Ethical Issues Analysis: Scenarios, Violations, and Consequences

Verified

Added on  2022/08/12

|4
|587
|46
Homework Assignment
AI Summary
This assignment analyzes three workplace scenarios from an ethical perspective. The student examines each scenario, identifying the ethical violations, the individuals responsible, and the relevant commandments of computer ethics that are breached. The analysis highlights issues such as unauthorized use of company resources, breaches of data security and privacy, and financial misconduct. For each scenario, the student explains why the actions are unethical and suggests appropriate consequences for the violators. The assignment utilizes the provided scenarios, which include misuse of company computers, unauthorized access to salary information, and unauthorized transfer of funds. The analysis also includes a brief bibliography of relevant sources.
Document Page
Running head: ETHICAL ISSUES
Ethical Issues
Name of the Student:
Name of the University:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1ETHICAL ISSUES
Analysis of Scenario 1:
A company’s employee uses their work computer to test some software that their friend bought.
It only takes a few minutes and they uninstall it after they are done.”
This is incorrect as per the ethics of work. According to the code of work ethics, the
computers or the equipment provided by the company should be solely used for the work of the
company. Any other external usage of those device may lead to violation of one of the most
important policy of the workplace and that is the privacy policy. By allowing a person to access
to the device and install a software for testing is provoking the danger of unknown attacks from
the hackers who are present. Malwares can be planted into the system which may lead to
tracking of the entire system subjecting entire organization’s data to the threat of loss.
Analysis of the Scenario 2:
“A company’s employee was curious as to what the “higher-ups” pay looks like. They break the
passcodes and take a quick peek at the salaries.”
Breaking into system without authorization of the administrator of the system is a crime
in itself. This can also be termed as the breach in the security of the data as the employees are not
allowed to access the administrative databases. This is against the data protection act as well.
This could have a severe impact on the employees which would have led to their termination as
well.
All though as the part of the organization, the employees have the right to know about all
the necessary details regarding the pay scales. A formal query could have between generated by
the employee instead of misusing the password for breaking into the system.
Document Page
2ETHICAL ISSUES
Analysis of the Scenario 3:
“A bank teller transfers money from a customer account into their account to pay a bill that is
overdue. Three days later, the bank teller gets paid and transfers the money back.”
This is strictly against the law of asset protection and assurance of the banking services.
Once the money is deposited in the bank it is completely the respnsibi9lityb of the employees of
the bank to take care of the assets. Touching an individual’s account or monetary assets for
retrieving money without notifying them is a treacherous crime. All though the money is
returned once credited to the employee’s account, but it is completely beyond the limits of the
work ethics. This leads to the clefts in the customer’s reliance for the company. However, for
paying the bill of an overdue amount is against the rule as well.
Document Page
3ETHICAL ISSUES
Bibliography:
Ghasemzadeh, A. and Esmaeili, E., 2018. Professional Ethics and Workplace Safety
Behaviors. Journal homepage: www. ijethics. com, 1(1).
Mityagina, V.A. and Naumova, A.P., 2019, March. Professional translators’ ethics in workplace
communication. In IOP Conference Series: Materials Science and Engineering (Vol. 483, No. 1,
p. 012010). IOP Publishing.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]