questions by Ivy Villamor
Top 10 Improved Learning Questions by Ivy VillamorTop 10 Improved Learning Questions by Ivy Villamor
Top 10 Improved Learning Questions by Ivy Villamor
Ivy Villamor
 
Business PaperDescriptionThe business analysis paper sh.docx
Business PaperDescriptionThe business analysis paper sh.docxBusiness PaperDescriptionThe business analysis paper sh.docx
Business PaperDescriptionThe business analysis paper sh.docx
RAHUL126667
 
Unit 4 [AB299 Associates Capstone in Management]Assignmen.docx
Unit 4     [AB299 Associates Capstone in Management]Assignmen.docxUnit 4     [AB299 Associates Capstone in Management]Assignmen.docx
Unit 4 [AB299 Associates Capstone in Management]Assignmen.docx
dickonsondorris
 
Competitor analysis report format
Competitor analysis report formatCompetitor analysis report format
Competitor analysis report format
Mayank Ranjan
 
Innovation-Business Models Chapter 12.pptx
Innovation-Business Models Chapter 12.pptxInnovation-Business Models Chapter 12.pptx
Innovation-Business Models Chapter 12.pptx
AartiPandey63
 
How Voice of the Customer Via Employees Can Harness Frontline Insights
How Voice of the Customer Via Employees Can Harness Frontline InsightsHow Voice of the Customer Via Employees Can Harness Frontline Insights
How Voice of the Customer Via Employees Can Harness Frontline InsightsIntelCollab.com
 
The Market Research
The Market ResearchThe Market Research
The Market Research
jani muni
 
Consolidated questions (Chapters 10-18)
Consolidated questions (Chapters 10-18)Consolidated questions (Chapters 10-18)
Consolidated questions (Chapters 10-18)kathleenmamaradlo
 
Discussion Questions Chapter 15Terms in Review1Define or exp.docx
Discussion Questions Chapter 15Terms in Review1Define or exp.docxDiscussion Questions Chapter 15Terms in Review1Define or exp.docx
Discussion Questions Chapter 15Terms in Review1Define or exp.docx
edgar6wallace88877
 
White Paper: Unpacking competitive bidding methods
White Paper: Unpacking competitive bidding methodsWhite Paper: Unpacking competitive bidding methods
White Paper: Unpacking competitive bidding methods
Henrik Jarleskog
 
exam project logistic.dvgtgtgtgggtgrgrgrocx
exam project logistic.dvgtgtgtgggtgrgrgrocxexam project logistic.dvgtgtgtgggtgrgrgrocx
exam project logistic.dvgtgtgtgggtgrgrgrocx
habtamuteferi07
 
Webinar_Write Right_Final.pdf
Webinar_Write Right_Final.pdfWebinar_Write Right_Final.pdf
Webinar_Write Right_Final.pdf
Brad Douglas
 
The search for Product-Market Fit
The search for Product-Market FitThe search for Product-Market Fit
The search for Product-Market Fit
Jérôme Kehrli
 
Disrupted Links in the Performance Management Process at Omega, I.docx
Disrupted Links in the Performance Management Process at Omega, I.docxDisrupted Links in the Performance Management Process at Omega, I.docx
Disrupted Links in the Performance Management Process at Omega, I.docx
madlynplamondon
 
9 Habits For Successful Tendering v1.4
9 Habits For Successful Tendering v1.49 Habits For Successful Tendering v1.4
9 Habits For Successful Tendering v1.4Mark Mansfield
 

Similar to Discussion Post 6 Complete the Assurance of Learning Exerc (20)

The 2 sides and 4 stages of B2B competitive analysis (1).pptx
The 2 sides and 4 stages of B2B competitive analysis  (1).pptxThe 2 sides and 4 stages of B2B competitive analysis  (1).pptx
The 2 sides and 4 stages of B2B competitive analysis (1).pptx
 
Top 10 consolidated questions
Top 10 consolidated questionsTop 10 consolidated questions
Top 10 consolidated questions
 
Top 10 Q's: Conducting market research and forecasting demand with reference
Top 10 Q's: Conducting market research and forecasting demand with referenceTop 10 Q's: Conducting market research and forecasting demand with reference
Top 10 Q's: Conducting market research and forecasting demand with reference
 
Top 10 Improved Learning Questions by Ivy Villamor
Top 10 Improved Learning Questions by Ivy VillamorTop 10 Improved Learning Questions by Ivy Villamor
Top 10 Improved Learning Questions by Ivy Villamor
 
Business PaperDescriptionThe business analysis paper sh.docx
Business PaperDescriptionThe business analysis paper sh.docxBusiness PaperDescriptionThe business analysis paper sh.docx
Business PaperDescriptionThe business analysis paper sh.docx
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Unit 4 [AB299 Associates Capstone in Management]Assignmen.docx
Unit 4     [AB299 Associates Capstone in Management]Assignmen.docxUnit 4     [AB299 Associates Capstone in Management]Assignmen.docx
Unit 4 [AB299 Associates Capstone in Management]Assignmen.docx
 
Competitor analysis report format
Competitor analysis report formatCompetitor analysis report format
Competitor analysis report format
 
Innovation-Business Models Chapter 12.pptx
Innovation-Business Models Chapter 12.pptxInnovation-Business Models Chapter 12.pptx
Innovation-Business Models Chapter 12.pptx
 
How Voice of the Customer Via Employees Can Harness Frontline Insights
How Voice of the Customer Via Employees Can Harness Frontline InsightsHow Voice of the Customer Via Employees Can Harness Frontline Insights
How Voice of the Customer Via Employees Can Harness Frontline Insights
 
The Market Research
The Market ResearchThe Market Research
The Market Research
 
Consolidated questions (Chapters 10-18)
Consolidated questions (Chapters 10-18)Consolidated questions (Chapters 10-18)
Consolidated questions (Chapters 10-18)
 
Discussion Questions Chapter 15Terms in Review1Define or exp.docx
Discussion Questions Chapter 15Terms in Review1Define or exp.docxDiscussion Questions Chapter 15Terms in Review1Define or exp.docx
Discussion Questions Chapter 15Terms in Review1Define or exp.docx
 
White Paper: Unpacking competitive bidding methods
White Paper: Unpacking competitive bidding methodsWhite Paper: Unpacking competitive bidding methods
White Paper: Unpacking competitive bidding methods
 
exam project logistic.dvgtgtgtgggtgrgrgrocx
exam project logistic.dvgtgtgtgggtgrgrgrocxexam project logistic.dvgtgtgtgggtgrgrgrocx
exam project logistic.dvgtgtgtgggtgrgrgrocx
 
Webinar_Write Right_Final.pdf
Webinar_Write Right_Final.pdfWebinar_Write Right_Final.pdf
Webinar_Write Right_Final.pdf
 
The search for Product-Market Fit
The search for Product-Market FitThe search for Product-Market Fit
The search for Product-Market Fit
 
Disrupted Links in the Performance Management Process at Omega, I.docx
Disrupted Links in the Performance Management Process at Omega, I.docxDisrupted Links in the Performance Management Process at Omega, I.docx
Disrupted Links in the Performance Management Process at Omega, I.docx
 
SME Chapter 2
SME Chapter 2SME Chapter 2
SME Chapter 2
 
9 Habits For Successful Tendering v1.4
9 Habits For Successful Tendering v1.49 Habits For Successful Tendering v1.4
9 Habits For Successful Tendering v1.4
 

More from widdowsonerica

Information Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docxInformation Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docx
widdowsonerica
 
Information to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docxInformation to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docx
widdowsonerica
 
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxInformation and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
widdowsonerica
 
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docxInfectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
widdowsonerica
 
Information Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docxInformation Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docx
widdowsonerica
 
Information Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docxInformation Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docx
widdowsonerica
 
Information PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docxInformation PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docx
widdowsonerica
 
INF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docxINF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docx
widdowsonerica
 
Information Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docxInformation Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docx
widdowsonerica
 
Information System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docxInformation System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docx
widdowsonerica
 
Individuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docxIndividuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docx
widdowsonerica
 
Information Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docxInformation Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docx
widdowsonerica
 
Individuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docxIndividuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docx
widdowsonerica
 
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docxIndustry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
widdowsonerica
 
Information is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docxInformation is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docx
widdowsonerica
 
Individuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docxIndividuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docx
widdowsonerica
 
Infectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docxInfectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docx
widdowsonerica
 
Individual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docxIndividual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docx
widdowsonerica
 
Individual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docxIndividual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docx
widdowsonerica
 
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docxIndividual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
widdowsonerica
 

More from widdowsonerica (20)

Information Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docxInformation Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docx
 
Information to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docxInformation to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docx
 
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxInformation and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
 
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docxInfectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
 
Information Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docxInformation Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docx
 
Information Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docxInformation Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docx
 
Information PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docxInformation PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docx
 
INF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docxINF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docx
 
Information Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docxInformation Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docx
 
Information System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docxInformation System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docx
 
Individuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docxIndividuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docx
 
Information Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docxInformation Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docx
 
Individuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docxIndividuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docx
 
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docxIndustry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
 
Information is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docxInformation is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docx
 
Individuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docxIndividuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docx
 
Infectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docxInfectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docx
 
Individual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docxIndividual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docx
 
Individual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docxIndividual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docx
 
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docxIndividual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
 

Recently uploaded

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 

Recently uploaded (20)

Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 

Discussion Post 6 Complete the Assurance of Learning Exerc

  • 1. Discussion Post 6 Complete the Assurance of Learning Exercise of your text; “Ethics of Spying on Competitors.” When complete, select the one ethical choice/example (from the list) that you struggled with in terms of determining whether it is ethical or not. Write a short narrative stating which scenario was the most difficult to decide, how you made you final decision. 1. Buying competitors’ garbage: U, I 2. Dissecting competitors’ products: E, L 3. taking competitors’ plant tours anonymously: E, L 4. counting tractor-trailer trucks leaving competitors’ loading bays: E, L 5. Studying aerial photographs of competitors’ facilities: E, L 6. analyzing competitors’ labor contracts: E, L 7. analyzing competitors’ help-wanted ads: E, L 8. Quizzing customers and buyers about the sales of competitors’ products: E, L 9. infiltrating customers’ and competitors’ business operations: U, I
  • 2. 10. Quizzing suppliers about competitors’ level of manufacturing: E, L 11. Using customers to buy out phony bids: U, I 12. encouraging key customers to reveal competitive information: E, L 13. Quizzing competitors’ former employees: U, L 14. interviewing consultants who may have worked with competitors: E, L 15. Hiring key managers away from competitors: U, L 16. conducting phony job interviews to get competitors’ employees to reveal information: U, I 17. Sending engineers to trade meetings to quiz competitors’ technical employees: E, L 18. Quizzing potential employees who worked for or with competitors: E, L Going through all the scenario’s I would have to say that number 15, hiring key managers away from competitors, was the most difficult ethical decision. When thinking about this scenario, there are many different possibilities that come to mind, which muddy the waters. In my mind it would depend on how you go about doing it, by directly approaching the managers, or by posting opportunities with better incentive that draw managers away. If as an organization, you can offer a more lucrative position
  • 3. which happens to draw away managers, I don’t see this as unethical. If you directly approach a key manager with the intention of undermining the competition, I would view this as unethical. Ultimately, the intent behind the action is what determines the whether the action is ethical or not. Also, another confounding factor in this scenario is the fact that most key managers will sign non-competes as part of their contracts. I do not imagine too many top managers can be stolen away by competitors, due to the legal implications of breaking a non- compete. For this scenario, I ultimately decided that this was unethical, because the intent is likely to undermine the competition. Strategic Management Module 6 - Discussion Complete the Assurance of Learning Exercise of your text; “Ethics of Spying on Competitors.” When complete, select the one ethical choice/example (from the list) that you struggled with in terms of determining whether it is ethical or not. Write a short narrative stating which scenario was the most difficult to decide, how you made you final decision.
  • 4. 1. Buying competitors’ garbage – U/L 2. Dissecting competitors’ products – E/L 3. taking competitors’ plant tours anonymously – E/L 4. counting tractor-trailer trucks leaving competitors’ loading bays – E/L 5. Studying aerial photographs of competitors’ facilities – U/L 6. analyzing competitors’ labor contracts – E/L 7. analyzing competitors’ help-wanted ads – E/L 8. Quizzing customers and buyers about the sales of competitors’ products – E/L 9. infiltrating customers’ and competitors’ business operations U/L 10. Quizzing suppliers about competitors’ level of manufacturing – E/L 11. Using customers to buy out phony bids – U/I 12. encouraging key customers to reveal competitive information – U/L 13. Quizzing competitors’ former employees – E/L 14. interviewing consultants who may have worked with competitors – E/L 15. Hiring key managers away from competitors – E/L
  • 5. 16. conducting phony job interviews to get competitors’ employees to reveal information – U/I 17. Sending engineers to trade meetings to quiz competitors’ technical employees – E/L 18. Quizzing potential employees who worked for or with competitors – E/L I struggled with number three – taking competitor’s pant tours anonymously. This type of behavior appears untrustworthy and based on one of the Seven Principles of Admirable Business Ethics, businesses should follow the motto, “do unto others as you would have them do unto you,” (David and David, 2017). Businesses should remain abreast of competitors’ progress; however, the knowledge should be researched and presented within the scope of ethics. I choose this act as ethical because the competitor may not have requested information such as name and company information for tours. However, the organization should have been transparent with its competitor before initiating the tour. #11 & 16
  • 6. Infiltrating customers’ and competitors’ business operations. The action that led to the infiltration must be explored before declaring the act illegal. Illegal activities are defined in law and punishable. David, F. R. & David, F. R. (2017). Strategic management: A competitive advantage approach (16th ed.). Florence, South Carolina. Pearson