Computering

 

Select three of the scenarios below and write up a paragraph for EACH scenario analyzing the ethical issues. Use the Ten Commandments of Computer Ethics as your frame of reference. At a minimum, identify the violator(s), violation(s), which commandment(s) they violate, why, and/or how, and what you feel should happen to the violator(s).

 

A company’s employee uses their work computer to test some software that their friend bought. It only takes a few minutes and they uninstall it after they are done.

A company’s employee gives a friend who works at a different company a copy of a proprietary software for them to use.

A company’s employee was curious as to what the “higher-ups” pay looks like. They break the passcodes and take a quick peek at the salaries.

A bank teller transfers money from a customer account into their account to pay a bill that is overdue. Three days later, the bank teller gets paid and transfers the money back.

A college student shares their password and computer lab access id with a fellow student who is not taking a computer class that requires a lab. The fellow student uses three hours of computer time to complete the government homework and prints a few recipes for their mom.

You are a software developer and you are asked to develop an app that will intentionally generate inaccurate information for a client. You are told in no uncertain terms that you must develop the app or lose your job.You write the program.

 

Sample Solution

Scenario 1: Company Employee Testing Friend’s Software

  • Analysis:
    • The violator is the employee.
    • The violation is using company resources (the computer) for personal gain or for a non-work-related activity.
    • This primarily violates the commandment “Thou shalt not use other people’s computer resources without authorization or proper compensation.”
    • Even though the software was uninstalled, the employee used company hardware and time without explicit permission. This is considered unauthorized use.
    • While the infraction is minor, the employee should receive a verbal warning and be reminded of company policies regarding personal use of company resources. This reinforces the importance of respecting company property and time.

Scenario 2: Employee Giving Proprietary Software to a Friend

  • Analysis:
    • The violator is the employee.
    • The violation is copyright infringement and unauthorized distribution of proprietary software.
    • This directly violates the commandment “Thou shalt not copy or use proprietary software for which you have not paid.”
    • Proprietary software is the intellectual property of the company, and distributing it without authorization is illegal and unethical. This act can cause financial harm to the company.
    • The employee should face serious disciplinary action, potentially including termination and legal repercussions. The company may also pursue legal action against the friend and their company.

Scenario 3: Employee Viewing Salaries

  • Analysis:
    • The violator is the employee.
    • The violation is unauthorized access to confidential information.
    • This violates the commandment “Thou shalt not snoop around in other people’s computer files.”
    • Salaries are considered private and confidential information. Breaking passcodes to access them is a serious breach of privacy and trust.
    • The employee should be terminated. This is a severe breach of trust and would be very hard to recover from. Depending on the company policies, and the laws of the region, legal actions could also be taken.

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.