Premium Essay

Mysterious Blogger/Veilded Id

In: Social Issues

Submitted By atoria1
Words 719
Pages 3
Mysterious Blogger/Veiled ID Torey Flowers ETH/316 July 21, 2013 George Price

The ethical issues that were presented in the Week Three Ethics Game Simulations were from The Mysterious Blogger and The Veiled ID. The ethical issues on “The Mysterious Blogger” were whether the information obtained by Jamal Moore, the IT Tech was enough to discipline Aaron Webb, the blogging employee for violating the NDA policy. As for “The Veiled ID”, the ethical issue had to do with how to develop and implement a security policy that provides for employees’ physical safety and accommodating special needs. The decision making process used to work on these ethical issues were based on the job descriptions given by the simulation. These decisions were made to protect the interest of shareholders and to prevent possible discrimination lawsuit against the company. Everyone involved from investors to company employees will be affected by any ethical decisions that arise out of this issue. It will also have an effect on the community, based on the decision that is made. Doing what is morally right and fair for the primary stakeholders and the community at large is what influenced my decision making in the simulation. You must keep in mind that you are not the only one that is affected by the issue. Whether directly or indirectly, there are numerous people who will be affected by the issue and by the outcome of the decision that’s made. Apart from doing the right thing and following company procedure, it is also about protecting the shareholders interest and the interest of the company. If the company’s policies are violated, the company must make a sound decision that that produces an outcome in the best interest of the company and its stakeholders. The decision made must be made carefully, as to satisfy all parties involved. The ethical perspectives that were used to…...

Similar Documents

Premium Essay


...Firstly, people can use as an online dairy, using it to share the day’s happening in her life with other visitors on the net. Furthermore, if the blogger (author of the blog) has met up with certain incidents in her life, he can share it on the blog and others can console or praise him, by giving comments or leaving a message in the blog’s tag board, depending on the incident. Blogging can also be a good way to relieve stress as some way wants to use their blog to vent out their frustration or pour out their woes when stress becomes too much for them. Some bloggers even use their blogs to flaunt their literati skills by posting poems about themselves or things around them. Secondly, bloggers can also use their blogs to inform others on a certain topic which happens to be his niche, thus allowing others who are interested in the topic to learn some tricks from the blog, they are also post questions to the blogger if they meet up with problems. Even Mr. Donald Trump is doing so, he launched the Trump Blog last month to share his insights into and answer questions about corporation ethics, personal success and business dilemmas. Other organizations are also using blogs to make announcements to all of its members, as it is a fast and quick way to convey messages to one another. Anyone can have a blog; the blogger does not necessary need to know how to write complicated hypertext to own a blog. However, knowing how to do so may just allow you to create......

Words: 663 - Pages: 3

Free Essay

Id System

...class attendance by students swiping their DeVry ID cards for every scheduled lecture and lab session. The card readers are conveniently located in each classroom and lab. Additional individual instructor policies for determining tardiness and absence are outlined in course syllabi. Remember to swipe your card for every class you attend. Many students have shown absences (especially in labs) for classes that they have been attending because they have forgotten to swipe. Please remember to swipe your card for lecture and lab attendance. If you forget to swipe your card, you may request that your instructor submit an 'Attendance Revision Form' to update your attendance. Check with your instructors (or course syllabus) to find out whether or not their attendance recording policy will allow for modifications after the class session has been conducted. Please do not get into the habit of swiping more than one card. It is in your own best interest to be the one in control of your ID card and your attendance record. Swiping your classmates' cards can be considered a violation of Article III of the student code of conduct and is subject to the disciplinary actions outlined in Article V of the Student Handbook. Students are not allowed to use an instructor's ID code or card to record attendance for a class. This is for your protection. If the instructor is running late, please wait for the instructor to show and swipe their Faculty ID card, this captures all card swipe activity......

Words: 325 - Pages: 2

Premium Essay

The Mysterious Blogger

...The Mysterious Blogger and the Veiled ID ETH/316 Ethics and Social Responsibility March 11, 2013 The Mysterious Blogger and the Veiled ID The ethical issues that are presented in: The Mysterious Blogger and the Veiled ID; were the leaking of confidential information by an employee and in the second dilemma was an employee who is Muslim could not remove her head scarf for a photo. My name is Stephanie Tetting Director of Safety and Efficiency for G-Bio Sports. In this dilemma there are two employees Jamal Moore and Aaron Webb that are involved in this situation. Both of these individuals could potentially cause great harm to the company and the IT system; Aaron was able to leak information that is confidential to the company from Aaron’s home computer. Jamal, a G-Bio Sport IT technician located the leak by hacking into Aarons’ personal computer seeing his personal business. Jamal and Aaron are both good employees and considered an asset to the company; it is now my responsibility to deal with both of these employees by reaching a decision on how to handle this dilemma. First I need to consider who is directly involved by my decision, those who will be affected are: Board of Directors, Human Resources, and the two employees. Company policy must be followed accordingly to ensure my position within the company is not jeopardized. Aaron Webber felt he was not in the wrong, since he felt he had the right to free expression. What he did not realize was......

Words: 838 - Pages: 4

Free Essay

Id Chorvalu

...I.OVERVIEW A. Project Purpose, Objectives and Criteria. An Identity document or ID is used to verify aspects of a person's personal identity. Most of the establishments like companies and schools give their employees or students an ID. The proposed system will take the ID system into a whole new level. ID will not just become a form of identification but it will be also be used as an attendance card. The proposed system will store different data like the subject of each students and its particular time and room, and what time the student attends their class as well as, what time they leave that particular class. B. Assumptions and Constraints The aim of the study is to develop a system that can check and manage the attendance of each student in an efficient and reliable way. This system will not only benefit the students but will also benefit the parents, faculty members and other students. Less work, easier way of looking for a certain student, check the availability of the student and to check if the student attends their class are the major goals of this project. To develop a system that can replace the old not-so-useful type of Identification system and develop a database that will store name and student number, the subject of a student in a particular time and what room, what time the student attends that class and leaves that class. C. Objectives The new identification system aims to prepare itself with efficient work to be able to compete and be a......

Words: 565 - Pages: 3

Premium Essay

The Mysterious Roses and Cold Feet

...The Mysterious Roses and Cold Feet ETH/316 University of Phoenix The Ethics Games Dilemmas this week presented “The Mysterious Roses” and “Cold Feet” simulations. For the exercise we were required to address the issues in the simulation and identify the best decision for all parties involved. This summary will review what ethical issues were presented in the simulation, the decision making steps to ethically address the issues, the perspectives and lenses that were used to make the decision, influences in the decision making and concepts that relate to my work place. The first simulation “The Mysterious Roses” presented an issue that could have potentially been a violation of the sexual harassment policy. In this simulation Bill Witherspoon, a research scientist had been sending flowers to Gayle Dornier, a Sales Representative. Bill Witherspoon had been sending flowers anonymously for the last three weeks to encourage her. Joe Williams another employee informed me that this has made Gayle uncomfortable. Gayle has requested a meeting due to a confidential matter that may or may not be related to the anonymous flowers. Due to Gayle’s request that this meeting be kept confidential, I am faced with the dilemma of what to do in this situation. The second simulation “Cold Feet”, presented a problem related to possible falsification of data. In simulation I have received an email from Nicolai Zubanov. The report he has to submit to Phillip Waters......

Words: 1056 - Pages: 5

Free Essay

Mysterious Places

...Mysterious Places Mamyan Ann Our environment is full of magical, mystical, and mysterious places that defy explanation.  There are treasures yet to be found, stone carvings we don't yet understand, and architectural feats to be explained.  Even as we live in what we consider to be the most technologically advanced society in all history, there are currently no air-tight explanations for most of the true wonders of our planet and beyond. The Great Pyramids of Egypt are the oldest structures on earth, contain compelling evidence of a civilization far more advanced than ours, and most likely existed thousands of years before the great flood.  With their original exteriors, they could probably be seen from the moon. The Mayan Civilization left behind incredible structures containing precise calculations and prophecies regarding the exact date of end of the world........Do you know that date? A site being studied on the side of Mt.  Ararat in Turkey may be the remains of the Biblical Noah's Ark. Scientists are currently quietly investigating a site off the western tip of Cuba that some say may be part of the lost city of Atlantis. We know less about the bottom of our own seas than we do about outer space.  There is a form on the surface of Mars that strongly appears to resemble an Egyptian face carving.  Is there a link? These are just a few of the many fascinating and mysterious places we intend to visit on these pages.  From......

Words: 4291 - Pages: 18

Free Essay

Id Theft

...committed was underage drinking using fake ID. Usage of assumed name and identification to commit serious fraud was still rarity. (2) Rapid increase of personal and financial information along with new technologies gave new live to an old crime and ID theft is now being called the crime of the 21’st century. Identity theft can disrupt lives or even put people in jail for the crimes they never committed; in other words, the victim of identity theft can suffer adverse consequences if held accountable for the perpetrators actions. Identity thieves take personal information such as: full name, birth date, and full address, mother’s maiden name, SIN number, driver’s license number, passport number, signature and credit or debit card numbers without the victims’ permission. Stolen or reproduced information can be used to: access bank accounts or open new ones; transfer money from bank accounts; apply for loans, credit cards or other goods or services; make purchases; hide criminal activities; obtain passport or receive government benefits; and finally facilitate organized crime and terrorist activities. (3) There are cases when identity thieves may try to even sell your property and embezzle the money. Techniques of stealing someone’s identity range from unsophisticated such as: pickpocketing, dumpster diving, obituaries or mail theft to more elaborate schemes. Today’s technology, low cost availability of computers, mainly Internet, made the work of ID thieves extremely easy and......

Words: 2899 - Pages: 12

Premium Essay

The Mysterious Blogger

...The Mysterious Blogger Rafael A Berastain ETH/316 Nov 14, 2013 Professor Jones The Mysterious Blogger Despite a new computer security system, someone, who must be a company employee, is still posting company information on a private blog site. Most of the information is available elsewhere, but the leak concerns you. One of your other employees determines who is posting the information, at home and without company authorization. The other employee also hacks into the blogger’s home computer and discovers a material that is not allowed in the company computers. The ethical issues on “The Mysterious Blogger” were whether the information obtained by Jamal Moore, the IT Tech was enough to discipline Aaron Webb, the blogging employee for violating the NDA policy. In one side, the company has an employee named Aaron Webb that is posting illegal blogs and violating some of the company policies. In the other hand, the company has another employee, Jamal Moore that is trying to help somehow to unsolved this mystery blogger. The only thing is that Jamal is also violating some of the company policies by letting me know about the situation. After finishing the Ethic simulation, I notice that my decision was only made on thinking only what is right and also thinking that I did not want anybody to think that I chose anybody sides. In order for the company employees to learn the consequences of wrong actions, they need it to see what the outcome was. Not really paying attention......

Words: 722 - Pages: 3

Free Essay

Marketing to Bloggers

...Matthew Southwick Public Relations – 4 Individual Work – Week 10 I honestly had no idea how powerful blogs and bloggers could be. There are sites set up to direct you how to present your idea to a blogger, how it will be best received, and how many potential readers you might be able to have in your audience. Amazing! You’d better be sure to get it right the first time though because most of the reviews from bloggers themselves stated that it’s a one and done game. You only get to make that first impression the first time. Get it right and do your homework. First thing to do is read the blog. Seems simple right? Well it goes right over the heads of hundreds of PR professionals trying to get their message out. Sending PR campaigns regarding dolphins to a blogger that blogs about ONLY dogs. Hmmmmm….. How about a campaign about the benefits of using mosquito repellent to a beautician who blogs about make- up and hair styles? Way out of the loop! So when making your attempt to reach out to a potential blogger, make sure you at least know what the blog relates to and that your campaign fits their audience. Otherwise you are simply white noise and no one wants to listen to white noise. When determining the blog that fits your campaign it doesn’t have to be an identical fit. For example, if you are working on a campaign for shampoo you might be able to reach out to hair stylists, make-up artists, fashion critics, women’s issues/hot topics, mommy topics, etc. Your audience......

Words: 639 - Pages: 3

Premium Essay

Mysterious One

...Operations Centre Network Service Provider OutBound On Board Processing Open System Interconnection PHYsical Performance Implications of Link Characteristics Public Switched Telephone Network Queue IDentifier Quality of Service Resource reSerVation Protocol SATellite Satellite Control Centre Satellite Dependent Satellite Dependent Adaptation Function Satellite Independent Satellite Independent Adaptation Function Satellite Independent Service Access Point Service Level Agreements Satellite Link Control Satellite Medium Access Control Small to Medium sized Enterprises Satellite Network Operator For the purposes of the present document, the following abbreviations apply: ASP AESA ATM BSM BSMS CP CPE DAMA Diffserv DL DLL DVB-RCS DVB-S GSM GW IB ID IETF Intserv IP IPv4 IPv6 ISDN ISP ITSP IWF LAN MAC MM MSP MTM NAP NCC NMC NOC NSP OB OBP OSI PHY PILC PSTN QID QoS RSVP SAT SCC SD SDAF SI SIAF SI-SAP SLA SLC SMAC SME SNO ETSI 10 ETSI TR 101 984 V1.2.1 (2007-12) SO SP SPHY ST TCP TM/TC TOS UDP UL UMTS UT VCI VPI VPN VSAT EH TSS TSM Satellite Operator Service Provider Satellite PHYsical Satellite Terminal Transmission Control Protocol TeleMetry/TeleCommand Type Of Service User Datagram Protocol UpLink Universal Mobile Telecommunication System User Terminal Virtual Connection Identifier Virtual Path Identifier Virtual Private Network Very Small Aperture Terminal (satellite) End Host Transparent Satellite Star Transparent Satellite Mesh 4 4.1 Overview of BSM Satellite network......

Words: 13830 - Pages: 56

Free Essay


...mediated spaces where bloggers out together their outfits and share their shopping-related events. Fashion blogging has also been a revolutionary method for communicating and advertising through online media. Sprouting from the collective whole of blogs, called the blogosphere, fashion blogging is a whole new world of personal journals infused with the fast-paced line of design in clothing, footwear, accessories, makeup and other wearable paraphernalia. The fashion industry has been finding ways to connect through their rising audience in the modern society, and via blogging, it has secured a throne of perpetual popularity, fame and success. Through this, fashion blogging is born. Two years ago, two million blogs represent the growing and fast-rising modernity of fashion; and now, fashion blogging has been crowned the most popular form of blogging. The persona of fashion blogging itself is innovation, making use of creativity in a conventional way, following the standard of wearability of certain articles of clothing. All in one, it could express the personality of the blogger, as well as openly communicate with the audiences of the blog, while effectively advertising the pieces of fashion the blogger has been showing. B. Literature Review Fashion bloggers share their knowledge pertaining to the fashion industry, specifically in terms of new style and trends, which they share through their own blogs based on their own experience (Bunina 2013). This is how bloggers share......

Words: 1396 - Pages: 6

Free Essay

A Blogger in Their Midst

... * This could be new opportunity to for Will to promote Glove Girl because she can be used as a spokesperson of the company as she has an excellent public image. * The marketing department can always look for newer modes of marketing like SMS, e-mails etc. and should try to be ahead of their competition.  * Organizations need to adopt social media policies to prevent proprietary information from being leaked to the public. Personal Opinion for Glove Girl Bloggers’ opinion can constitute an extremely useful tool for a company’s product or service. The reason for this is that people feel bloggers have no subsequent intention in recommending something. In other words, they do not have the feeling that the blogger is trying to sell them something but that they are otherwise giving their opinion from their own knowledge or experience with the product or service. In the article “A Blogger in Their Midst”, Lancaster-Webb Medical Supply is living, for the first time, the experience of having a blogger (Glove Girl) writing about an old product, from the inside of the company (as an employee, but also as an user). The CEO of the firm is astonished to learn that there had been a huge demand of this product since she started talking it up on her blog. After studying the case, I consider Will Somerset would have different things to do with Glove Girl: fire her; hire her to post good opinion articles in her blog about the company and their products; not do anything with her...

Words: 745 - Pages: 3

Premium Essay

Fake Id

...Fake ID Just like many college students, Dana and her friends decided to go to a bar one Saturday night. The problem: Not everyone in their group was old enough to enter. The solution: Use fake ID obtained through a friend. So Dana and her friends used fake IDs to enter the bar without a problem, or so they thought. Later that night, police raided the bar. Dana's ID was confiscated and she was later arrested. It seems like everyone wants to be a different age. Many teenagers want to be either 18 or 21 so they can buy cigarettes or alcohol. And I’m sure everyone has heard their parents say they wish they were 18 again. For the most part people can’t change how old they are, but by using fake identification, someone could pretend to be an age older than what they are. More and more people are using fake ID’s. There have been many new advances in technology in recent years. Because of these advances, such as computers and internet, fake ID’s are becoming easier to get, and their quality is improving. Not too long after states find ways of making ID’s harder to duplicate, the counterfeiters are finding a way to make them. Fake ID’s no longer consist of scratching an 8 into a 3. These advances make it hard to tell apart fake ID’s from the real thing. Some websites sell fake ID’s from $50-5,000. Selling fake ID’s over the internet has increased greatly over the past few years. The internet makes fake ID’s readily available, but according to the article “Forged...

Words: 595 - Pages: 3

Free Essay

The Mysterious Kingdom

...that almost touches me. I hopelessly closed my eyes but the pain I imagined did not happen. I felt someone pushed me and I fell into the lake. The water was cold and freezing. I tried to swim but I could not even see anything as there was darkness all around. My vision was blurry until I finally saw some light above. I used all my strength and swam towards the light, until I was finally out of the lake. I started gasping for air. I never thought that the air fillings into my lungs will be such a good feeling. I looked around; there were my friends’ worried looking face. I was back. I looked at the key in my hand and I finally know that, maybe it was not a dream after all. I looked at the sun above me and said goodbye silently to the mysterious boy and that place I would never go to again. I never know, maybe it’s not the end of everything. It’s just the beginning of it…...

Words: 658 - Pages: 3

Free Essay

Marketing Plan Blogger

...mechanism for their product, and this creates a big opportunity for intermediaries to match the blogs with the right company (Stelzner 2012). There is even a growing opportunity for paid sponsor posts which is where companies will pay for a blogger to post something (Stelzner, 2012). The opportunity for significant expansion exist, as most blogging sites do not have as strong a presence in overseas markets as they do in the US market. Finally, more corporations are willing to pay for the most sophisticated blogging interface and also bring on permanent staff to better utilize this technology. Overall, these three industries provide the biggest opportunity to consumers, individuals, and businesses as it delivers the ability to receive and transmit a message through a platform that uses collaboration in the form of sight and sound and leverages our current technologies. Threats: Opportunities bring about threats and technology has provided many industries opportunities but it has also brought many industries to their knees. The people collaborating industry is no different as there are several threats related to the industry. The first threat is misleading communication whether that is in the form of an incorrect entry, incompetent blogger, and individual opinion with no factual data. These industries rely on subject matter experts, user generated content, which can be misleading resulting in the need for damage control for both the company and the individual. Global......

Words: 1571 - Pages: 7