Jessica_Clifton_BUS508_ assignment 4

Jessica_Clifton_BUS508_ assignment 4 - ETHICS IN BUINESS...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
ETHICS IN BUINESS Production and Operations Management Jessica J. Clifton The Business Enterprise Dr. Cynthia Davies June 6, 2011
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2
Background image of page 2
Abstract Business Ethics is the applied ethics discipline that addresses the moral features of commercial activity. Programs of legal compliance, empirical studies all made into the moral beliefs and attitudes that business people follow. Although self-conscious, academic business ethics is relatively new and has its intellectual roots in the corporate social responsibility (CSR) and business-and-society writings that originated in law and in business in the early and middle 20th century. With recent moral and financial failures still fresh in the hearts and wallets of many Americans it seems evident more now than ever the corporate focus has returned to how it was in early in the academics of business ethics. Originally the concerns were centrally with questions about the corporation's proper role in and relationship to the social order. Now again questions that surround the “moral status of a corporation, have taken center stage, followed by two other key CSR questions, “Is the corporation a moral agent, distinct from the persons who compose it?” and morally, “how or in whose interests ought the corporation to be managed?” ("Business ethics," May) Determine if hacking into a Web site is ever justifiable, applying your theory to a real- world case in which someone hacked into a system, including the name of the company and details. It is reported that The Goatse Security Firm has hacked the website of AT&T, The hacking group, which calls itself ‘Goatse Security’ says it specializes in exposing security vulnerabilities. They claim to of hacked AT&T to gain access to the Apple iPad; in the process they harvested an estimated 114,000 Apple iPad 3G owner e-mail addresses and also the identification number that those iPads use when they communicate over AT&T’s network known as an ICC-ID. Goatse has defended their actions as "ethical" and right. AT&T has since disabled the feature the story was first reported the story, Goatse waited until AT&T had closed
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
the hole before revealing its findings. They defended the release as "responsible disclosure" the term given to security revelations made public only after a vendor has patched a bug or otherwise prevented vulnerability. The group said the disclosure needed to be made and claimed that iPad 3G users had the right to know that their e-mail addresses were potentially public knowledge so they could take steps to mitigate the issue like changing their e-mail address. (Bilton June) When it come to internet security and personal information it is indeed very important to have like a watch dog type agency, however the responsibility is to high to be left up to renegades or some vigilante type agencies. In the interest of public safety and internet security firms like Goatse must themselves be screened policed and regulated. For example
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 07/17/2011 for the course BUS 508 520 taught by Professor Na during the Spring '11 term at Strayer.

Page1 / 9

Jessica_Clifton_BUS508_ assignment 4 - ETHICS IN BUINESS...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online